diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index 90bef74b..9fb8f794 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -14,9 +14,10 @@ If you're not familiar with Docker and Blockchain, can have a look at these book Fabric Release | Description --- | --- [Fabric Latest](latest/) | latest fabric code, unstable. -[Fabric v2.2.0](v2.0.0/) | stable fabric 2.2.0 release. +[Fabric v2.2.0](v2.0.0/) | stable fabric 2.2.0 LTS release. [Fabric v2.1.0](v2.0.0/) | stable fabric 2.1.0 release. [Fabric v2.0.0](v2.0.0/) | stable fabric 2.0.0 release. +[Fabric v1.4.9](v1.4.9/) | stable fabric 1.4.9 LTS release. [Fabric v1.4.8](v1.4.8/) | stable fabric 1.4.8 LTS release. [Fabric v1.4.7](v1.4.7/) | stable fabric 1.4.7 LTS release. [Fabric v1.4.6](v1.4.6/) | stable fabric 1.4.6 LTS release. diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block index d6d5bc38..852081f9 100644 Binary files a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block index b4838e59..4bd70131 100644 Binary files a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block index 596ce41c..2e3a206d 100644 Binary files a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block index 42cab06f..2e3a206d 100644 Binary files a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block index be06bb21..3998f7e8 100644 Binary files a/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block and b/hyperledger_fabric/v1.4.7/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.9/.env b/hyperledger_fabric/v1.4.9/.env new file mode 100644 index 00000000..1ed94637 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.9 +EXT_IMG_TAG=0.4.21 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.9/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.9/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.9/Makefile b/hyperledger_fabric/v1.4.9/Makefile new file mode 100644 index 00000000..0cc6475a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/Makefile @@ -0,0 +1,313 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka, raft +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +# mode of dev +DEV_MODE ?= non-dev + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-raft.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" + +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +ifeq ($(DEV_MODE),dev) + COMPOSE_FILE="docker-compose-2orgs-4peers-dev.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_instantiate test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + make test_discover + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +test_discover: # test discover + @echo "Test discover" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_discover.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.9/base-event.yaml b/hyperledger_fabric/v1.4.9/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.9/base-kafka.yaml b/hyperledger_fabric/v1.4.9/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.9/base-raft.yaml b/hyperledger_fabric/v1.4.9/base-raft.yaml new file mode 100644 index 00000000..a9154f4a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/base-raft.yaml @@ -0,0 +1,207 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # below 4 must be defined/undefined together, for using separate network for raft + - ORDERER_GENERAL_CLUSTER_LISTENADDRESS=0.0.0.0 + - ORDERER_GENERAL_CLUSTER_LISTENPORT=7055 # this must be the same with channel config + - ORDERER_GENERAL_CLUSTER_SERVERCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_SERVERPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/go/src/examples + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric diff --git a/hyperledger_fabric/v1.4.9/base-solo.yaml b/hyperledger_fabric/v1.4.9/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.9/base.yaml b/hyperledger_fabric/v1.4.9/base.yaml new file mode 100644 index 00000000..fe06fbfc --- /dev/null +++ b/hyperledger_fabric/v1.4.9/base.yaml @@ -0,0 +1,165 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_BUILDER=hyperledger/fabric-ccenv:${FABRIC_IMG_TAG} + - CORE_CHIANCODE_NODE_RUNTIME=hyperledger/fabric-nodeenv:${FABRIC_IMG_TAG} + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/crypto-config.yaml b/hyperledger_fabric/v1.4.9/crypto-config.yaml new file mode 100644 index 00000000..44c6f47e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config.yaml @@ -0,0 +1,113 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 + - Hostname: orderer3 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 + + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk new file mode 100644 index 00000000..c30174ea --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqBG8Hwh5mYu43r5j +GeY8shFS4tWliS2C6Eo1DqKodwmhRANCAATS6dielFhgzyrdDwU8IRpzPgyLE50P +N3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk new file mode 100644 index 00000000..6a7655f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg7VsR5c+YXJaAIbQ +/RyVK3s/RIu+tgC4e7bvyQvlo/uhRANCAAS7PZnfjljPssg33bRu492D7dj5nwKm +Bir/2loPey1VLIr8DNhHxAc5wGNYrTkPbGhT2v+m+RObE3SfITlnRgem +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..c985b158 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..f4d873e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..833ebc4c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwlr7b9VCz3Gb7Cn1 +jeYmgZv+hxsqNmaNTnIqWdkRpXWhRANCAASMcu7M7of/gjW2lbwRnr+ZxJNz67fq +1S5udVxiSqEDuwrdKRDEq36ZBDoxn3AuhnsOxZVPscbm5ze5Smoc7oro +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk new file mode 100644 index 00000000..e09d04c2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg55SPn8cI2tmrOxU6 +a/fs6bQBeJdhWlGgodxpVlEcpXuhRANCAASyro+MTim5CYT5TsjvTzOMJf87xHZv +ixu9uo2HCm3Nh7DacEo6lNM0xEdiVCs2T4kjmOxwLSnKhKN6v7vWLxSc +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..f78ccae3 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +zT4JIZZIt8ZQKDz2PbySBfC+rA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..c95f8576 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..2b5b9d11 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg42GOYalmMEBy3LWI +qRxiDkoV89hxS06FFKR7oVdO3qShRANCAARXyAMSPDpxTP0kx2zoBfLJChu8+NhC +l3RQPiVC0IfsdrIrjHfWnQGuhW7rE5tmSFXHUPtAVTzA+yLMNxhe4Fgh +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk new file mode 100644 index 00000000..1e3ec4bd --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkdlWCmGUbNdEPcds +b6wf/bksls0ITnrRGIE2pPhg+WuhRANCAARPwHu+83+vF0ypYYr7Kq+Pa+PNyiHQ +805N+jBOMrOCDGcY2ObntNpt7yZISncnv0g35nQFSOVFft497Vj0ydA/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..a3b8b8bb --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..b393548e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..9ea6314c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeFRhsNgcc5n6aEOs +g3eKHRSeKW8uRkFASkrmXJKNStuhRANCAARi0GkifFEfO18xLpBbADxN0HA1H+iK +RYSPepstZ5Bf9xF/RKbAFEV4yLg82lazX52epBcd4o6dSJGuHF7UErbO +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk new file mode 100644 index 00000000..6e058b71 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLWIybO6Te+EtYH7e +UBASAyCtVYoHY3gXQtkWsh89FvyhRANCAASDdIB7HKOhJS4ic24F3Fwba39VyDRL +pTb7Kr5WWDsQLnmvoRt9tuUZDBknjg6l+LoE61amUkr7ssqLoo3sD0Lx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem new file mode 100644 index 00000000..f0ec8d30 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQNB5/cbq9Av+/iGkL70qNmDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIzLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEg3SAexyjoSUuInNuBdxcG2t/ +Vcg0S6U2+yq+Vlg7EC55r6EbfbblGQwZJ44Opfi6BOtWplJK+7LKi6KN7A9C8aNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +X6lK+YFJKWFOkm8REkQkAOft/GJHZF6TV4mnrR+FBvcCICrmpowTeNkx9SRIDJGV +16xdzWz/i3/8zsaxYRlAcllY +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt new file mode 100644 index 00000000..ff31671f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAPsAy4zBIdPWDaz42uM3PhkwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMy5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABP+BC8hFOA4Z6YXKOsW5DV1vkrL5lMy9jR5IaXBTKIsA +OkgmXBAxigvOMCDWbRffLmUGoVplSGEyjDex0TvHEACjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIzLmV4YW1wbGUuY29tgghvcmRlcmVyMzAKBggq +hkjOPQQDAgNIADBFAiEA3qYzyv4Zuap2StCsi7bNUhDhe2Wkl17xQdsbskhq8fYC +IGCLCNwtHpGJu1PKeVQ05dXP7tVyG+6X99Kol5yR5b50 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key new file mode 100644 index 00000000..df7ddf2b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggEkbssbogR9aGUd6 +i7ArkBFke4DVDCTjwjEQkZV3tEShRANCAAT/gQvIRTgOGemFyjrFuQ1db5Ky+ZTM +vY0eSGlwUyiLADpIJlwQMYoLzjAg1m0X3y5lBqFaZUhhMow3sdE7xxAA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk new file mode 100644 index 00000000..d66eecd5 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgSz7TzhWtfJWnPJbC +jqKcjNIeerJFi8hz8KK/FAmaG5uhRANCAAR19yWUX7oV+QhBRs1OJMZe9zjmxaaD +W/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYYa8Mq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk new file mode 100644 index 00000000..7c191aa4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwl9zte7tkAXaH4X0 +0HRu250f0JeUz9xSE/huhZXjKoWhRANCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7t +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..7526ce41 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..a669485f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLDCCAdKgAwIBAgIQcwGtMNlpDs3BPLJbDh516zAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowVjELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAE38zsx5udq3fPJ+3gtilspQaZbEmfXLAdrMM+1GUfdx8weOUW +e6LqbJrzw3S6N3DGdPm8z9qaDeBt2ESXTMjYFKNsMGowDgYDVR0PAQH/BAQDAgWg +MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMCsG +A1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqG +SM49BAMCA0gAMEUCIQD6UvUxCjTE1BobKWfCWiV/CcXsNOgIgNkHrI5G4tVJ1AIg +eITXCKnE7XAGZe74ewkqIiIcVHLZo0Ve3vI886odvsM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..0a1ea59b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgiWglBLqGYifGdUuN +tmP78YzHJzo18qgSyBL041wq4AuhRANCAATfzOzHm52rd88n7eC2KWylBplsSZ9c +sB2swz7UZR93HzB45RZ7oupsmvPDdLo3cMZ0+bzP2poN4G3YRJdMyNgU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk new file mode 100644 index 00000000..8e3064ee --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgpl436lDqjqEwe7qt +SbJ1vZWwdTAmzNGp8MO8gE7vT6WhRANCAARYN0FEkqJU8FyOzhlwvN9C8vzq4KNJ +NJUSGoGdlXLepZfi6qFjlwFMqiLei0B+yh3qfTCQN6TZ/MFowLyc/6/6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk new file mode 100644 index 00000000..ffdc4dc9 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgm0D+OkYABIIuG7N4 +QkU2o+Sdg+AzA8y6GScUHhwl1jihRANCAARpIC9sgC5Ie27g8k4ggc+MU0WzQQgI +Fp54ifC8GKqFWG2jQX2092SI4bJIthBfXZ8rp1A5cFHP31V0MtT8+Ve3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..c16590c7 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9cedb1fe --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAOC5poegWgqD1BvaIJ6XrAQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEuXtrj4F6eKCsBVjasRnFiTRRG2 +OLg0UtJx1cX1I9HnNw4KWX4enKPwouNutf4KaxfCAxmuRgzZI5BKU5x3oDKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQDfhE88/mTlFPyB8j8NK9t1xMFt3g1t +LCf2QOjePfTsiAIgZnpUMmPjtg78sNnPNYJeGbGr883CwwRn7N5ao2opLeQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..1691eafa --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxsEAmr439JoRs7Xc +7OIKgYSbo+bFM1zPrW1V/JZGgKShRANCAARLl7a4+BenigrAVY2rEZxYk0URtji4 +NFLScdXF9SPR5zcOCll+Hpyj8KLjbrX+CmsXwgMZrkYM2SOQSlOcd6Ay +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk new file mode 100644 index 00000000..6345f590 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgS3ZKSdWVpwrlMiAB +GNMv02TwWh3ebDVP7cmS+sFTVDihRANCAAQAM18H+Xw4mrVjYCudNH4mtoBoLXn5 +NAM7euZw/7mnOMf4w8QyaKc/Tmj/JDbTya7CqTF1Nl2W8dmSYgjjiF75 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..44dc5271 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9795c4ff --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAMzR1ry+c/2vJ+AlkNZ1Hm8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEMRsEolFihr73o8uuekTzvdqc0U +zkDA67j6oQL6kj8BaGTyGsbnrZM/N5gHtmFLNS/KXsB33sgtwDLR8c8MXk2jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIDwQEU7PPSpMh1nAseqDbETJvWc8cBHD +DSjdi3eGcCfxAiB/xoTRgxPVYoDWmTdfMb7LmiFKEUKORiTdFdB/Vw+NuA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..157c5c44 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgy3PX7MfHycwgXba7 +WYukETpSmbp7nGDWKneN6QQUI96hRANCAARDEbBKJRYoa+96PLrnpE873anNFM5A +wOu4+qEC+pI/AWhk8hrG562TPzeYB7ZhSzUvyl7Ad97ILcAy0fHPDF5N +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk new file mode 100644 index 00000000..18dbc0a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkDRcAA6YkwHf8mtg +3heHEEaMNklyl7Oc3uphAxUKoTGhRANCAARLYbic3FBmxtFeUtGOsq91ly/xCh8/ +ee3vTw05WmOvgwob7H+s/AtTD9tToaF805rXPgkP/ZTcJxtpcEZiyY4Y +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk new file mode 100644 index 00000000..6f48f879 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg5akjxEuWvHG6aITD +u+t7ju1Bpw4KY+OO7LiIBHh3VwyhRANCAAQdWZbur272mq4WmfyMoK/VtdqU87eW +ghFXPrVsAvQxc/OenVISSYhjmPzAoP8ur4B3uEK4Xq/njMSNSFH4epQo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..3e04c481 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt new file mode 100644 index 00000000..d2232ee1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAPrbDSSjkh7EyYEcPe/b0dAwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCFrSYyQZaPtM/UVKYEkvqSzHdbK +UIX3Izosv4Rg7VDcQJMpTPkIduB1FAyE94HpFjxfk/DI6VervaHu2R0Rqb2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCC1GiOE7oRtNQgW6UMPJxpIL45HDwdk +3mW8msrOXSl9ADAKBggqhkjOPQQDAgNHADBEAiBv/os8LFWwYsnOhyCD7rywVqLv +9OL4kcV7A96Il9tPrAIgIEChTI9Q5d6AJYaLW7M+PYtJU3e9OKSYGgIXIVib45c= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key new file mode 100644 index 00000000..c28fc5d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgR5e9u+BSn8n7W2OG +TYq8vbXNSkE/k9oYUNcjuWNVZ0ihRANCAAQha0mMkGWj7TP1FSmBJL6ksx3WylCF +9yM6LL+EYO1Q3ECTKUz5CHbgdRQMhPeB6RY8X5PwyOlXq72h7tkdEam9 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk new file mode 100644 index 00000000..9708b14c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgVXcZ4NAEWy62iBMw +8ECM4jK3k4Vi8evUvDgWmKgsA1mhRANCAASjjlOlw3aD74R2e3vsiPeDRteGfGo7 +4Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobeh5+R53alJQE8 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..ec8da49b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIQCk2AHIw5PFgn0G8QvDZN6TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASjjlOlw3aD +74R2e3vsiPeDRteGfGo74Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobe +h5+R53alJQE8o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCduiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjO +PQQDAgNIADBFAiEAgYeVEacqESp4PiS3JT5zFzn5Bjlsa1iVCghtbBcK4TUCIBMe +Frc355l4WLYAP1PDOVIyaDCuWVEjiAHJYc7Hptkb +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..da90925b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOjCCAeGgAwIBAgIQaUnVYwmRmHoHYo5/x+pKwTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcxLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvsHIKgtVnnido7xhsy4SWFihxNPK +5wINUlX9+u6EgKB20fOolTkJNcwfwtMYx5J6ckhJblaMMKcb/4LQhgNbdqNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcPB2Te +Zbyays5dKX0AMAoGCCqGSM49BAMCA0cAMEQCIC4YrdIwmCDEYoxUwVt9Pwl2mbXX +v1wQzfYpIhw6XXnqAiAX7NDLq1bru/qdH2qjfprPDsK5ZFhy0A1TF4XoyrbRzQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..f193bd00 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWHXvGiFp0wG8+MQj +5fssH8o5G46+0BdS5imUzq/hc5mhRANCAAS+wcgqC1WeeJ2jvGGzLhJYWKHE08rn +Ag1SVf367oSAoHbR86iVOQk1zB/C0xjHknpySEluVowwpxv/gtCGA1t2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk new file mode 100644 index 00000000..f458a2e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsN2FAVzvfC70M0m4 +wHJYcImLI/5h5N7yzAkN7Lq7fQChRANCAASzOavl2GiHVuVLPw5P7oC0vaQvdUoD +vLSCiGujtCPxAHqVBrewEgOAKRqSqmL0GjSA6MxB+Z+PHNr+KroL2o28 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk new file mode 100644 index 00000000..840a1058 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg4NCDjNODS5nSNONy +5E/YpMtSLBBKrx0EddttAxcMFS+hRANCAARXx8ir3hfKkOOiGdz12mvdb3qkqGnG +1cOBD48aP7/hYldtpXla1T21/5kVYROFQjdxM6tZqfgTkEj5+5jFfidt +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..dcebf264 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..6424baa0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZjCCAg2gAwIBAgIQM8Vg1bLDpyxAd6BIOqYohzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENY9m240hcekeVHNB+CQHuVztqXBt +p3yJM91bGFnopaIgGo9Cel9Tq6s2WNXldArb35RrbtVauf1qP9Nv9c2gV6OBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgNK0vHlCcN7f1NCfM4EnijyxaTWFp +wjKueZOmXuOtVfIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMi5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDRwAwRAIgd0GROzWACQdQSNqG/pIHC2eycm/KgDvj +sxCxe2VU3h4CIHQQBFlg1sXUwyqIw3i8tQPKBN+sTcMiuOcCi1VarXbt +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..c2bccb2b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtUWon1YB6QpLXR2z +XBIVoDp/r2x14gyQw99hUC7jgp+hRANCAAQ1j2bbjSFx6R5Uc0H4JAe5XO2pcG2n +fIkz3VsYWeiloiAaj0J6X1OrqzZY1eV0CtvflGtu1Vq5/Wo/02/1zaBX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk new file mode 100644 index 00000000..3e9960ce --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1/n4dcnvNycd2+vy +ANhb6QG9EdA+f5puR+M8c1Amd3OhRANCAARp2NN0WH/l3sCfzTEMOuGvmCZKzD/t +GIOsNJMeaAarsdk3FhjlFSYZ+j69Ij7LsxRsiCqCtmJqM/bP7ju0lP6F +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..4f5dc5a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..8d1105c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAIjb8IdfJz1e5H52KVzOpVQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOD0uahM0Ax+pirE9CeaG6yANVjt +LCV6SDSbNkw//hX8o1EWwPSZCE79YRRNEGN+bQ1nR6TEMAkVL0VicT4NUeqjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1h +acIyrnmTpl7jrVXyMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIAJMMT6R0t2EKylcnKe9O40ZOgjipmBj +CIzPUP7MMd9mAiBWDMzScRQ77PjugAqXg6rvCxqKhNUqxd3r45khtE4EBg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..bafcfd1e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghgLrYgTaqSf3Ih6I +FJoVLGpsqaxaU6b+tDgBnnAEk6KhRANCAATg9LmoTNAMfqYqxPQnmhusgDVY7Swl +ekg0mzZMP/4V/KNRFsD0mQhO/WEUTRBjfm0NZ0ekxDAJFS9FYnE+DVHq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk new file mode 100644 index 00000000..fdfa0e06 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgthZDJnqPCOsQg4KG +dhx43GwuER7lKHu14yJ8vu33FIOhRANCAAQsKCE1EV0joZez7XCfunpXKhcy1D5j +529UDkguyteOWUqlnY48C6KkcnwOqpelW7uARvknStetMuafR/qKZNIA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk new file mode 100644 index 00000000..8fc6e018 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgETCyE8tH/4+tFzqM +YNYMpYluwFFttidE7Ryx1VHDxzahRANCAAQWt9+MdW1ruN7ScmOfWSBnWnu2vV5h +rDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuREyIHuT5XoWWeF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..f7f34fee --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt new file mode 100644 index 00000000..8cbded46 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRALNK6TSEn8rEQXsqcPz+DG0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGBB9Slwt7N5Ww9jRe2UIxP7lMwq +Vla6hz0MVKtA0Ojgk/c/rTypjtKOqqfd4908bbiNB9vUeT+Qu+XQu9h5E0GjbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCA0rS8eUJw3t/U0J8zgSeKPLFpNYWnC +Mq55k6Ze461V8jAKBggqhkjOPQQDAgNIADBFAiEAizmCbZffW8z2c0vtPlcQikTy +A4Ush951ya6GZ4FS8hECIHxGFjleS8Xb1Nd5LQJT9jUMNKbrIefKajpvTY9uySBE +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key new file mode 100644 index 00000000..c78724a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgraF5AKtD/k4mHbnK +QnUKlgIqLvmp2eB0I90cfcjc48ehRANCAARgQfUpcLezeVsPY0XtlCMT+5TMKlZW +uoc9DFSrQNDo4JP3P608qY7Sjqqn3ePdPG24jQfb1Hk/kLvl0LvYeRNB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk new file mode 100644 index 00000000..55e08e27 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvVw7t+gUM+o+26i6 +rF6eb6RM5J/qBacbThGKQw+weCyhRANCAAQ0kd7LKlXrHRpBbENUyb/15Z3cdPll +aSdHXmnFzJOmK6+9OiR5TW5CE1banrUGbZ1ulDsO9AxcDZ9fDJ2WkGHl +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..f5285063 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAODOluu3YjbZu72m/PLLiaowCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENJHeyypV +6x0aQWxDVMm/9eWd3HT5ZWknR15pxcyTpiuvvTokeU1uQhNW2p61Bm2dbpQ7DvQM +XA2fXwydlpBh5aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZI +zj0EAwIDSAAwRQIhAOSd1zxQIxaQwnPzqHuOPPBiUwi5yhAx4DuKvmKDCnJOAiAM +erTwrKFaE4uoJFKIjeG77DqG8SIhaq/C65Jbp0t5Qg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..dfafedee --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQQ6fSQbyG5UApGiz4kNwY7jAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEJkd+OQUuDymCGvc9fnUGdY09IdmL +q/Ep/AsS0cD3jB/3jReHkzr0TWya0z4K0EzSi0jnCHCtWEYw1CJdsiA7kKNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1hacIy +rnmTpl7jrVXyMAoGCCqGSM49BAMCA0gAMEUCIQCKTue/ffx647l0pBHOMFBvER/e +nMjtmoCBmhZAcS0jjAIgEu1ujbYZVr51A80uvt2P2bjNnKf+S99jiNxId8hO7jc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..a7828eb1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmZf8ohzyrlzEUO9H +3i/Yfn7ys9+N+M2CHbcLHiMMruShRANCAAQmR345BS4PKYIa9z1+dQZ1jT0h2Yur +8Sn8CxLRwPeMH/eNF4eTOvRNbJrTPgrQTNKLSOcIcK1YRjDUIl2yIDuQ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk new file mode 100644 index 00000000..4b460799 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqwmpPvUDiOL62Bmo +68+QDgqipuolZa/AMhVHhF717WqhRANCAAT4r/XB7lS5FTk66IZfURkPoIodoke9 +uabulh9dUTC4MYHDm6zDghLeZN4nlnu1ZevH1J3VubwqRM9GzKZiesg/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk new file mode 100644 index 00000000..ecee703f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghkNqow5JLXSbeDeQ +lRCmzcGLSZQZBKrx7v9FVx25OYehRANCAATCOSYS446QZsFg6pDXm4To3Bkuagh+ +4Ct1GdF0emcYBdHfzy1azLA5Vg91j2cMSlAfJkOZkBq85j18+MrkOOIY +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk new file mode 100644 index 00000000..a15ec962 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgn+L3iS4Rth+xOcGF +iNvPbf85PQeniZBZOtcJqOWbdbuhRANCAARLWcEhH+7KxzFeK3ZhgaFG7kprhkT6 +1djvz8ahXo2pmGgqJRUT8ApRsON/qYqbKBKiSd3IbOSKAMwgkGGpwDCa +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk new file mode 100644 index 00000000..82f970b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbNzuM3DxKH1Jw5pl +ahYpbNN82fwfPrFqCCxBjiu9v9ihRANCAAS55b42HQCpBeT7llOqOyz49wBKo56g +BForbLK4UoXUjSxKI3SUxYr+o/s92jwQA663ybpOv53Sqt/wuzHTULuE +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk new file mode 100644 index 00000000..d59485ac --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgMCD31/c0/DmpD/D1 +LoHBu20f5+aFyase6HOw5qDvzeWhRANCAAQsX1cU5gSsKVUSIvE9OcILF0kS9c1A +aXxGXXm2TWQ3Xy9lEgrP4lwqx4jrI6chSWCiek8G+Vt3Wmr4KBFFkjDU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk new file mode 100644 index 00000000..e05d7e38 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGpXiTLDYWSb3WFVD ++C7qcLIU+7W//zM/2D7bq842BUWhRANCAARSleBGqLKUcT93WNRQ89ghyJ5Yex5y +jh4NyVtpvJ4avCWwvnDvPo5U4nOv7QS8acoxa8Y8dZlkkXZC16Qr/lXZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-dev.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-dev.yaml new file mode 100644 index 00000000..28add973 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-dev.yaml @@ -0,0 +1,93 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 in dev mode, including +# It will map the $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric on peer0 +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + command: /go/src/github.com/hyperledger/fabric/peer/peer node start + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..281b4f1b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,80 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 MVE, including +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== 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 +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== 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 +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== 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 +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.9/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.9/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.9/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.9/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.9/kafka/README.md b/hyperledger_fabric/v1.4.9/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.9/kafka/configtx.yaml b/hyperledger_fabric/v1.4.9/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.9/network_config.json b/hyperledger_fabric/v1.4.9/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/orderer.yaml b/hyperledger_fabric/v1.4.9/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.9/org3/configtx.yaml b/hyperledger_fabric/v1.4.9/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.9/peer.yaml b/hyperledger_fabric/v1.4.9/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.9/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.9/prometheus.yml b/hyperledger_fabric/v1.4.9/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.9/raft/README.md b/hyperledger_fabric/v1.4.9/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..99e540df --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 00000000..599d1898 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org1MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSP.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSP.json new file mode 100644 index 00000000..03df0409 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSPanchors.tx new file mode 100644 index 00000000..6e5a13ae Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org2MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org3MSP.json new file mode 100644 index 00000000..a2cf989d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/Org3MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx new file mode 100644 index 00000000..07d01717 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..01a37527 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:21Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 00000000..4f371645 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..04184ffc --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1121 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + } + ] + }, + "header": { + "data_hash": "Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..b79e509b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,406 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.header.data_hash=Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 00000000..04a0ff98 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..850c04a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,1001 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "hDJ/scu755b54jyq6CIdzZ35KKMCObej" + } + } + }, + "signature": "MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "p68iU66vG/phSoOh3ydEWjaoBE/cBjSf" + } + } + }, + "signature": "MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo=" + } + ] + }, + "header": { + "data_hash": "1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI=", + "number": "1", + "previous_hash": "16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json-flat.json new file mode 100644 index 00000000..a5e95e4b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_1.block.json-flat.json @@ -0,0 +1,371 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=2 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=hDJ/scu755b54jyq6CIdzZ35KKMCObej +.data.data[0].payload.data.last_update.signature=MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=p68iU66vG/phSoOh3ydEWjaoBE/cBjSf +.data.data[0].signature=MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo= +.header.data_hash=1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI= +.header.number=1 +.header.previous_hash=16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4= +.metadata.metadata[0]=ChEKAggBEgsKCQoDAQIDEAQYBRKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYw3KdN1sbAR6CcXPJYquSGOlxqHlu2t0OEkcwRQIhAIab/MHoKZajjXq7p2k0tWxm75qX8IQif1VtenglxQhLAiAZKJ7ixTsQNVXojurfO85aHv0mwRztfiUocQBArFjpMw== +.metadata.metadata[1]=CgIIAQ== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 00000000..2045438b Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..6be3462b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "kFOVz5FZvogl20t72ocyORBGQHni3kix" + } + } + }, + "signature": "MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ" + } + } + }, + "signature": "MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg==" + } + ] + }, + "header": { + "data_hash": "bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw=", + "number": "2", + "previous_hash": "SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..92cf061e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=kFOVz5FZvogl20t72ocyORBGQHni3kix +.data.data[0].payload.data.last_update.signature=MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ +.data.data[0].signature=MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg== +.header.data_hash=bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw= +.header.number=2 +.header.previous_hash=SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBhKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIY8YFMcL07zQwANaxdXnoXtaJpkzrnpvIqEkcwRQIhANCdT1Q4Qvky9wDvef7W+LxkE7tAiwcEErs86bvG7VnXAiBkdCX7JpPeN6YQlaIBNlIxZSDL20/aCkkTkafyB65Hfg== +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 00000000..a6995f2c Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..fc1fd392 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,156 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.5" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2020-02-21T19:54:51.036078300Z", + "tls_cert_hash": null, + "tx_id": "55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + } + } + }, + "signature": "MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA==" + } + ] + }, + "header": { + "data_hash": "UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q=", + "number": "3", + "previous_hash": "HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..ae9caa49 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.5 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:51.036078300Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].signature=MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA== +.header.data_hash=UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q= +.header.number=3 +.header.previous_hash=HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 00000000..72a2a531 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..cbf338b6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:40.211279700Z", + "tls_cert_hash": null, + "tx_id": "e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + } + } + }, + "signature": "MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ==" + } + ] + }, + "header": { + "data_hash": "wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8=", + "number": "4", + "previous_hash": "356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYCBKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYwP+M8/OLtdpPQJU2WDty964KX3BQa4G+EkcwRQIhAJ3uGzG2NUYnYqHCBjx3cA25AYPvmjOoieLbUZhvlKi1AiBSz8Y7YxalUxuJ4QKF+aWaA79f7+IcqBEEsoOLDSTtSg==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..f5497500 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:40.211279700Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].signature=MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ== +.header.data_hash=wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8= +.header.number=4 +.header.previous_hash=356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYCBKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYwP+M8/OLtdpPQJU2WDty964KX3BQa4G+EkcwRQIhAJ3uGzG2NUYnYqHCBjx3cA25AYPvmjOoieLbUZhvlKi1AiBSz8Y7YxalUxuJ4QKF+aWaA79f7+IcqBEEsoOLDSTtSg== +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 00000000..a79b23a9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..65f16ac4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "4", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "4", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:42.815066800Z", + "tls_cert_hash": null, + "tx_id": "12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + } + } + }, + "signature": "MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ=" + } + ] + }, + "header": { + "data_hash": "ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk=", + "number": "5", + "previous_hash": "XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYCRKVBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIY6KvQvM78ELqgmDXTwWTz4HREXRRdqkzGEkYwRAIgTzqHWUku0+f+pQUU90X5fQc+AOV9i6dSvdsOaeV/XdwCIDnNxg44hPiHx3bbqHmUbRMBh5IfDvuFW5PLH8pyvJsz", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json-flat.json new file mode 100644 index 00000000..d8b573eb --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_5.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org2MSP +.data.data[0].payload.data.actions[0].header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'80') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'220') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:42.815066800Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.header.signature_header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].signature=MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ= +.header.data_hash=ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk= +.header.number=5 +.header.previous_hash=XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAk= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 00000000..59faf375 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json new file mode 100644 index 00000000..f1fa8bbf --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json @@ -0,0 +1,1376 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx" + } + }, + { + "signature": "MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/" + } + }, + { + "signature": "MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI" + } + } + }, + "signature": "MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE" + } + } + }, + "signature": "MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ==" + } + ] + }, + "header": { + "data_hash": "cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA=", + "number": "6", + "previous_hash": "SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIBg==", + "", + "CgkKAwECAxAEGAo=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json-flat.json new file mode 100644 index 00000000..bd0ee4c4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_6.block.json-flat.json @@ -0,0 +1,504 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy\nfA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E\nAwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=4 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature=MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY= +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.nonce=HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/ +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature=MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ== +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.nonce=6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI +.data.data[0].payload.data.last_update.signature=MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE +.data.data[0].signature=MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ== +.header.data_hash=cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA= +.header.number=6 +.header.previous_hash=SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY= +.metadata.metadata[0]=ChEKAggGEgsKCQoDAQIDEAQYChKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYHYyYM/uW1Px0jGKVGIQ++yZjB3qsD3l0EkcwRQIhAICwFvxjwqc9T5oEKWqYsqCnKH36tBxMwt7TAi/qkIbaAiBYQTIv4xLttZry7fx0JOQ5AXJO4LRVteGO7EK0nSrcdw== +.metadata.metadata[1]=CgIIBg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAo= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block new file mode 100644 index 00000000..59faf375 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json new file mode 100644 index 00000000..f04cdef9 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD5SK1MXNb9/2jx8lZYg1orf3KD7OaagaWD16bhhTSpfAIgM/oT0h127vSJi+5JFVLGoBTVyPm2w4i7EKHOt23Ff90=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "zghSH8U7Tz7Hr1dqBDfs2uHdtzuIi1Ba" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-10-14T19:01:07Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "mKBdYc8f9bOcjC/idedYsCE3K8SgF+AS" + } + } + }, + "signature": "MEUCIQCReojJDCfKgUGlvmdVEuc/5cAW0jvpVrARVYbWLcB6ngIgdlj3K9r2v+Lo1f1i8eZXhNTZtiS3Bt0NHFnaGZfv2XQ=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-10-14T19:01:07Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "DrTNsVh2P1RNNj/xbZTtvO/74IPgdNc6" + } + } + }, + "signature": "MEUCIQCszGXzdKPSJ3qjYMGkorl0FcyIg9jpX7V7Q8LEMFE8/gIgSX7wI32G/Epc1JAwW60TGSyQD/gc4ZC3439LV76EyOk=" + } + ] + }, + "header": { + "data_hash": "7nadLaNYnZSbJmphHw52ms6KOCYa5EkNmWdm7L5gvDE=", + "number": "2", + "previous_hash": "YerfMM6HjEVrUgIhmGW3KKM7tWGeMNAcnAqfCxDUOnw=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json-flat.json new file mode 100644 index 00000000..bc5c60c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/businesschannel_config.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD5SK1MXNb9/2jx8lZYg1orf3KD7OaagaWD16bhhTSpfAIgM/oT0h127vSJi+5JFVLGoBTVyPm2w4i7EKHOt23Ff90= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=zghSH8U7Tz7Hr1dqBDfs2uHdtzuIi1Ba +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-10-14T19:01:07Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=mKBdYc8f9bOcjC/idedYsCE3K8SgF+AS +.data.data[0].payload.data.last_update.signature=MEUCIQCReojJDCfKgUGlvmdVEuc/5cAW0jvpVrARVYbWLcB6ngIgdlj3K9r2v+Lo1f1i8eZXhNTZtiS3Bt0NHFnaGZfv2XQ= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-10-14T19:01:07Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=DrTNsVh2P1RNNj/xbZTtvO/74IPgdNc6 +.data.data[0].signature=MEUCIQCszGXzdKPSJ3qjYMGkorl0FcyIg9jpX7V7Q8LEMFE8/gIgSX7wI32G/Epc1JAwW60TGSyQD/gc4ZC3439LV76EyOk= +.header.data_hash=7nadLaNYnZSbJmphHw52ms6KOCYa5EkNmWdm7L5gvDE= +.header.number=2 +.header.previous_hash=YerfMM6HjEVrUgIhmGW3KKM7tWGeMNAcnAqfCxDUOnw= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.json new file mode 100644 index 00000000..853818c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.json @@ -0,0 +1,308 @@ +{ + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.pb new file mode 100644 index 00000000..c1150ecf Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta.pb differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..6cc35977 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,320 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 00000000..4cd5d3d0 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/config_delta_env.pb differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block new file mode 100644 index 00000000..30ea50df Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json new file mode 100644 index 00000000..fd693197 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json new file mode 100644 index 00000000..959f6799 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=100 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.json new file mode 100644 index 00000000..093b45f4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer0.genesis.block_updated.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer1.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/orderer2.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..fae25ef9 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.json @@ -0,0 +1,794 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.pb new file mode 100644 index 00000000..05745722 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/original_config.pb differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_0.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 00000000..f7e3be6b Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..a827afaf --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1145 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh" + } + } + }, + "signature": "MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g==" + } + ] + }, + "header": { + "data_hash": "7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k=", + "number": "1", + "previous_hash": "SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY=" + }, + "metadata": { + "metadata": [ + "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", + "", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json-flat.json new file mode 100644 index 00000000..254f270e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_1.block.json-flat.json @@ -0,0 +1,418 @@ +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.version=0 +.data.data[0].payload.data.payload.data.config.sequence=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.data.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.data.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.header.channel_header.type=1 +.data.data[0].payload.data.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.data.payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].payload.data.signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=4 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh +.data.data[0].signature=MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g== +.header.data_hash=7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k= +.header.number=1 +.header.previous_hash=SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY= +.metadata.metadata[0]=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 +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block differ diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json-flat.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/testchainid_config.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.json new file mode 100644 index 00000000..885fa650 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.json @@ -0,0 +1,964 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWakNDQWYyZ0F3SUJBZ0lRZlBEM0s4VmxtSHRrTVdNUHZVZmdHekFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTAKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN6TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN6TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVRK2hhY1FiTVM3QnkrM1lwcHh4dFZZSlJHMElyOW5keDFVT3hZclZDWEhBbVE1aFg0UHlhUFMySQpTNG5Fa0o1aEUvVitzd1F6aXVQcWtVMXRURmhUejZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQ0NJelRXWVNFb0EzbTlDdERwSDVqRzlhazltMjV2cmp4YWtGSHg0dXFLb2pBS0JnZ3Foa2pPUFFRRApBZ05IQURCRUFpQUwzQ2hWNmZWb25vN21sYys1d3hpSW51V1J1ZTk0aTlOWHAzb3lSTll0T1FJZ01nSnRZdndlClRMY29ubS9IWnIzallMQ0ZjTFpKYy9xUXZRMnZqdmh3RTFRPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.pb new file mode 100644 index 00000000..eab368d0 Binary files /dev/null and b/hyperledger_fabric/v1.4.9/raft/channel-artifacts/updated_config.pb differ diff --git a/hyperledger_fabric/v1.4.9/raft/configtx.yaml b/hyperledger_fabric/v1.4.9/raft/configtx.yaml new file mode 100644 index 00000000..f2f5279a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/configtx.yaml @@ -0,0 +1,795 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_3: true + V1_4_2: false + V1_3: false + V1_1: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7055 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.9/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.9/raft/logs/dev_all.log new file mode 100644 index 00000000..990abb94 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/logs/dev_all.log @@ -0,0 +1,97526 @@ +Attaching to peer0.org1.example.com, peer1.org1.example.com, peer0.org2.example.com, peer1.org2.example.com, orderer0.example.com, orderer2.example.com, orderer1.example.com, fabric-cli +orderer0.example.com | 2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2020-10-14 19:00:47.366 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2020-10-14 19:00:47.366 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for general +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for general.BCCSP.PKCS11 +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.BCCSP.PKCS11.Library setting to +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for general.BCCSP.PKCS11.Label setting to +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for general.BCCSP.PKCS11.Pin setting to +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for general.BCCSP.PKCS11.Hash setting to +orderer0.example.com | 2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for general.BCCSP.PKCS11.Security setting to +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 020 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.SystemChannel setting to +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02f Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ListenPort setting to string 7055 +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for general.Cluster.ReplicationRetryTimeout setting to +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[string]interface{} value for general.TLS +orderer0.example.com | 2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.TLS.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.Authentication.NoExpirationChecks setting to +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for general.Profile +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for general.LedgerType setting to string file +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07f Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.TLS.ClientAuthRequired setting to +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a9 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0aa Found real value for kafka.TLS.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0ab Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0ac Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0ad Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for kafka.Version setting to +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found map[interface{}]interface{} value for debug +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found map[interface{}]interface{} value for operations +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c9 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0ca Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0cb Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0cc Found real value for operations.TLS.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0cd Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0ce Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0cf Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d0 Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d2 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d3 Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d7 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d8 Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d9 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0da Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0db Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0dc Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2020-10-14 19:00:47.386 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0dd map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt] TLSHandshakeTimeShift:]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs: TLSHandshakeTimeShift:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs: TLSHandshakeTimeShift:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2020-10-14 19:00:47.387 UTC [localconfig] completeInitialization -> INFO 0de Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2020-10-14 19:00:47.416 UTC [bccsp_sw] openKeyStore -> DEBU 0df KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +orderer0.example.com | "2020-10-14 19:00:47.416 UTC [bccsp] initBCCSP -> DEBU 0e0 Initialize BCCSP [SW]" +orderer0.example.com | "2020-10-14 19:00:47.416 UTC [msp] getPemMaterialFromDir -> DEBU 0e1 Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2020-10-14 19:00:47.421 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2020-10-14 19:00:47.434 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2020-10-14 19:00:47.441 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2020-10-14 19:00:47.454 UTC [msp] getPemMaterialFromDir -> DEBU 0e5 Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2020-10-14 19:00:47.460 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2020-10-14 19:00:47.461 UTC [msp] getMspConfig -> DEBU 0e7 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2020-10-14 19:00:47.462 UTC [msp] getPemMaterialFromDir -> DEBU 0e8 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2020-10-14 19:00:47.468 UTC [msp] getPemMaterialFromDir -> DEBU 0e9 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2020-10-14 19:00:47.478 UTC [msp] getPemMaterialFromDir -> DEBU 0ea Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2020-10-14 19:00:47.479 UTC [msp] getMspConfig -> DEBU 0eb TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2020-10-14 19:00:47.480 UTC [msp] getPemMaterialFromDir -> DEBU 0ec Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2020-10-14 19:00:47.481 UTC [msp] getMspConfig -> DEBU 0ed crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2020-10-14 19:00:47.486 UTC [msp] getMspConfig -> DEBU 0ee Loading NodeOUs" +orderer0.example.com | "2020-10-14 19:00:47.501 UTC [msp] newBccspMsp -> DEBU 0ef Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.501 UTC [msp] New -> DEBU 0f0 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.502 UTC [msp] loadLocaMSP -> DEBU 0f1 Created new local MSP" +orderer0.example.com | "2020-10-14 19:00:47.502 UTC [msp] Setup -> DEBU 0f2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:47.504 UTC [msp.identity] newIdentity -> DEBU 0f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.505 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.534 UTC [bccsp_sw] loadPrivateKey -> DEBU 0f5 Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +orderer0.example.com | "2020-10-14 19:00:47.542 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.551 UTC [msp] setupSigningIdentity -> DEBU 0f7 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-10-14 19:00:47.555 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f8 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.TLS.TLSHandshakeTimeShift = 0s +orderer0.example.com | General.Cluster.ListenAddress = "0.0.0.0" +orderer0.example.com | General.Cluster.ListenPort = 7055 +orderer0.example.com | General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | General.Authentication.NoExpirationChecks = false +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.TLS.TLSHandshakeTimeShift = 0s +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Operations.TLS.TLSHandshakeTimeShift = 0s +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2020-10-14 19:00:47.563 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:47.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fb Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fe Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] NewStandardValues -> DEBU 0ff Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 100 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 102 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 104 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 105 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.565 UTC [common.channelconfig] NewStandardValues -> DEBU 106 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:47.565 UTC [common.channelconfig] initializeProtosStruct -> DEBU 107 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:47.565 UTC [common.channelconfig] NewStandardValues -> DEBU 108 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.566 UTC [common.channelconfig] initializeProtosStruct -> DEBU 109 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.566 UTC [common.channelconfig] validateMSP -> DEBU 10a Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.566 UTC [msp] newBccspMsp -> DEBU 10b Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.566 UTC [msp] New -> DEBU 10c Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.566 UTC [msp] Setup -> DEBU 10d Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:47.567 UTC [msp.identity] newIdentity -> DEBU 10e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.568 UTC [common.channelconfig] NewStandardValues -> DEBU 10f Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 110 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [common.channelconfig] NewStandardValues -> DEBU 111 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 112 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [common.channelconfig] validateMSP -> DEBU 113 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [msp] newBccspMsp -> DEBU 114 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.569 UTC [msp] New -> DEBU 115 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.570 UTC [msp] Setup -> DEBU 116 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.570 UTC [msp.identity] newIdentity -> DEBU 117 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.571 UTC [common.channelconfig] NewStandardValues -> DEBU 118 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 119 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.571 UTC [common.channelconfig] validateMSP -> DEBU 11a Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.571 UTC [msp] newBccspMsp -> DEBU 11b Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.572 UTC [msp] New -> DEBU 11c Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.572 UTC [msp] Setup -> DEBU 11d Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.572 UTC [msp.identity] newIdentity -> DEBU 11e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.573 UTC [msp] Setup -> DEBU 11f Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:47.574 UTC [msp] Setup -> DEBU 120 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 130 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] GetPolicy -> DEBU 131 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 132 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 133 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] GetPolicy -> DEBU 134 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 135 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.581 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:47.581 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer1.example.com | 2020-10-14 19:00:47.429 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2020-10-14 19:00:47.542 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer0.example.com | "2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:00:47.588 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:47.589 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.589 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 157 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 158 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.594 UTC [common.configtx] addToMap -> DEBU 159 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.594 UTC [common.configtx] addToMap -> DEBU 15a Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:00:47.595 UTC [common.configtx] addToMap -> DEBU 15b Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:47.595 UTC [common.configtx] addToMap -> DEBU 15c Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:47.598 UTC [orderer.common.server] createLedgerFactory -> DEBU 15d Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2020-10-14 19:00:47.598 UTC [kvledger.util] CreateDirIfMissing -> DEBU 15e CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2020-10-14 19:00:47.598 UTC [kvledger.util] logDirStatus -> DEBU 15f Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2020-10-14 19:00:47.601 UTC [kvledger.util] logDirStatus -> DEBU 160 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2020-10-14 19:00:47.723 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 161 Bootstrapping because no existing channels" +orderer0.example.com | "2020-10-14 19:00:47.723 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 162 Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2020-10-14 19:00:47.777 UTC [orderer.common.server] initializeServerConfig -> INFO 163 Starting orderer with TLS enabled" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 169 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 16a Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [common.channelconfig] validateMSP -> DEBU 16e Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [msp] newBccspMsp -> DEBU 16f Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [msp] New -> DEBU 170 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [msp] Setup -> DEBU 171 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.778 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [common.channelconfig] NewStandardValues -> DEBU 173 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [common.channelconfig] validateMSP -> DEBU 175 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [msp] newBccspMsp -> DEBU 176 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [msp] New -> DEBU 177 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [msp] Setup -> DEBU 178 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.779 UTC [msp.identity] newIdentity -> DEBU 179 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 17a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17b Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17d Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 180 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 181 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 182 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.780 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.781 UTC [msp] Setup -> DEBU 188 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:47.792 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.807 UTC [msp] Setup -> DEBU 18a Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [msp] Setup -> DEBU 18b MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.812 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [policies] GetPolicy -> DEBU 19c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [policies] GetPolicy -> DEBU 19f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ca Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1ce Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1d0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.820 UTC [common.channelconfig] validateMSP -> DEBU 1d2 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.820 UTC [msp] newBccspMsp -> DEBU 1d3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.820 UTC [msp] New -> DEBU 1d4 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.823 UTC [msp] Setup -> DEBU 1d5 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.824 UTC [msp.identity] newIdentity -> DEBU 1d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.825 UTC [common.channelconfig] NewStandardValues -> DEBU 1d7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.825 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.825 UTC [common.channelconfig] validateMSP -> DEBU 1d9 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.825 UTC [msp] newBccspMsp -> DEBU 1da Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.826 UTC [msp] New -> DEBU 1db Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.826 UTC [msp] Setup -> DEBU 1dc Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.826 UTC [msp.identity] newIdentity -> DEBU 1dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.828 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:47.828 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] NewStandardValues -> DEBU 1e7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.831 UTC [common.channelconfig] validateMSP -> DEBU 1e9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.831 UTC [msp] newBccspMsp -> DEBU 1ea Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.831 UTC [msp] New -> DEBU 1eb Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.831 UTC [msp] Setup -> DEBU 1ec Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:47.832 UTC [msp.identity] newIdentity -> DEBU 1ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.834 UTC [msp] Setup -> DEBU 1ee Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [msp] Setup -> DEBU 1ef MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] GetPolicy -> DEBU 200 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] GetPolicy -> DEBU 203 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:47.838 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org2.example.com | [001 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org2.example.com | [002 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [003 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org2.example.com | [004 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org2.example.com | [005 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [006 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org2.example.com | [007 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org2.example.com | [008 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org2.example.com | [009 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org2.example.com | [00a 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org2.example.com | [00b 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org2.example.com | [00c 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org2.example.com | [00d 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.TLS.TLSHandshakeTimeShift = 0s +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | General.Authentication.NoExpirationChecks = false +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +peer1.org1.example.com | [001 10-14 19:00:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org1.example.com | [002 10-14 19:00:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [003 10-14 19:00:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org1.example.com | [004 10-14 19:00:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org1.example.com | [005 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [006 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org1.example.com | [007 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org1.example.com | [008 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org1.example.com | [009 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org1.example.com | [00a 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org1.example.com | [00b 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org1.example.com | [00c 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org1.example.com | [00d 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org1.example.com | [00e 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [00f 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org1.example.com | [010 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [011 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org1.example.com | [012 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [013 10-14 19:00:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org1.example.com | [014 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [015 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | [001 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org2.example.com | [002 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org2.example.com | [003 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [004 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org2.example.com | [005 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [006 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org2.example.com | [007 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [008 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org2.example.com | [009 10-14 19:00:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00a 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org2.example.com | [00b 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org2.example.com | [00c 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00d 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org2.example.com | [00e 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [00f 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org2.example.com | [010 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [011 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org2.example.com | [012 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org2.example.com | [013 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org2.example.com | [014 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org2.example.com | [015 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org2.example.com | [016 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org2.example.com | [017 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org2.example.com | [018 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org2.example.com | [019 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org2.example.com | [01a 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org2.example.com | [01b 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org2.example.com | [01c 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org2.example.com | [01d 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org2.example.com | [01e 10-14 19:00:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org2.example.com-cert.pem +peer1.org2.example.com | [01f 10-14 19:00:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org2.example.com | [020 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer1.org2.example.com | [021 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org2.example.com | [022 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org2.example.com | [023 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org2.example.com | [024 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org2.example.com | [025 10-14 19:00:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer1.org2.example.com | [026 10-14 19:00:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org2.example.com | [027 10-14 19:00:49.65 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org2.example.com | [028 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org2.example.com | [029 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org2.example.com | [02a 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org2.example.com | [02b 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [02c 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [02d 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org2.example.com | [02e 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [02f 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [030 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [031 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea] at [/etc/hyperledger/fabric/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk]... +peer1.org2.example.com | [032 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [033 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer1.org2.example.com | [034 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org2.example.com | Version: 1.4.9 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.13.15 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.21 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger +peer1.org2.example.com | [035 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [036 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [037 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [038 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org2.example.com | [039 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org2.example.com | [03a 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org2.example.com | [03b 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org2.example.com | [03c 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org2.example.com | [03d 10-14 19:00:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org2.example.com | [03e 10-14 19:00:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org1.example.com | [001 10-14 19:00:49.87 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | [002 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [003 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org1.example.com | [004 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org1.example.com | [005 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org1.example.com | [006 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org1.example.com | [007 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org1.example.com | [008 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org1.example.com | [009 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org1.example.com | [00a 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [00b 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org1.example.com | [00c 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org1.example.com | [00d 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [00e 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org1.example.com | [00f 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [010 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org1.example.com | [011 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org1.example.com | [012 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [013 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org1.example.com | [014 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [015 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org1.example.com | [016 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [017 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org1.example.com | [018 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [019 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org1.example.com | [01a 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org1.example.com | [01b 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer0.org1.example.com | [01c 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org1.example.com | [01d 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org1.example.com | [01e 10-14 19:00:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +peer0.org1.example.com | [01f 10-14 19:00:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org1.example.com | [020 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer0.org1.example.com | [021 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org1.example.com | [022 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org1.example.com | [023 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org1.example.com | [024 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org1.example.com | [025 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer0.org1.example.com | [026 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | [027 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | [028 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | [029 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | [02a 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | [02b 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [02c 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [02d 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org1.example.com | [02e 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [02f 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [03f 10-14 19:00:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org2.example.com | [040 10-14 19:00:49.73 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org2.example.com | [041 10-14 19:00:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org2.example.com | [042 10-14 19:00:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org2.example.com | [043 10-14 19:00:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org2.example.com | [044 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org2.example.com | [045 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org2.example.com | [046 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org2.example.com | [047 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org2.example.com | [048 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org2.example.com | [049 10-14 19:00:49.84 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org2.example.com | [04a 10-14 19:00:49.84 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org2.example.com | [04b 10-14 19:00:49.84 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org2.example.com | [04c 10-14 19:00:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org2.example.com | [04d 10-14 19:00:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org2.example.com | [04e 10-14 19:00:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org2.example.com | [04f 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org2.example.com | [050 10-14 19:00:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org2.example.com | [051 10-14 19:00:50.05 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org2.example.com | [052 10-14 19:00:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org2.example.com | [053 10-14 19:00:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org2.example.com | [054 10-14 19:00:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org2.example.com | [055 10-14 19:00:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org2.example.com | [056 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | [057 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org2.example.com | [058 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org2.example.com | [059 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer1.org2.example.com | [05a 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [05b 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer1.org2.example.com | [05c 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [05d 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org2.example.com | [05e 10-14 19:00:50.19 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com +peer1.org2.example.com | [05f 10-14 19:00:50.19 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 +peer1.org2.example.com | [060 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.9 +peer1.org2.example.com | [061 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org2.example.com | [062 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.9 +peer1.org2.example.com | [063 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org2.example.com | [064 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.9 +peer1.org2.example.com | [065 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org2.example.com | [066 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org2.example.com | [067 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org2.example.com | [068 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [069 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org2.example.com | [06a 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org2.example.com | [06b 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org2.example.com | [06c 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org2.example.com | [06d 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org2.example.com | [06e 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [06f 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org2.example.com | [070 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [071 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org2.example.com | [072 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org2.example.com | [073 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org2.example.com | [074 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [075 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org2.example.com | [076 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org2.example.com | [077 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org2.example.com | [078 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | [079 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org2.example.com | [07a 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org2.example.com | [07b 10-14 19:00:50.24 UTC] [%{longpkg}] %{callpath} -> INFO The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer1.org2.example.com | [07c 10-14 19:00:50.24 UTC] [%{longpkg}] %{callpath} -> INFO The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer1.org2.example.com | [07d 10-14 19:00:50.25 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051] +peer1.org2.example.com | [07e 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [07f 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [030 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [031 10-14 19:00:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +peer0.org1.example.com | [032 10-14 19:00:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [033 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer0.org1.example.com | [034 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org1.example.com | Version: 1.4.9 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.13.15 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.21 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger +peer0.org1.example.com | [035 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [036 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [016 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [017 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org1.example.com | [018 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [019 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org1.example.com | [01a 10-14 19:00:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [01b 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org1.example.com | [01c 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org1.example.com | [01d 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org1.example.com | [01e 10-14 19:00:49.58 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org1.example.com-cert.pem +peer1.org1.example.com | [01f 10-14 19:00:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org1.example.com | [020 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer1.org1.example.com | [021 10-14 19:00:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org1.example.com | [022 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org1.example.com | [023 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org1.example.com | [024 10-14 19:00:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org1.example.com | [025 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer0.org1.example.com | [037 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [038 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org1.example.com | [039 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org1.example.com | [03a 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org1.example.com | [03b 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org1.example.com | [03c 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org1.example.com | [03d 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org1.example.com | [03e 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org1.example.com | [03f 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org1.example.com | [040 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org1.example.com | [041 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org1.example.com | [042 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org1.example.com | [043 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer0.org1.example.com | [044 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org1.example.com | [045 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org1.example.com | [046 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org1.example.com | [047 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org1.example.com | [048 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org1.example.com | [049 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org1.example.com | [04a 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org1.example.com | [04b 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org1.example.com | [04c 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org1.example.com | [04d 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org1.example.com | [04e 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org1.example.com | [04f 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org1.example.com | [050 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org1.example.com | [051 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org1.example.com | [052 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org1.example.com | [053 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org1.example.com | [054 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org1.example.com | [055 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [080 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [081 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [082 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [083 10-14 19:00:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [084 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: +peer1.org2.example.com | [085 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [086 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A204EE140FBD31CE482...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [087 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5EA79637F04881983BECB2D7729DA6771A358871CBA8BBE44C8A4394738CB9B +peer1.org2.example.com | [088 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt�, total items: 1 +peer1.org2.example.com | [089 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started +peer1.org2.example.com | [08a 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org2.example.com | [08b 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org2.example.com | [08c 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer1.org2.example.com | [08d 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [08e 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.9 +peer1.org2.example.com | [08f 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [090 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.9 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [091 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer1.org2.example.com | [092 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer1.org2.example.com | [093 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.9 +peer1.org2.example.com | [094 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.9 +peer1.org2.example.com | [095 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.9 +peer1.org2.example.com | [096 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [097 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [098 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.9 +peer1.org2.example.com | [099 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.9" , sending back REGISTERED +peer1.org2.example.com | [09a 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.9" +peer1.org2.example.com | [09b 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.9" +peer1.org2.example.com | [09c 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.9" +peer1.org2.example.com | [09d 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [09e 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [09f 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU [373e5b34] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0a0 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU [373e5b34] notifying Txid:373e5b34-4864-408c-a56d-72e917f55a2c, channelID: +peer1.org2.example.com | [0a1 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0a2 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [0a3 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [026 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org1.example.com | [027 10-14 19:00:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org1.example.com | [028 10-14 19:00:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org1.example.com | [029 10-14 19:00:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org1.example.com | [02a 10-14 19:00:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org1.example.com | [02b 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [02c 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [02d 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org1.example.com | [02e 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [02f 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [030 10-14 19:00:49.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [031 10-14 19:00:49.68 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5] at [/etc/hyperledger/fabric/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk]... +peer1.org1.example.com | [032 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [033 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer1.org1.example.com | [034 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org1.example.com | Version: 1.4.9 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.13.15 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.21 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger +peer1.org1.example.com | [035 10-14 19:00:49.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [036 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [056 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org1.example.com | [057 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org1.example.com | [058 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org1.example.com | [059 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer0.org1.example.com | [05a 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05b 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer0.org1.example.com | [05c 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05d 10-14 19:00:50.52 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org1.example.com | [05e 10-14 19:00:50.53 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +peer0.org1.example.com | [05f 10-14 19:00:50.53 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +peer0.org1.example.com | [060 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.9 +peer0.org1.example.com | [061 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org1.example.com | [062 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.9 +peer0.org1.example.com | [063 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org1.example.com | [064 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.9 +peer0.org1.example.com | [065 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org1.example.com | [066 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org1.example.com | [067 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org1.example.com | [068 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [069 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org1.example.com | [06a 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org1.example.com | [06b 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org1.example.com | [06c 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [06d 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org1.example.com | [06e 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [06f 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org1.example.com | [070 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org1.example.com | [071 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org1.example.com | [072 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [073 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org1.example.com | [074 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [075 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org1.example.com | [076 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [077 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [078 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org1.example.com | [079 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org1.example.com | [07a 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org1.example.com | [07b 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer0.org1.example.com | [07c 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer0.org1.example.com | [07d 10-14 19:00:50.56 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +peer0.org1.example.com | [07e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [07f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.TLS.TLSHandshakeTimeShift = 0s +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Operations.TLS.TLSHandshakeTimeShift = 0s +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2020-10-14 19:00:47.725 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2020-10-14 19:00:47.770 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2020-10-14 19:00:47.787 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer1.example.com | "2020-10-14 19:00:47.829 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2020-10-14 19:00:47.829 UTC [orderer.common.server] reuseListener -> INFO 007 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2020-10-14 19:00:47.829 UTC [certmonitor] trackCertExpiration -> INFO 008 The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer1.example.com | "2020-10-14 19:00:47.830 UTC [certmonitor] trackCertExpiration -> INFO 009 The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer1.example.com | "2020-10-14 19:00:47.830 UTC [certmonitor] trackCertExpiration -> INFO 00a The client TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer1.example.com | "2020-10-14 19:00:47.864 UTC [fsblkstorage] newBlockfileMgr -> INFO 00b Getting block information from block storage" +orderer1.example.com | "2020-10-14 19:00:47.985 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 00c EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-10-14 19:00:47.985 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 00d No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.009 UTC [orderer.commmon.multichannel] Initialize -> INFO 00e Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer1.example.com | "2020-10-14 19:00:48.010 UTC [orderer.consensus.etcdraft] Start -> INFO 00f Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.010 UTC [orderer.common.cluster] Configure -> INFO 010 Entering, channel: testchainid, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7055, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org2.example.com | [0a4 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.9 +peer1.org2.example.com | [0a5 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [0a6 10-14 19:00:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.9 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0a7 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer1.org2.example.com | [0a8 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer1.org2.example.com | [0a9 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.9 +peer1.org2.example.com | [0aa 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer1.org2.example.com | [0ab 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer1.org2.example.com | [0ac 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer1.org2.example.com | [0ad 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer1.org2.example.com | [0ae 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.9 +peer1.org2.example.com | [0af 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.9 +peer1.org2.example.com | [0b0 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [0b1 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [0b2 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.9 +peer1.org2.example.com | [0b3 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.9" , sending back REGISTERED +peer1.org2.example.com | [0b4 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.9" +peer1.org2.example.com | [0b5 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.9" +peer1.org2.example.com | [0b6 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.9" +peer1.org2.example.com | [0b7 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0b8 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0b9 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [0ba 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [ef7271cf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0bb 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [ef7271cf] notifying Txid:ef7271cf-922d-4d2e-adc1-8972aabf5253, channelID: +peer1.org2.example.com | [0bc 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0bd 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [0be 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [0bf 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.9 +peer1.org2.example.com | [0c0 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [0c1 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.9 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0c2 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer1.org2.example.com | [0c3 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer1.org2.example.com | [0c4 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.9 +peer1.org2.example.com | [0c5 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer1.org2.example.com | [0c6 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer1.org2.example.com | [0c7 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer1.org2.example.com | [0c8 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer1.org2.example.com | [0c9 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.9 +peer1.org2.example.com | [0ca 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.9 +peer1.org2.example.com | [0cb 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [0cc 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [0cd 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.9 +peer1.org2.example.com | [0ce 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.9" , sending back REGISTERED +peer1.org2.example.com | [0cf 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.9" +peer1.org2.example.com | [0d0 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.9" +peer1.org2.example.com | [0d1 10-14 19:00:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.9" +peer1.org2.example.com | [0d2 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0d3 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer1.org2.example.com | [0d4 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer1.org2.example.com | [0d5 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer1.org2.example.com | [0d6 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-10-14 19:00:48.010 UTC [orderer.common.cluster] updateStubInMapping -> INFO 011 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +peer0.org2.example.com | [00e 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org2.example.com | [00f 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [010 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org2.example.com | [011 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [012 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org2.example.com | [013 10-14 19:00:49.36 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [014 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org2.example.com | [015 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org2.example.com | [016 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [017 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org2.example.com | [018 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [019 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org2.example.com | [01a 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [037 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [038 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org1.example.com | [039 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [03a 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org1.example.com | [03b 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org1.example.com | [03c 10-14 19:00:49.70 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | [03d 10-14 19:00:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org1.example.com | [03e 10-14 19:00:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org1.example.com | [03f 10-14 19:00:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org1.example.com | [040 10-14 19:00:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org1.example.com | [041 10-14 19:00:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org1.example.com | [042 10-14 19:00:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org1.example.com | [043 10-14 19:00:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org1.example.com | [044 10-14 19:00:49.86 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org1.example.com | [045 10-14 19:00:49.86 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org1.example.com | [046 10-14 19:00:49.86 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org1.example.com | [047 10-14 19:00:49.86 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org1.example.com | [048 10-14 19:00:49.86 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org1.example.com | [049 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org1.example.com | [04a 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org1.example.com | [04b 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org1.example.com | [04c 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org1.example.com | [04d 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org1.example.com | [04e 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org1.example.com | [04f 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org1.example.com | [050 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org1.example.com | [051 10-14 19:00:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org1.example.com | [052 10-14 19:00:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org1.example.com | [053 10-14 19:00:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org1.example.com | [054 10-14 19:00:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org1.example.com | [055 10-14 19:00:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org1.example.com | [056 10-14 19:00:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org1.example.com | [057 10-14 19:00:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org1.example.com | [058 10-14 19:00:50.33 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org1.example.com | [059 10-14 19:00:50.33 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05a 10-14 19:00:50.33 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05b 10-14 19:00:50.33 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05c 10-14 19:00:50.33 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05d 10-14 19:00:50.34 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org1.example.com | [05e 10-14 19:00:50.37 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com +peer1.org2.example.com | [0d7 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0d8 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [0d9 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [44149e5d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0da 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU [44149e5d] notifying Txid:44149e5d-c543-4ce5-bf27-4ab2df1d10fb, channelID: +orderer1.example.com | "2020-10-14 19:00:48.011 UTC [orderer.common.cluster] updateStubInMapping -> INFO 012 Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-10-14 19:00:48.025 UTC [orderer.common.cluster] updateStubInMapping -> INFO 013 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2020-10-14 19:00:48.025 UTC [orderer.common.cluster] updateStubInMapping -> INFO 014 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.common.cluster] func1 -> INFO 015 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.common.cluster] func1 -> INFO 016 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.common.cluster] Configure -> INFO 017 Exiting" +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.consensus.etcdraft] start -> INFO 018 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 019 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.030 UTC [orderer.consensus.etcdraft] newRaft -> INFO 01a newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.033 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01b 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.039 UTC [orderer.common.server] Start -> INFO 01c Starting orderer: +orderer1.example.com | Version: 1.4.9 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.13.15 +orderer1.example.com | OS/Arch: linux/amd64" +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [080 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [081 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [082 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org1.example.com | [083 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [084 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [085 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [086 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [087 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +peer0.org1.example.com | [088 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +peer0.org1.example.com | [089 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +peer0.org1.example.com | [08a 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org1.example.com | [08b 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer0.org1.example.com | [08c 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer0.org1.example.com | [08d 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [08e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.9 +peer0.org1.example.com | [08f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [090 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.9 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [091 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer0.org1.example.com | [092 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer0.org1.example.com | [093 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.9 +peer0.org1.example.com | [094 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer0.org1.example.com | [095 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer0.org1.example.com | [096 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer0.org1.example.com | [097 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer0.org1.example.com | [098 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.9 +peer0.org1.example.com | [099 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.9 +peer0.org1.example.com | [09a 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [09b 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [09c 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.9 +peer0.org1.example.com | [09d 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.9" , sending back REGISTERED +peer0.org1.example.com | [09e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.9" +peer0.org1.example.com | [09f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.9" +peer0.org1.example.com | [0a0 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.9" +peer0.org1.example.com | [0a1 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0a2 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [0a3 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [bcfb1102] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0a4 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [bcfb1102] notifying Txid:bcfb1102-86e8-4897-9cfa-be0107292c7a, channelID: +peer0.org2.example.com | [01b 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer0.org2.example.com | [01c 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org2.example.com | [01d 10-14 19:00:49.37 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org2.example.com | [01e 10-14 19:00:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org2.example.com-cert.pem +peer0.org2.example.com | [01f 10-14 19:00:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org2.example.com | [020 10-14 19:00:49.38 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer0.org2.example.com | [021 10-14 19:00:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org2.example.com | [022 10-14 19:00:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org2.example.com | [023 10-14 19:00:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org2.example.com | [024 10-14 19:00:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org2.example.com | [025 10-14 19:00:49.39 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer0.org2.example.com | [026 10-14 19:00:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org2.example.com | [027 10-14 19:00:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org2.example.com | [028 10-14 19:00:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org2.example.com | [029 10-14 19:00:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org2.example.com | [02a 10-14 19:00:49.40 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org2.example.com | [02b 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [02c 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [02d 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org2.example.com | [02e 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [02f 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [0db 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0dc 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [0dd 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [0de 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org2.example.com | [0df 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [0e0 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [0e1 10-14 19:00:50.29 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [0e2 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e3 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e4 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [0e5 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org2.example.com | [0e6 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org2.example.com | [0e7 10-14 19:00:50.30 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org2.example.com | [0e8 10-14 19:00:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org2.example.com | [0e9 10-14 19:00:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer1.org2.example.com | [0ea 10-14 19:00:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [0eb 10-14 19:00:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org2.example.com | [0ec 10-14 19:01:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer1.org2.example.com | [0ed 10-14 19:01:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [0ee 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org2.example.com | [0ef 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47150 +peer1.org2.example.com | [0f0 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025a95e0 +peer1.org2.example.com | [0f1 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [0f2 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [0f3 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [0f4 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [0f5 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [0f6 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [0f7 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [0f8 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [0f9 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 ec b4 9d 34 73 b2 b7 70 80 a2 68 0a 0e f5 00 |....4s..p..h....| +peer1.org2.example.com | 00000010 0b 98 49 89 e3 c7 f5 34 66 0e a2 e8 7b b4 1e 9f |..I....4f...{...| +peer1.org2.example.com | [0fa 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3e 4f d1 db 2c 93 81 e7 83 9a |0E.!..>O..,.....| +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:47.843 UTC [orderer.common.server] Start -> INFO 22c Setting up cluster for orderer type etcdraft" +orderer0.example.com | "2020-10-14 19:00:47.878 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 22d Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2020-10-14 19:00:47.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 22e Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:00:47.894 UTC [certmonitor] trackCertExpiration -> INFO 22f The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-10-14 19:00:47.895 UTC [certmonitor] trackCertExpiration -> INFO 230 The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-10-14 19:00:47.895 UTC [certmonitor] trackCertExpiration -> INFO 231 The client TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-10-14 19:00:47.898 UTC [fsblkstorage] newBlockfileMgr -> DEBU 232 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2020-10-14 19:00:47.898 UTC [kvledger.util] CreateDirIfMissing -> DEBU 233 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2020-10-14 19:00:47.898 UTC [kvledger.util] logDirStatus -> DEBU 234 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [kvledger.util] logDirStatus -> DEBU 235 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] newBlockfileMgr -> INFO 236 Getting block information from block storage" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 237 Retrieving checkpoint info from block files" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 238 retrieveLastFileSuffix()" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 239 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 23a Last file number found = -1" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 23b No block file found" +orderer0.example.com | "2020-10-14 19:00:47.899 UTC [fsblkstorage] newBlockfileMgr -> DEBU 23c Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000322720)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2020-10-14 19:00:47.940 UTC [fsblkstorage] newBlockIndex -> DEBU 23d newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2020-10-14 19:00:47.966 UTC [fsblkstorage] indexBlock -> DEBU 23e Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +orderer0.example.com | txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [fsblkstorage] updateCheckpoint -> DEBU 23f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [05f 10-14 19:00:50.37 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 +peer1.org1.example.com | [060 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.9 +peer1.org1.example.com | [061 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org1.example.com | [062 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.9 +peer1.org1.example.com | [063 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org1.example.com | [064 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.9 +peer1.org1.example.com | [065 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org1.example.com | [066 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org1.example.com | [067 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org1.example.com | [068 10-14 19:00:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [069 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org1.example.com | [06a 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06b 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06c 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org1.example.com | [06d 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org1.example.com | [06e 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org1.example.com | [06f 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org1.example.com | [070 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [071 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org1.example.com | [072 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [073 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org1.example.com | [074 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +orderer1.example.com | "2020-10-14 19:00:48.044 UTC [orderer.common.server] Start -> INFO 01d Beginning to serve requests" +orderer1.example.com | "2020-10-14 19:00:48.046 UTC [orderer.consensus.etcdraft] apply -> INFO 01e Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.046 UTC [orderer.consensus.etcdraft] apply -> INFO 01f Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:48.046 UTC [orderer.consensus.etcdraft] apply -> INFO 020 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.090 UTC [orderer.consensus.etcdraft] Step -> INFO 021 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.094 UTC [orderer.consensus.etcdraft] Step -> INFO 022 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.094 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 023 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.094 UTC [orderer.consensus.etcdraft] Step -> INFO 024 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.098 UTC [orderer.consensus.etcdraft] run -> INFO 025 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:00:49.099 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 026 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:01:00.077 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 027 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2020-10-14 19:01:00.088 UTC [fsblkstorage] newBlockfileMgr -> INFO 028 Getting block information from block storage" +orderer1.example.com | "2020-10-14 19:01:00.114 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 029 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-10-14 19:01:00.114 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 02a No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.127 UTC [orderer.commmon.multichannel] newChain -> INFO 02b Created and starting new chain businesschannel" +orderer1.example.com | "2020-10-14 19:01:00.127 UTC [orderer.consensus.etcdraft] Start -> INFO 02c Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.129 UTC [orderer.common.cluster] Configure -> INFO 02d Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7055, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | 00000010 7c 6b 1f 00 d5 0f ac 06 45 56 a9 b8 4f 7d 7c 59 ||k......EV..O}|Y| +peer1.org2.example.com | 00000020 5e 9a aa 33 bc 02 20 37 28 aa 87 fb 72 45 a0 70 |^..3.. 7(...rE.p| +peer1.org2.example.com | 00000030 de e9 e7 b0 20 f8 e2 41 22 d5 dc 73 65 eb a1 ed |.... ..A"..se...| +peer1.org2.example.com | 00000040 11 7c fd a5 d4 7d 65 |.|...}e| +peer1.org2.example.com | [0fb 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [0fc 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00014a620, header 0xc0025a9ef0 +peer1.org2.example.com | [0fd 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [0fe 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][4cb86497] processing txid: 4cb86497d6cff59505f3467f0a2aa2a09b832927e26c8f6a15068597a1de6d8f +peer1.org2.example.com | [0ff 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][4cb86497] Entry chaincode: name:"cscc" +peer1.org2.example.com | [100 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> INFO [][4cb86497] Entry chaincode: name:"cscc" +peer1.org2.example.com | [101 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [102 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org2.example.com | [103 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [104 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [105 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [106 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [107 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [108 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [109 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 ec b4 9d 34 73 b2 b7 70 80 a2 68 0a 0e f5 00 |....4s..p..h....| +peer1.org2.example.com | 00000010 0b 98 49 89 e3 c7 f5 34 66 0e a2 e8 7b b4 1e 9f |..I....4f...{...| +peer1.org2.example.com | [10a 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3e 4f d1 db 2c 93 81 e7 83 9a |0E.!..>O..,.....| +peer1.org2.example.com | 00000010 7c 6b 1f 00 d5 0f ac 06 45 56 a9 b8 4f 7d 7c 59 ||k......EV..O}|Y| +peer1.org2.example.com | 00000020 5e 9a aa 33 bc 02 20 37 28 aa 87 fb 72 45 a0 70 |^..3.. 7(...rE.p| +peer1.org2.example.com | 00000030 de e9 e7 b0 20 f8 e2 41 22 d5 dc 73 65 eb a1 ed |.... ..A"..se...| +peer1.org2.example.com | 00000040 11 7c fd a5 d4 7d 65 |.|...}e| +peer1.org2.example.com | [10b 10-14 19:01:02.89 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org2.example.com | [10c 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer1.org2.example.com | [10d 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org2.example.com | [10e 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer1.org2.example.com | [10f 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org2.example.com | [110 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org2.example.com | [111 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org2.example.com | [112 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org2.example.com | [113 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer1.org2.example.com | [114 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer1.org2.example.com | [115 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer1.org2.example.com | [116 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0027c03a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org2.example.com | [117 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org2.example.com | [118 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org2.example.com | [119 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org2.example.com | [11a 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org2.example.com | [11b 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org2.example.com | [11c 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org2.example.com | [11d 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org2.example.com | [11e 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org2.example.com | [120 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org2.example.com | [11f 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org2.example.com | [122 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org2.example.com | [123 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org2.example.com | [124 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [121 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org2.example.com | [125 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [0a5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [0a6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [0a7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [0a8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.9 +peer0.org1.example.com | [0a9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [0aa 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.9 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [0ab 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer0.org1.example.com | [0ac 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer0.org1.example.com | [0ad 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.9 +peer0.org1.example.com | [0ae 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer0.org1.example.com | [0b1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer0.org1.example.com | [0af 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.9 +peer0.org1.example.com | [0b0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.9 +peer0.org1.example.com | [0b2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [0b3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [0b4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.9 +peer0.org1.example.com | [0b5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.9" , sending back REGISTERED +peer0.org1.example.com | [0b6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.9" +peer0.org1.example.com | [0b7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.9" +peer0.org1.example.com | [0b8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.9" +peer0.org1.example.com | [0b9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0ba 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [0bb 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [0bc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [9e9645dc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0bd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [9e9645dc] notifying Txid:9e9645dc-398e-431d-9b9e-182d1bae6169, channelID: +peer0.org1.example.com | [0be 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [0bf 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [0c0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [0c1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.9 +peer0.org1.example.com | [0c2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [0c3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.9 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [0c4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer0.org1.example.com | [0c5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer0.org1.example.com | [0c6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.9 +peer0.org1.example.com | [0c7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer0.org1.example.com | [0c8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer0.org1.example.com | [0c9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer0.org1.example.com | [0ca 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer0.org1.example.com | [0cb 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.9 +peer0.org1.example.com | [0cc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.9 +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [common.channelconfig] validateMSP -> DEBU 24a Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [msp] newBccspMsp -> DEBU 24b Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [msp] New -> DEBU 24c Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [msp] Setup -> DEBU 24d Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [msp.identity] newIdentity -> DEBU 24e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [msp] Setup -> DEBU 254 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer2.example.com | 2020-10-14 19:00:47.582 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2020-10-14 19:00:47.654 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.TLS.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +peer1.org1.example.com | [075 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org1.example.com | [076 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [077 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org1.example.com | [078 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [079 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org1.example.com | [07a 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org1.example.com | [07b 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> INFO The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer1.org1.example.com | [07c 10-14 19:00:50.39 UTC] [%{longpkg}] %{callpath} -> INFO The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer1.org1.example.com | [07d 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] +peer1.org1.example.com | [07e 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [07f 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [080 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [081 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [082 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: +peer1.org1.example.com | [083 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [084 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [085 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [086 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A201FF20917D2308491...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [087 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 494B7A1CF7727D9869353DB5DFD3651B92B933B238D66E7CDE50993B20AC8ACA +peer1.org1.example.com | [088 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=�, total items: 1 +peer1.org1.example.com | [089 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started +peer1.org1.example.com | [08a 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org1.example.com | [08b 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org1.example.com | [08c 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [08d 10-14 19:00:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [08e 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [08f 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [090 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [091 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [092 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00261e2c0, CONNECTING +peer1.org1.example.com | [093 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU grpc: addrConn.createTransport failed to connect to {peer0.org1.example.com:7051 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 172.18.0.5:7051: connect: connection refused". Reconnecting... +peer1.org1.example.com | [094 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00261e2c0, TRANSIENT_FAILURE +peer1.org1.example.com | [095 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [096 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.9 +peer1.org1.example.com | [097 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [098 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.9 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [030 10-14 19:00:49.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [031 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336] at [/etc/hyperledger/fabric/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk]... +peer0.org2.example.com | [032 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [033 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer0.org2.example.com | [034 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org2.example.com | Version: 1.4.9 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.13.15 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.21 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger +peer0.org2.example.com | [035 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [036 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [037 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [038 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org2.example.com | [039 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org2.example.com | [03a 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org2.example.com | [03b 10-14 19:00:49.42 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org2.example.com | [03c 10-14 19:00:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org2.example.com | [03d 10-14 19:00:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org2.example.com | [03e 10-14 19:00:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org2.example.com | [03f 10-14 19:00:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org2.example.com | [040 10-14 19:00:49.46 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org2.example.com | [041 10-14 19:00:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org2.example.com | [042 10-14 19:00:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org2.example.com | [043 10-14 19:00:49.47 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [099 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer1.org1.example.com | [09a 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer1.org1.example.com | [09b 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.9 +peer1.org1.example.com | [09c 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer1.org1.example.com | [09f 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer1.org1.example.com | [09d 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.9 +peer1.org1.example.com | [09e 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.9 +peer1.org1.example.com | [0a0 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0a1 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer1.org1.example.com | [0a2 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0a3 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.9 +peer1.org1.example.com | [0a4 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.9" , sending back REGISTERED +peer1.org1.example.com | [0a5 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.9" +peer1.org1.example.com | [0a6 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.9" +peer1.org1.example.com | [0a7 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer1.org1.example.com | [0a8 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.9" +peer1.org1.example.com | [0a9 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0aa 10-14 19:00:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0ab 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [eb024f1b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0ac 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [eb024f1b] notifying Txid:eb024f1b-f315-4a2c-940e-772bd600a151, channelID: +peer1.org1.example.com | [0ad 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0ae 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [0af 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [0b0 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.9 +peer1.org1.example.com | [0b1 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0b2 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.9 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0b3 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer1.org1.example.com | [0b4 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer1.org1.example.com | [0b5 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.9 +peer1.org1.example.com | [0b6 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer1.org1.example.com | [0b7 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer1.org1.example.com | [0b8 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer1.org1.example.com | [0b9 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.9 +peer1.org1.example.com | [0ba 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +peer0.org2.example.com | [044 10-14 19:00:49.48 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org2.example.com | [045 10-14 19:00:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org2.example.com | [046 10-14 19:00:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org2.example.com | [047 10-14 19:00:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org2.example.com | [048 10-14 19:00:49.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org2.example.com | [049 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org2.example.com | [04a 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org2.example.com | [04b 10-14 19:00:49.57 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org2.example.com | [04c 10-14 19:00:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org2.example.com | [04d 10-14 19:00:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org2.example.com | [04e 10-14 19:00:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org2.example.com | [04f 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org2.example.com | [050 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org2.example.com | [051 10-14 19:00:49.80 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org2.example.com | [052 10-14 19:00:49.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org2.example.com | [053 10-14 19:00:49.94 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org2.example.com | [054 10-14 19:00:49.95 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org2.example.com | [055 10-14 19:00:49.95 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org2.example.com | [056 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | [057 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | [058 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [059 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org2.example.com | [05a 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05b 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org2.example.com | [05c 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05d 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [05e 10-14 19:00:50.07 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com +peer0.org2.example.com | [05f 10-14 19:00:50.07 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 +peer0.org2.example.com | [060 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.9 +peer0.org2.example.com | [061 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | [062 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.9 +peer0.org2.example.com | [063 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [064 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.9 +peer0.org2.example.com | [065 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [066 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org2.example.com | [067 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org2.example.com | [068 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [069 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [06a 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org2.example.com | [06b 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org2.example.com | [06c 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [06d 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org2.example.com | [06e 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [06f 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org2.example.com | [070 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [071 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [072 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org2.example.com | [073 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org2.example.com | [074 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org2.example.com | [075 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org2.example.com | [076 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [077 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org2.example.com | [078 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [079 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org2.example.com | [07a 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org2.example.com | [07b 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer0.org2.example.com | [07c 10-14 19:00:50.09 UTC] [%{longpkg}] %{callpath} -> INFO The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC +peer0.org2.example.com | [07d 10-14 19:00:50.11 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-10-14 19:01:00.132 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02e Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +orderer1.example.com | "2020-10-14 19:01:00.132 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02f Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-10-14 19:01:00.132 UTC [orderer.common.cluster] updateStubInMapping -> INFO 030 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2020-10-14 19:01:00.133 UTC [orderer.common.cluster] updateStubInMapping -> INFO 031 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2020-10-14 19:01:00.133 UTC [orderer.common.cluster] func1 -> INFO 032 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-10-14 19:01:00.134 UTC [orderer.common.cluster] func1 -> INFO 033 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-10-14 19:01:00.134 UTC [orderer.common.cluster] Configure -> INFO 034 Exiting" +orderer1.example.com | "2020-10-14 19:01:00.134 UTC [orderer.consensus.etcdraft] start -> INFO 035 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.134 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 036 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.134 UTC [orderer.consensus.etcdraft] newRaft -> INFO 037 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.135 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 038 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.148 UTC [orderer.consensus.etcdraft] apply -> INFO 039 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.149 UTC [orderer.consensus.etcdraft] apply -> INFO 03a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:00.149 UTC [orderer.consensus.etcdraft] apply -> INFO 03b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.196 UTC [orderer.consensus.etcdraft] Step -> INFO 03c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.204 UTC [orderer.consensus.etcdraft] Step -> INFO 03d 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.204 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 03e 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.204 UTC [orderer.consensus.etcdraft] Step -> INFO 03f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.210 UTC [orderer.consensus.etcdraft] run -> INFO 040 raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:01.211 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 041 Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:05.500 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:07.790 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:13.726 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.7:34670 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=5.009941s +orderer1.example.com | "2020-10-14 19:01:54.244 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 045 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:01:57.261 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 046 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:02:00.078 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 047 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:02:16.314 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 048 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-10-14 19:02:16.316 UTC [cauthdsl] deduplicate -> WARN 049 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer1.example.com | "2020-10-14 19:02:16.321 UTC [cauthdsl] deduplicate -> WARN 04a De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25a Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 25d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 25f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [common.channelconfig] validateMSP -> DEBU 261 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [msp] newBccspMsp -> DEBU 262 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.990 UTC [msp] New -> DEBU 263 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [msp] Setup -> DEBU 264 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:48.001 UTC [msp.identity] newIdentity -> DEBU 265 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:48.009 UTC [msp] Setup -> DEBU 266 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:48.010 UTC [msp] Setup -> DEBU 267 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:48.010 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.010 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.977 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.977 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.978 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.981 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.981 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.983 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.983 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.984 UTC [policies] GetPolicy -> DEBU 278 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.984 UTC [policies] GetPolicy -> DEBU 27a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:00:47.985 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:47.989 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-10-14 19:00:47.992 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:47.992 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer2.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | General.Authentication.NoExpirationChecks = false +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +peer0.org2.example.com | [07e 10-14 19:00:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [07f 10-14 19:00:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [080 10-14 19:00:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [081 10-14 19:00:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [082 10-14 19:00:50.12 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer0.org2.example.com | [083 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [084 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A20A583F8EF0329C5FD...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [085 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F325F6221CD3E4FD286DF6B04B3535B6B757789167E7FE5ACF4C444E25371023 +peer0.org2.example.com | [086 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���(, total items: 1 +peer0.org2.example.com | [087 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [088 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.9 +peer0.org2.example.com | [089 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [08a 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.9 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [08b 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer0.org2.example.com | [08c 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer0.org2.example.com | [08d 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.9 +peer0.org2.example.com | [08e 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer0.org2.example.com | [08f 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +peer0.org2.example.com | [090 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +peer0.org2.example.com | [091 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +peer0.org2.example.com | [092 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [093 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started +peer0.org2.example.com | [094 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer0.org2.example.com | [095 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.9 +peer0.org2.example.com | [096 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org2.example.com | [097 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer0.org2.example.com | [098 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.9 +peer0.org2.example.com | [099 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [09b 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [09c 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.9 +peer0.org2.example.com | [09d 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.9" , sending back REGISTERED +peer0.org2.example.com | [09e 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.9" +peer0.org2.example.com | [09a 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [09f 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.9" +peer0.org2.example.com | [0a0 10-14 19:00:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.9" +peer0.org2.example.com | [0a1 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0a2 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0a3 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [f360181b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0bb 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.9 +peer1.org1.example.com | [0bc 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0bd 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0be 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.9 +peer1.org1.example.com | [0bf 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.9" , sending back REGISTERED +peer1.org1.example.com | [0c0 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.9" +peer1.org1.example.com | [0c1 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.9" +peer1.org1.example.com | [0c2 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.9" +peer1.org1.example.com | [0c3 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0c4 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0c5 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [0c6 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [9cc66507] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0c7 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [9cc66507] notifying Txid:9cc66507-c0f9-4eae-bb4a-02e180cad616, channelID: +peer1.org1.example.com | [0c8 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0c9 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [0ca 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [0cb 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.9 +peer1.org2.example.com | [126 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org2.example.com | [127 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer1.org2.example.com | [128 10-14 19:01:02.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org2.example.com | [129 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org2.example.com | [12a 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [12b 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [12c 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [12d 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org2.example.com | [12e 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [12f 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [130 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [131 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [132 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [133 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [134 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:48.003 UTC [fsblkstorage] Next -> DEBU 2a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:00:48.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a6 Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a7 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a8 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] Next -> DEBU 2a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] newBlockfileStream -> DEBU 2aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ab Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ac Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ad blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:00:48.015 UTC [common.channelconfig] NewStandardValues -> DEBU 2ae Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2af Processing field: HashingAlgorithm" +peer1.org1.example.com | [0cc 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0cd 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.9 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0ce 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer1.org1.example.com | [0cf 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer1.org1.example.com | [0d0 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.9 +peer1.org1.example.com | [0d2 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.9 +peer1.org1.example.com | [0d3 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.9 +peer1.org1.example.com | [0d4 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0d5 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0d6 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.9 +peer1.org1.example.com | [0d7 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.9" , sending back REGISTERED +peer1.org1.example.com | [0d8 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.9" +peer1.org1.example.com | [0d9 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.9" +peer1.org1.example.com | [0da 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.9" +peer1.org1.example.com | [0db 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0dc 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0dd 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [0de 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU [8af29bbd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0df 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU [8af29bbd] notifying Txid:8af29bbd-531f-4e7f-8205-9f3ff060a8ec, channelID: +peer1.org1.example.com | [0e0 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0e1 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [0e2 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [0e3 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [0e4 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [0e5 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [0e6 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [0e7 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [0e8 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [0e9 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [0ea 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | [0eb 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [0ec 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | [0d1 10-14 19:00:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer1.org1.example.com | [0ed 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer1.org1.example.com | [0ee 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +peer1.org1.example.com | [0ef 10-14 19:00:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer1.org1.example.com | [0f0 10-14 19:00:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00261e2c0, CONNECTING +peer1.org1.example.com | [0f1 10-14 19:00:51.42 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00261e2c0, READY +peer1.org1.example.com | [0f2 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0f3 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [0f4 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [0f5 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [0f6 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer0.org1.example.com | [0cd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [0ce 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [0cf 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.9 +peer0.org1.example.com | [0d0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.9" , sending back REGISTERED +peer0.org1.example.com | [0d1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.9" +peer0.org1.example.com | [0d2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.9" +peer0.org1.example.com | [0d3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.9" +peer0.org1.example.com | [0d4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0d5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [0d6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [0d7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [37f67fe6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0d8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [37f67fe6] notifying Txid:37f67fe6-e3e3-427c-865d-b5e7023bf7cd, channelID: +peer0.org1.example.com | [0d9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [0da 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [0db 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [0dc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org1.example.com | [0dd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [0de 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org1.example.com | [0df 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer0.org1.example.com | [0e0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer0.org1.example.com | [0e1 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +orderer2.example.com | Kafka.TLS.TLSHandshakeTimeShift = 0s +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Operations.TLS.TLSHandshakeTimeShift = 0s +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2020-10-14 19:00:47.940 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2020-10-14 19:00:47.954 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2020-10-14 19:00:47.958 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer2.example.com | "2020-10-14 19:00:48.000 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2020-10-14 19:00:48.000 UTC [orderer.common.server] reuseListener -> INFO 007 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2020-10-14 19:00:48.000 UTC [certmonitor] trackCertExpiration -> INFO 008 The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer2.example.com | "2020-10-14 19:00:48.000 UTC [certmonitor] trackCertExpiration -> INFO 009 The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer2.example.com | "2020-10-14 19:00:48.000 UTC [certmonitor] trackCertExpiration -> INFO 00a The client TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +orderer2.example.com | "2020-10-14 19:00:47.991 UTC [fsblkstorage] newBlockfileMgr -> INFO 00b Getting block information from block storage" +orderer2.example.com | "2020-10-14 19:00:48.013 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 00c EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2020-10-14 19:00:48.014 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 00d No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.079 UTC [orderer.commmon.multichannel] Initialize -> INFO 00e Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer2.example.com | "2020-10-14 19:00:48.080 UTC [orderer.consensus.etcdraft] Start -> INFO 00f Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.080 UTC [orderer.common.cluster] Configure -> INFO 010 Entering, channel: testchainid, nodes: [ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7055, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +peer1.org1.example.com | [0f7 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [0f8 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [0f9 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [0fa 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [0fb 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [0fc 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 0a 6e 72 85 95 4b 10 1d c6 7d |0E.!...nr..K...}| +peer1.org1.example.com | 00000010 fb 57 1c 33 74 52 7b c1 4e d8 c9 73 97 ac 60 6f |.W.3tR{.N..s..`o| +peer1.org1.example.com | 00000020 a2 44 76 15 9d 02 20 18 93 09 58 38 46 76 8a 09 |.Dv... ...X8Fv..| +peer1.org1.example.com | 00000030 00 49 14 17 d2 ad a6 e8 0e 22 9d d4 d7 6a 8d 7c |.I......."...j.|| +peer1.org1.example.com | 00000040 26 8e 21 5f ea 9f 42 |&.!_..B| +peer1.org1.example.com | [0fd 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [0fe 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0ff 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [100 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7CFCF2D1D5CCFA50E0EC41BDC9790D81FFE87591D463C525B12FB7ED1DB35F8B +peer1.org1.example.com | [101 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [103 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [104 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [102 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [105 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [106 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes +peer1.org1.example.com | [107 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [108 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [109 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [0e2 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer0.org1.example.com | [0e3 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer0.org1.example.com | [0e4 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer0.org1.example.com | [0e5 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer0.org1.example.com | [0e6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer0.org1.example.com | [0e7 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer0.org1.example.com | [0e8 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:00:53.429Z grpc.peer_address=172.18.0.8:52120 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.3µs +peer0.org1.example.com | [0e9 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0ea 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [0eb 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [0ec 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52120 +peer0.org1.example.com | [0ed 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52120 +peer0.org1.example.com | [0ee 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [0ef 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [0f0 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [0f1 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [0f2 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [0f3 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [0f4 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 9e 2d 28 bd 65 42 e8 1d 69 96 |0E.!...-(.eB..i.| +peer0.org1.example.com | 00000010 68 62 3c 9f b0 d5 28 11 61 ab 41 57 80 03 4b 47 |hb<...(.a.AW..KG| +peer0.org1.example.com | 00000020 61 ec c3 c8 12 02 20 5c d2 00 84 bd c5 a3 ad 62 |a..... \.......b| +peer0.org1.example.com | 00000030 55 50 d4 50 78 6f 45 6d 85 53 58 e7 bb 02 55 58 |UP.PxoEm.SX...UX| +peer0.org1.example.com | 00000040 ad 07 14 b0 3e e2 c6 |....>..| +peer0.org1.example.com | [0f5 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52120 +peer0.org1.example.com | [0f6 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52120 +peer0.org1.example.com | [0f7 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52120 disconnected +peer0.org1.example.com | [0f9 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [0f8 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:01.434Z grpc.peer_address=172.18.0.8:52120 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6834ms +peer0.org1.example.com | [0fa 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [0fb 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:00:53.447Z grpc.peer_address=172.18.0.8:52122 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=545.9µs +peer0.org1.example.com | [0fc 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0fd 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [0fe 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [0ff 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52122 +peer0.org1.example.com | [100 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52122 +peer0.org1.example.com | [101 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [102 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 2b e7 9b e1 04 e4 f5 6a 6c a8 |0E.!..+......jl.| +peer0.org1.example.com | 00000010 9e aa 48 b6 3b 28 50 8f 27 e4 c0 74 0d b7 34 6b |..H.;(P.'..t..4k| +peer0.org1.example.com | 00000020 9f a7 a2 eb 0a 02 20 65 ca 25 27 3f f0 e6 ab ea |...... e.%'?....| +peer0.org1.example.com | 00000030 aa 83 e6 65 0d a9 0b d4 a3 a5 f7 da 15 a0 12 3e |...e...........>| +peer0.org1.example.com | 00000040 96 1b 14 45 f2 ec a5 |...E...| +peer0.org1.example.com | [103 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52122 +peer0.org1.example.com | [104 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52122 +peer0.org1.example.com | [105 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes +peer0.org1.example.com | [106 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [107 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes +peer0.org1.example.com | [108 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c fc f2 d1 d5 cc fa 50 e0 ec 41 bd c9 79 0d 81 ||......P..A..y..| +peer0.org1.example.com | 00000010 ff e8 75 91 d4 63 c5 25 b1 2f b7 ed 1d b3 5f 8b |..u..c.%./...._.| +peer0.org1.example.com | [109 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 23 b7 e2 48 bd 49 b2 97 42 a1 26 |0D. .#..H.I..B.&| +peer0.org1.example.com | 00000010 de 57 bd 75 c6 9b b3 02 32 9d fd 43 84 43 be 3d |.W.u....2..C.C.=| +peer0.org1.example.com | 00000020 79 ae 02 9e 02 20 39 fc c4 9e ef 24 04 25 98 5f |y.... 9....$.%._| +peer0.org1.example.com | 00000030 2c e2 84 f6 7e aa 4d e5 f6 4c 00 dc 36 f4 3b 05 |,...~.M..L..6.;.| +peer0.org1.example.com | 00000040 b5 c1 b7 4e 4e f2 |...NN.| +peer0.org1.example.com | [10a 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [10b 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 38 cd 16 00 e7 31 12 8a 1e 7f |0E.!..8....1....| +peer0.org1.example.com | 00000010 6f e1 03 4f 61 84 c1 86 ca f7 67 e6 85 9c fb b3 |o..Oa.....g.....| +peer0.org2.example.com | [0a4 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [f360181b] notifying Txid:f360181b-2a8c-4665-a326-d9c8cb0093d7, channelID: +peer0.org2.example.com | [0a5 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0a6 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [0a7 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0a8 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.9 +peer0.org2.example.com | [0a9 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0aa 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.9 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0ab 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer0.org2.example.com | [0ac 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer0.org2.example.com | [0ad 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.9 +peer0.org2.example.com | [0ae 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer0.org2.example.com | [0b1 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +peer0.org2.example.com | [0b2 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +peer0.org2.example.com | [0af 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.9 +peer0.org2.example.com | [0b0 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.9 +peer0.org2.example.com | [0b3 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0b4 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0b5 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.9 +peer0.org2.example.com | [0b6 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.9" , sending back REGISTERED +peer0.org2.example.com | [0b7 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.9" +peer0.org2.example.com | [0b8 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.9" +peer0.org2.example.com | [0b9 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.9" +peer0.org2.example.com | [0ba 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0bb 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0bc 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [0bd 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [c603f430] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0be 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU [c603f430] notifying Txid:c603f430-0a3b-4da5-b0aa-e4c3604c5d95, channelID: +peer0.org2.example.com | [0bf 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0c0 10-14 19:00:50.14 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [0c1 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0c2 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.9 +peer0.org2.example.com | [0c3 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0c4 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.9 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0c5 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer0.org2.example.com | [0c6 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2020-10-14 19:00:48.080 UTC [orderer.common.cluster] updateStubInMapping -> INFO 011 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2020-10-14 19:00:48.080 UTC [orderer.common.cluster] updateStubInMapping -> INFO 012 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.common.cluster] updateStubInMapping -> INFO 013 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.common.cluster] updateStubInMapping -> INFO 014 Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.common.cluster] func1 -> INFO 015 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.common.cluster] func1 -> INFO 016 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.common.cluster] Configure -> INFO 017 Exiting" +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.consensus.etcdraft] start -> INFO 018 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 019 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.consensus.etcdraft] newRaft -> INFO 01a newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.081 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01b 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.082 UTC [orderer.common.server] Start -> INFO 01c Starting orderer: +orderer2.example.com | Version: 1.4.9 +orderer2.example.com | Commit SHA: development build +orderer2.example.com | Go version: go1.13.15 +orderer2.example.com | OS/Arch: linux/amd64" +orderer2.example.com | "2020-10-14 19:00:48.082 UTC [orderer.common.server] Start -> INFO 01d Beginning to serve requests" +orderer2.example.com | "2020-10-14 19:00:48.084 UTC [orderer.consensus.etcdraft] run -> INFO 01e This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.091 UTC [orderer.consensus.etcdraft] apply -> INFO 01f Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.091 UTC [orderer.consensus.etcdraft] apply -> INFO 020 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:48.092 UTC [orderer.consensus.etcdraft] apply -> INFO 021 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.087 UTC [orderer.consensus.etcdraft] Step -> INFO 022 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.087 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 023 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.087 UTC [orderer.consensus.etcdraft] poll -> INFO 024 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.087 UTC [orderer.consensus.etcdraft] campaign -> INFO 025 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.087 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.091 UTC [orderer.consensus.etcdraft] poll -> INFO 027 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 028 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 029 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] poll -> INFO 02a 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] campaign -> INFO 02b 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] campaign -> INFO 02c 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.096 UTC [orderer.consensus.etcdraft] poll -> INFO 02d 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.096 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02e 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.096 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02f 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.096 UTC [orderer.consensus.etcdraft] run -> INFO 030 raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.097 UTC [orderer.consensus.etcdraft] run -> INFO 031 Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:00:49.097 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 032 Raft leader changed: 0 -> 3" channel=testchainid node=3 +peer0.org1.example.com | 00000020 29 04 67 61 95 02 20 74 96 38 14 a9 aa 62 ad fe |).ga.. t.8...b..| +orderer0.example.com | "2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b0 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [10a 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [0c7 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.9 +orderer2.example.com | "2020-10-14 19:00:49.100 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 033 Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +peer1.org2.example.com | [135 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [136 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | 00000030 05 38 88 eb 78 d5 7a c3 4d 1f f1 d6 61 75 d0 2b |.8..x.z.M...au.+| +peer1.org1.example.com | [10b 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [0c8 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer0.org2.example.com | [0c9 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +peer0.org2.example.com | [0ca 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +orderer2.example.com | "2020-10-14 19:01:00.056 UTC [orderer.consensus.etcdraft] propose -> INFO 034 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:01:00.056 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 035 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:01:00.076 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 036 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2020-10-14 19:01:00.126 UTC [fsblkstorage] newBlockfileMgr -> INFO 037 Getting block information from block storage" +orderer2.example.com | "2020-10-14 19:01:00.154 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 038 EvictionSuspicion not set, defaulting to 10m0s" +peer0.org1.example.com | 00000040 96 ca 48 75 3e fc 71 |..Hu>.q| +peer0.org1.example.com | [10c 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [10d 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [10e 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [10f 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [110 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [112 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [113 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [114 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [115 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82B9204592AAFC80288654E4D9DB1F1209EE5FC706EEDA11D35EBB32723126F4 +peer0.org1.example.com | [116 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [117 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [118 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [119 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes to 1 peers +orderer2.example.com | "2020-10-14 19:01:00.160 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 039 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +peer0.org1.example.com | [11a 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\374q" > > alive: > +peer0.org1.example.com | [11b 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +peer0.org1.example.com | [11c 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [120 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [122 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [124 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a db b0 ed a7 65 d8 aa 1f e2 a1 84 1f d8 20 95 |Z....e........ .| +peer0.org1.example.com | 00000010 54 7b c9 ba 59 c6 93 64 ed a7 23 3c 31 7b 90 03 |T{..Y..d..#<1{..| +peer0.org1.example.com | [125 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a5 3f a1 67 9e 33 4f b7 f8 08 |0E.!...?.g.3O...| +peer1.org1.example.com | [10c 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00278eeb0, CONNECTING +peer1.org1.example.com | [10d 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00278eeb0, READY +peer1.org1.example.com | [10e 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [10f 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [110 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [111 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [112 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +orderer2.example.com | "2020-10-14 19:01:00.169 UTC [orderer.commmon.multichannel] newChain -> INFO 03a Created and starting new chain businesschannel" +peer1.org1.example.com | [113 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | [0cb 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +peer0.org2.example.com | [0cc 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.9 +peer0.org2.example.com | [0cd 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.9 +peer0.org2.example.com | [0ce 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0cf 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0d0 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.9 +peer0.org2.example.com | [0d1 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.9" , sending back REGISTERED +peer0.org2.example.com | [0d2 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.9" +peer0.org2.example.com | [0d3 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.9" +orderer2.example.com | "2020-10-14 19:01:00.170 UTC [orderer.consensus.etcdraft] Start -> INFO 03b Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:00.170 UTC [orderer.common.cluster] Configure -> INFO 03c Entering, channel: businesschannel, nodes: [ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +peer0.org2.example.com | [0d4 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.9" +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [137 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +orderer0.example.com | "2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b1 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b2 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b3 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] NewStandardValues -> DEBU 2b6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b7 Processing field: MSP" +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | "2020-10-14 19:00:48.017 UTC [common.channelconfig] validateMSP -> DEBU 2b8 Setting up MSP for org Org2MSP" +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer0.org2.example.com | [0d5 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [138 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | 00000010 b6 f0 8a bd 61 f8 6c 90 d1 fb 97 8e 92 05 15 7a |....a.l........z| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +orderer0.example.com | "2020-10-14 19:00:48.017 UTC [msp] newBccspMsp -> DEBU 2b9 Creating BCCSP-based MSP instance" +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org2.example.com | [0d6 10-14 19:00:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0d7 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [139 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00282e540)} +peer1.org1.example.com | [114 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 b1 95 29 d6 57 e9 e9 73 87 25 |0E.!....).W..s.%| +peer1.org1.example.com | 00000010 a9 59 ea 8b 3c 27 72 4e 52 46 cf e6 cb 60 ec 7b |.Y..<'rNRF...`.{| +peer1.org1.example.com | 00000020 b1 4b 40 e1 79 02 20 3d ec 4b 04 8d f1 38 4a 9d |.K@.y. =.K...8J.| +peer1.org1.example.com | 00000030 32 50 bf 7b 68 6c 62 5a 48 f4 c7 c0 b4 dc b1 20 |2P.{hlbZH...... | +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +peer1.org2.example.com | [13a 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | 00000020 9b 05 a3 f6 ea 02 20 2a 55 79 65 2f a1 fb d9 8e |...... *Uye/....| +peer1.org1.example.com | 00000040 71 05 d0 c7 d5 1b d5 |q......| +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | "2020-10-14 19:00:48.018 UTC [msp] New -> DEBU 2ba Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:48.018 UTC [msp] Setup -> DEBU 2bb Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.018 UTC [msp.identity] newIdentity -> DEBU 2bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [13b 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +peer0.org1.example.com | 00000030 e1 f7 87 70 9b db c7 5d 8e f7 90 7f 95 cd 8e 1c |...p...]........| +peer1.org1.example.com | [115 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [0d8 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [a29e11a7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [13c 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +peer0.org1.example.com | 00000040 02 ce ec 53 1f cf d4 |...S...| +peer0.org1.example.com | [126 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [127 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 c9 18 56 a1 c4 63 4a 56 64 9f |0E.!....V..cJVd.| +peer0.org1.example.com | 00000010 bb 32 87 17 92 cd 8a b1 7b 86 66 98 29 c4 e6 51 |.2......{.f.)..Q| +peer0.org1.example.com | 00000020 29 da 89 39 fc 02 20 39 87 08 a8 83 c9 83 80 5b |)..9.. 9.......[| +peer0.org1.example.com | 00000030 e2 ab 4a 75 7a ba 2e 33 02 51 ed 2b 59 ae e0 fc |..Juz..3.Q.+Y...| +peer0.org1.example.com | 00000040 eb 51 9c 55 a7 0e fa |.Q.U...| +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7055, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [128 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [129 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [12a 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [12b 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [12c 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer0.org1.example.com | [12d 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org1.example.com | [116 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org1.example.com | [12e 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12f 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [130 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer0.org2.example.com | [0d9 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU [a29e11a7] notifying Txid:a29e11a7-55c1-4840-998a-b47392e1a965, channelID: +peer0.org2.example.com | [0da 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0db 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [13e 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | [117 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [0dc 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [13f 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org1.example.com | [131 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer1.org1.example.com | [118 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [0dd 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org2.example.com | [0de 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [140 10-14 19:01:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org1.example.com | [119 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | [0df 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [141 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +peer0.org1.example.com | [132 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +peer1.org1.example.com | [11a 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [0e1 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +peer0.org1.example.com | [133 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DC69EEB80055E454E8CADD1A6E484C87D36588654F3D4D2711026E26AB50277 +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +peer1.org1.example.com | [11b 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | [0e0 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +peer0.org1.example.com | [134 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [135 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [136 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [137 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes to 1 peers +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer1.org2.example.com | ] +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer1.org1.example.com | [11c 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c fc f2 d1 d5 cc fa 50 e0 ec 41 bd c9 79 0d 81 ||......P..A..y..| +peer1.org1.example.com | 00000010 ff e8 75 91 d4 63 c5 25 b1 2f b7 ed 1d b3 5f 8b |..u..c.%./...._.| +peer0.org2.example.com | [0e2 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer1.org2.example.com | [142 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to txid-index +peer0.org1.example.com | [138 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\253)M\344j\261\360\223\036(\0165a\013\026\363e\344\264\372\003\204\005|S0\261$\370v\t" secret_envelope: > +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +peer1.org1.example.com | [11d 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 23 b7 e2 48 bd 49 b2 97 42 a1 26 |0D. .#..H.I..B.&| +peer0.org2.example.com | [0e3 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [143 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to blockNumTranNum index +peer1.org2.example.com | [144 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +peer1.org1.example.com | 00000010 de 57 bd 75 c6 9b b3 02 32 9d fd 43 84 43 be 3d |.W.u....2..C.C.=| +orderer2.example.com | "2020-10-14 19:01:00.171 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03d Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2020-10-14 19:01:00.171 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03e Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2020-10-14 19:01:00.172 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03f Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +peer0.org1.example.com | [139 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes +peer1.org2.example.com | [145 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org2.example.com | [146 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer1.org2.example.com | [147 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [13a 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13b 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [13c 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [13d 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer2.example.com | "2020-10-14 19:01:00.172 UTC [orderer.common.cluster] updateStubInMapping -> INFO 040 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +peer0.org1.example.com | [13e 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [148 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer1.org1.example.com | 00000020 79 ae 02 9e 02 20 39 fc c4 9e ef 24 04 25 98 5f |y.... 9....$.%._| +peer1.org1.example.com | 00000030 2c e2 84 f6 7e aa 4d e5 f6 4c 00 dc 36 f4 3b 05 |,...~.M..L..6.;.| +orderer2.example.com | "2020-10-14 19:01:00.172 UTC [orderer.common.cluster] func1 -> INFO 041 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2020-10-14 19:01:00.172 UTC [orderer.common.cluster] func1 -> INFO 042 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2020-10-14 19:01:00.173 UTC [orderer.common.cluster] Configure -> INFO 043 Exiting" +peer0.org2.example.com | [0e4 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [149 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org2.example.com | [14b 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer1.org2.example.com | [14c 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org2.example.com | [14a 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [14d 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org2.example.com | [14e 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org2.example.com | [14f 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +orderer2.example.com | "2020-10-14 19:01:00.173 UTC [orderer.consensus.etcdraft] start -> INFO 044 Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer2.example.com | "2020-10-14 19:01:00.173 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 045 3 became follower at term 0" channel=businesschannel node=3 +peer0.org2.example.com | [0e5 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | 00000040 b5 c1 b7 4e 4e f2 |...NN.| +peer0.org1.example.com | [13f 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] NewStandardValues -> DEBU 2bd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] validateMSP -> DEBU 2bf Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [msp] newBccspMsp -> DEBU 2c0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [msp] New -> DEBU 2c1 Creating Cache-MSP instance" +orderer2.example.com | "2020-10-14 19:01:00.173 UTC [orderer.consensus.etcdraft] newRaft -> INFO 046 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +peer0.org1.example.com | [140 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [msp] Setup -> DEBU 2c2 Setting up MSP instance Org1MSP" +orderer2.example.com | "2020-10-14 19:01:00.173 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 047 3 became follower at term 1" channel=businesschannel node=3 +peer1.org2.example.com | [150 10-14 19:01:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [0e6 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [11e 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [11f 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 38 cd 16 00 e7 31 12 8a 1e 7f |0E.!..8....1....| +peer0.org1.example.com | [141 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1305474A630528A4B852DBFB7E9F0CBD45F9906051DF2982836FF12E5A7E7CC1 +peer0.org1.example.com | [142 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer2.example.com | "2020-10-14 19:01:00.177 UTC [orderer.consensus.etcdraft] apply -> INFO 048 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:00.177 UTC [orderer.consensus.etcdraft] apply -> INFO 049 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:00.177 UTC [orderer.consensus.etcdraft] apply -> INFO 04a Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:01.196 UTC [orderer.consensus.etcdraft] Step -> INFO 04b 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:01.205 UTC [orderer.consensus.etcdraft] Step -> INFO 04c 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:01.206 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 04d 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:01.206 UTC [orderer.consensus.etcdraft] Step -> INFO 04e 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +peer0.org2.example.com | [0e7 10-14 19:00:50.18 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +orderer2.example.com | "2020-10-14 19:01:01.211 UTC [orderer.consensus.etcdraft] run -> INFO 04f raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +peer1.org2.example.com | [151 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [0e8 10-14 19:00:54.13 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org1.example.com | 00000010 6f e1 03 4f 61 84 c1 86 ca f7 67 e6 85 9c fb b3 |o..Oa.....g.....| +peer0.org1.example.com | [144 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [msp.identity] newIdentity -> DEBU 2c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer2.example.com | "2020-10-14 19:01:01.213 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 050 Raft leader changed: 0 -> 1" channel=businesschannel node=3 +peer1.org2.example.com | [152 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [0e9 10-14 19:00:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer1.org1.example.com | 00000020 29 04 67 61 95 02 20 74 96 38 14 a9 aa 62 ad fe |).ga.. t.8...b..| +peer0.org1.example.com | [145 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer2.example.com | "2020-10-14 19:01:05.498 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:07.790 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:54.244 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 053 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:01:57.259 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 054 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:02:00.077 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 055 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:02:16.314 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 056 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-10-14 19:02:16.322 UTC [cauthdsl] deduplicate -> WARN 057 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer2.example.com | "2020-10-14 19:02:16.329 UTC [cauthdsl] deduplicate -> WARN 058 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer1.org2.example.com | [153 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [154 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [155 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org2.example.com | [156 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org2.example.com | [157 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [159 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org2.example.com | [158 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org2.example.com | [15a 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org2.example.com | [15b 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [15c 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org2.example.com | [15d 10-14 19:01:02.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 28ms (state_validation=4ms block_and_pvtdata_commit=13ms state_commit=5ms) commitHash=[] +peer1.org2.example.com | [15e 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org2.example.com | [15f 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [682b10e6-d04e-4866-abd2-fb388652d175] +peer1.org2.example.com | [160 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org2.example.com | [161 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [682b10e6-d04e-4866-abd2-fb388652d175] +peer1.org2.example.com | [162 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [163 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [164 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [165 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [166 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [167 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [168 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [169 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [16a 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [16b 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [16c 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [16d 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [16e 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [16f 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [170 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [171 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [172 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [173 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [174 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [175 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [176 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [177 10-14 19:01:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [178 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [179 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [17a 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [17b 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [17c 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [17d 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [17e 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [17f 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org2.example.com | [180 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [181 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [182 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [183 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [184 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [185 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [186 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [187 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [188 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [189 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [18a 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [18b 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [18c 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [18d 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [18e 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [18f 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [190 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [191 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [192 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org1.example.com | 00000030 05 38 88 eb 78 d5 7a c3 4d 1f f1 d6 61 75 d0 2b |.8..x.z.M...au.+| +peer1.org1.example.com | 00000040 96 ca 48 75 3e fc 71 |..Hu>.q| +peer1.org1.example.com | [120 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [121 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [122 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [123 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [124 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 b9 20 45 92 aa fc 80 28 86 54 e4 d9 db 1f 12 |.. E....(.T.....| +peer1.org1.example.com | 00000010 09 ee 5f c7 06 ee da 11 d3 5e bb 32 72 31 26 f4 |.._......^.2r1&.| +peer1.org1.example.com | [125 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb f5 45 10 e6 43 f5 29 62 72 68 |0E.!...E..C.)brh| +peer1.org1.example.com | 00000010 fd 3b a2 e3 f6 bf d1 62 08 70 24 a4 c8 74 2f d0 |.;.....b.p$..t/.| +peer1.org1.example.com | 00000020 0e 76 39 a8 c7 02 20 6a 09 8a e1 0a b4 63 8d bb |.v9... j.....c..| +peer1.org1.example.com | 00000030 2d c8 93 29 79 fa 9e 72 d0 88 5e 97 24 6d 1c 2b |-..)y..r..^.$m.+| +peer1.org1.example.com | 00000040 b3 dd f7 8f 55 e1 04 |....U..| +peer1.org1.example.com | [126 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [127 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 70 c6 4b b0 cb 3d c8 fb 4c 6e |0E.!..p.K..=..Ln| +peer1.org1.example.com | 00000010 e8 57 d8 8b 28 20 df a2 d6 ca 98 26 c8 79 8f fb |.W..( .....&.y..| +peer1.org1.example.com | 00000020 b9 3a ff 21 0c 02 20 05 07 f9 44 8c 7a 67 88 52 |.:.!.. ...D.zg.R| +peer1.org1.example.com | 00000030 af e9 7e e4 65 d1 3c a3 a9 c1 fc e5 fb 61 d3 a2 |..~.e.<......a..| +peer1.org1.example.com | 00000040 14 a0 ca ec a8 fa e8 |.......| +peer1.org1.example.com | [128 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [129 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer1.org1.example.com | [12a 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12b 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d 10-14 19:00:51.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e 10-14 19:00:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [12f 10-14 19:00:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [130 10-14 19:00:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [131 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [132 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [133 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [134 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5ADBB0EDA765D8AA1FE2A1841FD82095547BC9BA59C69364EDA7233C317B9003 +peer1.org1.example.com | [135 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [136 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [137 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [138 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [139 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer1.org1.example.com | [13a 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [13c 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [13d 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes +peer1.org1.example.com | [140 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes +peer1.org1.example.com | [141 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [142 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes +peer1.org1.example.com | [143 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a db b0 ed a7 65 d8 aa 1f e2 a1 84 1f d8 20 95 |Z....e........ .| +peer1.org1.example.com | 00000010 54 7b c9 ba 59 c6 93 64 ed a7 23 3c 31 7b 90 03 |T{..Y..d..#<1{..| +peer1.org2.example.com | [193 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [194 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [195 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [196 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [197 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [198 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [199 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [19a 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [19b 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [19c 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [19d 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [19e 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [19f 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1a0 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1a1 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [1a2 10-14 19:01:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [1a3 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [1a4 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [1a5 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [1a6 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [1a7 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [1a8 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [1a9 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [1aa 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [1ab 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [1ac 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [1ad 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [1ae 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1af 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [1b0 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [143 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [146 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [147 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [148 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [144 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a5 3f a1 67 9e 33 4f b7 f8 08 |0E.!...?.g.3O...| +peer1.org1.example.com | 00000010 b6 f0 8a bd 61 f8 6c 90 d1 fb 97 8e 92 05 15 7a |....a.l........z| +peer1.org1.example.com | 00000020 9b 05 a3 f6 ea 02 20 2a 55 79 65 2f a1 fb d9 8e |...... *Uye/....| +peer1.org1.example.com | 00000030 e1 f7 87 70 9b db c7 5d 8e f7 90 7f 95 cd 8e 1c |...p...]........| +peer1.org1.example.com | 00000040 02 ce ec 53 1f cf d4 |...S...| +peer1.org1.example.com | [145 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [146 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 c9 18 56 a1 c4 63 4a 56 64 9f |0E.!....V..cJVd.| +peer1.org1.example.com | 00000010 bb 32 87 17 92 cd 8a b1 7b 86 66 98 29 c4 e6 51 |.2......{.f.)..Q| +peer1.org1.example.com | 00000020 29 da 89 39 fc 02 20 39 87 08 a8 83 c9 83 80 5b |)..9.. 9.......[| +peer1.org1.example.com | 00000030 e2 ab 4a 75 7a ba 2e 33 02 51 ed 2b 59 ae e0 fc |..Juz..3.Q.+Y...| +peer1.org1.example.com | 00000040 eb 51 9c 55 a7 0e fa |.Q.U...| +peer1.org1.example.com | [147 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [148 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [149 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d c6 9e eb 80 05 5e 45 4e 8c ad d1 a6 e4 84 c8 |}.....^EN.......| +peer1.org1.example.com | 00000010 7d 36 58 86 54 f3 d4 d2 71 10 26 e2 6a b5 02 77 |}6X.T...q.&.j..w| +peer1.org1.example.com | [14b 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 4b 3f 04 27 72 dd a7 85 7c e0 |0E.!..K?.'r...|.| +peer1.org1.example.com | 00000010 77 f1 0c cc 78 41 de 74 c0 fa 8d ca 45 ce 97 1b |w...xA.t....E...| +peer1.org1.example.com | 00000020 d5 f2 d2 bc 2e 02 20 3e ab 29 4d e4 6a b1 f0 93 |...... >.)M.j...| +peer1.org1.example.com | 00000030 1e 28 0e 35 61 0b 16 f3 65 e4 b4 fa 03 84 05 7c |.(.5a...e......|| +peer1.org1.example.com | 00000040 53 30 b1 24 f8 76 09 |S0.$.v.| +peer1.org1.example.com | [14c 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [14d 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 4c ad d6 98 4d 01 87 1c 19 c7 |0E.!..L...M.....| +peer1.org1.example.com | 00000010 f0 1b 9c 3d c7 97 2a 6d 99 83 c0 33 d4 41 9c e6 |...=..*m...3.A..| +peer1.org1.example.com | 00000020 aa bf fb 71 67 02 20 1b f3 ea 0f 37 f1 4f d9 8f |...qg. ....7.O..| +peer1.org1.example.com | 00000030 90 7b 94 2c 03 76 3f 91 f5 4f 9e e7 be cd 42 f9 |.{.,.v?..O....B.| +peer1.org1.example.com | 00000040 b9 f7 4c b3 58 6c 50 |..L.XlP| +peer1.org1.example.com | [14e 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [14f 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [0ea 10-14 19:00:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [0eb 10-14 19:00:58.13 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer0.org2.example.com | [0ec 10-14 19:01:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer0.org2.example.com | [0ed 10-14 19:01:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [0ee 10-14 19:01:02.13 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer0.org2.example.com | [0ef 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:52912 +peer0.org2.example.com | [0f0 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025f3040 +peer0.org2.example.com | [0f1 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [0f2 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [0f3 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [0f4 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [0f5 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [0f6 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [0f7 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [0f8 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [0f9 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b a4 43 79 15 c5 5c f4 ba c4 dc 9c 8d 80 59 fa |..Cy..\.......Y.| +peer0.org2.example.com | 00000010 08 95 c9 73 0e 67 65 b7 9c 73 fd c1 b5 b0 98 a4 |...s.ge..s......| +peer0.org2.example.com | [0fa 10-14 19:01:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 34 6d 29 45 7f 4b 79 cd c5 cc da |0D. F4m)E.Ky....| +peer0.org2.example.com | 00000010 d2 dc 11 01 24 d1 3b 9e 6e 14 61 34 bf f1 79 59 |....$.;.n.a4..yY| +peer0.org2.example.com | 00000020 43 91 7b 13 02 20 12 26 60 49 d0 e4 66 1e ea 5f |C.{.. .&`I..f.._| +peer0.org2.example.com | 00000030 90 86 59 a4 1d 9a 6b fa ab 33 cc 7b ec 57 ce 4d |..Y...k..3.{.W.M| +peer0.org2.example.com | 00000040 d9 d0 c6 ff ae b2 |......| +peer0.org2.example.com | [0fb 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [0fc 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000158310, header 0xc0025f3950 +peer0.org2.example.com | [0fd 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [0fe 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU [][0423c4e8] processing txid: 0423c4e8b181b0307b568ba53473eb29773833e3c9cdf7a91d8bd491d72b34bb +peer0.org2.example.com | [0ff 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU [][0423c4e8] Entry chaincode: name:"cscc" +peer0.org2.example.com | [100 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> INFO [][0423c4e8] Entry chaincode: name:"cscc" +peer0.org2.example.com | [101 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [102 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer0.org2.example.com | [103 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [104 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [105 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [106 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [107 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [108 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [109 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b a4 43 79 15 c5 5c f4 ba c4 dc 9c 8d 80 59 fa |..Cy..\.......Y.| +peer0.org2.example.com | 00000010 08 95 c9 73 0e 67 65 b7 9c 73 fd c1 b5 b0 98 a4 |...s.ge..s......| +peer0.org2.example.com | [10a 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 34 6d 29 45 7f 4b 79 cd c5 cc da |0D. F4m)E.Ky....| +peer0.org2.example.com | 00000010 d2 dc 11 01 24 d1 3b 9e 6e 14 61 34 bf f1 79 59 |....$.;.n.a4..yY| +peer0.org2.example.com | 00000020 43 91 7b 13 02 20 12 26 60 49 d0 e4 66 1e ea 5f |C.{.. .&`I..f.._| +peer0.org2.example.com | 00000030 90 86 59 a4 1d 9a 6b fa ab 33 cc 7b ec 57 ce 4d |..Y...k..3.{.W.M| +peer0.org2.example.com | 00000040 d9 d0 c6 ff ae b2 |......| +peer0.org2.example.com | [10b 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org2.example.com | [10c 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org2.example.com | [10d 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org2.example.com | [10e 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org2.example.com | [10f 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org2.example.com | [110 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org2.example.com | [111 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org2.example.com | [112 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org2.example.com | [113 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org2.example.com | [114 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org2.example.com | [115 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org2.example.com | [116 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00260be00)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org2.example.com | [117 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org2.example.com | [118 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org2.example.com | [119 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org2.example.com | [11b 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org2.example.com | [11c 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org1.example.com | [150 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org2.example.com | [11d 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org1.example.com | [151 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [1b1 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [149 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [11e 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [152 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1b2 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [14b 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [11f 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org1.example.com | [153 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [154 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [155 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [156 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [157 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [158 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [159 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [15a 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15b 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b3 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15c 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [15d 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 05 47 4a 63 05 28 a4 b8 52 db fb 7e 9f 0c bd |..GJc.(..R..~...| +peer1.org1.example.com | 00000010 45 f9 90 60 51 df 29 82 83 6f f1 2e 5a 7e 7c c1 |E..`Q.)..o..Z~|.| +peer1.org1.example.com | [15f 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 76 8f c0 34 10 71 bc 07 05 93 d3 |0D. Mv..4.q.....| +peer1.org1.example.com | 00000010 0e 01 51 fc 87 a5 63 d7 ce e5 70 61 41 fb 3e fb |..Q...c...paA.>.| +peer1.org1.example.com | 00000020 66 ce e0 b9 02 20 0e bb a4 1f b8 d8 b0 18 7c 59 |f.... ........|Y| +peer1.org1.example.com | 00000030 91 d9 e9 a6 e2 05 b0 32 59 24 99 66 6a 5c 1e 4e |.......2Y$.fj\.N| +peer1.org1.example.com | 00000040 a5 ae ef ec 9a 7c |.....|| +peer1.org1.example.com | [160 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [161 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 45 f7 30 af a9 bb b9 84 cb 66 |0E.!..E.0......f| +peer1.org1.example.com | 00000010 1e 16 4a 94 49 ef ef 83 39 f4 f8 ae fa fc e3 b2 |..J.I...9.......| +peer1.org1.example.com | 00000020 13 79 c6 6b 48 02 20 12 1b 2c d8 32 f9 1a 67 e2 |.y.kH. ..,.2..g.| +peer1.org1.example.com | 00000030 ed ba f4 25 20 e0 38 0c fa 5e 57 39 ea 2f db 6a |...% .8..^W9./.j| +peer1.org1.example.com | 00000040 af 85 e6 fb c9 24 4c |.....$L| +peer1.org1.example.com | [162 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1b4 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [1b5 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [1b6 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [1b7 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [1b8 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [1b9 10-14 19:01:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [1ba 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [1bb 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [1bc 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [1bd 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [1be 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1bf 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [1c0 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [1c1 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [1c2 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [1c3 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [1c4 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [1c5 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [1c6 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [1c7 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [1c8 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [1c9 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [1ca 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [1cb 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [1cc 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [1cd 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [1ce 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [1cf 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [1d0 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [1d1 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [1d2 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [1d3 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [1d4 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [1d5 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [1d6 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [1d7 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [1d8 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [1d9 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1da 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1db 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [1dc 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [1dd 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [1de 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [1df 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [1e0 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [1e1 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [1e2 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1e3 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1e4 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [1e5 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [1e6 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [1e7 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [1e8 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [1e9 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [1ea 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [120 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org2.example.com | [121 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org2.example.com | [11a 10-14 19:01:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer0.org2.example.com | [123 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org2.example.com | [124 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org2.example.com | [125 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org2.example.com | [122 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [126 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org2.example.com | [127 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org2.example.com | [128 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org2.example.com | [129 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org2.example.com | [12a 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [12b 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [12c 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [12d 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org2.example.com | [12e 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [12f 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [130 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [131 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [132 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [133 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [134 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [14c 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [14e 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 05 47 4a 63 05 28 a4 b8 52 db fb 7e 9f 0c bd |..GJc.(..R..~...| +peer0.org1.example.com | 00000010 45 f9 90 60 51 df 29 82 83 6f f1 2e 5a 7e 7c c1 |E..`Q.)..o..Z~|.| +peer0.org1.example.com | [14f 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 76 8f c0 34 10 71 bc 07 05 93 d3 |0D. Mv..4.q.....| +peer0.org1.example.com | 00000010 0e 01 51 fc 87 a5 63 d7 ce e5 70 61 41 fb 3e fb |..Q...c...paA.>.| +peer0.org1.example.com | 00000020 66 ce e0 b9 02 20 0e bb a4 1f b8 d8 b0 18 7c 59 |f.... ........|Y| +peer0.org1.example.com | 00000030 91 d9 e9 a6 e2 05 b0 32 59 24 99 66 6a 5c 1e 4e |.......2Y$.fj\.N| +peer0.org1.example.com | 00000040 a5 ae ef ec 9a 7c |.....|| +peer0.org1.example.com | [150 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [151 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 45 f7 30 af a9 bb b9 84 cb 66 |0E.!..E.0......f| +peer0.org1.example.com | 00000010 1e 16 4a 94 49 ef ef 83 39 f4 f8 ae fa fc e3 b2 |..J.I...9.......| +peer0.org1.example.com | 00000020 13 79 c6 6b 48 02 20 12 1b 2c d8 32 f9 1a 67 e2 |.y.kH. ..,.2..g.| +peer0.org1.example.com | 00000030 ed ba f4 25 20 e0 38 0c fa 5e 57 39 ea 2f db 6a |...% .8..^W9./.j| +peer0.org1.example.com | 00000040 af 85 e6 fb c9 24 4c |.....$L| +peer0.org1.example.com | [152 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [153 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [154 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 35 77 1c 9c 09 ea 80 f6 02 02 b4 94 9f 65 97 |g5w...........e.| +peer0.org1.example.com | 00000010 6c a7 4a da fc ab 8c b6 db c3 26 d3 ba b1 91 87 |l.J.......&.....| +peer0.org1.example.com | [156 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b d0 31 19 c2 44 d8 7f ae 82 47 02 |0D. ..1..D....G.| +peer0.org1.example.com | 00000010 9c 86 e1 00 48 c4 bd 6a a1 7d 81 7b d9 d5 03 a3 |....H..j.}.{....| +peer0.org1.example.com | 00000020 ce 9d 3f 32 02 20 6d 84 70 c2 ed 54 8d c6 7b 66 |..?2. m.p..T..{f| +peer0.org1.example.com | 00000030 9c 97 c2 52 a5 c8 ad 3b e9 61 b8 39 88 5d d2 42 |...R...;.a.9.].B| +peer0.org1.example.com | 00000040 45 d8 e3 4f c6 70 |E..O.p| +peer0.org1.example.com | [157 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [158 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 fc 64 e6 c4 b2 8e 7f 77 b6 c6 |0E.!...d.....w..| +peer0.org1.example.com | 00000010 a8 3e a1 04 f0 28 ac d3 2f 6d 6d 12 27 aa 3d 1d |.>...(../mm.'.=.| +peer0.org1.example.com | 00000020 2a 3b 5e 25 22 02 20 4e e1 ff 64 34 70 d0 8b 61 |*;^%". N..d4p..a| +peer0.org1.example.com | 00000030 05 39 98 c5 82 18 e3 9d cc ee 92 67 d3 5a e5 23 |.9.........g.Z.#| +peer0.org1.example.com | 00000040 64 84 a2 c5 f7 0b 22 |d....."| +peer0.org1.example.com | [159 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1eb 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [1ec 10-14 19:01:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org2.example.com | [1ed 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [1ee 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [1ef 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f0 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4F3E4C58EA1FC9E16...A55D1049CA35F5343DC503CE2A020801 +peer1.org2.example.com | [1f1 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 57E9D6B1758C50C5F99E9BA26DF778293C38DDFFBFD276298F824E7D74B20DEA +peer1.org2.example.com | [1f2 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [1f3 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [1f4 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org2.example.com | [1f5 10-14 19:01:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [1f6 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [1f7 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [1f8 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [1f9 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [1fa 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org2.example.com | [1fb 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org2.example.com | [1fc 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org2.example.com | [1fd 10-14 19:01:03.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [1fe 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ff 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [200 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [201 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org2.example.com | [202 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org2.example.com | [203 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org2.example.com | [204 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org2.example.com | [205 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer1.org2.example.com | [206 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer1.org2.example.com | [207 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [208 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [73c6268f-e475-4321-a3e0-d5f19760856b] +peer1.org2.example.com | [209 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [20a 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [20b 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [20c 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU [73c6268f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [20d 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU [73c6268f] notifying Txid:73c6268f-e475-4321-a3e0-d5f19760856b, channelID:businesschannel +peer1.org2.example.com | [20e 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [20f 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [210 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [73c6268f-e475-4321-a3e0-d5f19760856b] +peer1.org2.example.com | [211 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [212 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f49b0d37-30f1-4738-b4c6-0a7c610d32aa] +peer1.org2.example.com | [213 10-14 19:01:03.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [214 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [215 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [f49b0d37] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [216 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [f49b0d37] notifying Txid:f49b0d37-30f1-4738-b4c6-0a7c610d32aa, channelID:businesschannel +peer1.org2.example.com | [217 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [218 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [219 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f49b0d37-30f1-4738-b4c6-0a7c610d32aa] +peer1.org2.example.com | [21a 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [21b 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [df2bbfad-08c4-41f2-bd3e-6da46ab1c48f] +peer1.org2.example.com | [21c 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [21d 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [21e 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [df2bbfad] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [21f 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [df2bbfad] notifying Txid:df2bbfad-08c4-41f2-bd3e-6da46ab1c48f, channelID:businesschannel +peer1.org2.example.com | [220 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [221 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [222 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [df2bbfad-08c4-41f2-bd3e-6da46ab1c48f] +peer1.org2.example.com | [223 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [224 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1fd6faf9-215b-4f24-be38-3c8577c4f4cc] +peer1.org2.example.com | [225 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [226 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1fd6faf9-215b-4f24-be38-3c8577c4f4cc] +peer1.org2.example.com | [227 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [228 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4F3E4C58EA1FC9E16...A55D1049CA35F5343DC503CE2A020801 +peer1.org2.example.com | [229 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3DCB0194DA9EAC1444B797C67A83A20E933F807B5684A1F55FB61F092112600 +peer1.org2.example.com | [22a 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [22b 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [4cb86497] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [22c 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [4cb86497] notifying Txid:4cb86497d6cff59505f3467f0a2aa2a09b832927e26c8f6a15068597a1de6d8f, channelID: +peer1.org2.example.com | [22d 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [22e 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO [][4cb86497] Exit chaincode: name:"cscc" (130ms) +peer1.org2.example.com | [22f 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU [][4cb86497] Exit +peer1.org2.example.com | [230 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47150 +peer1.org2.example.com | [231 10-14 19:01:03.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47150 grpc.code=OK grpc.call_duration=135.0677ms +peer1.org2.example.com | [232 10-14 19:01:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:47150: read: connection reset by peer +peer1.org2.example.com | [233 10-14 19:01:03.03 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [234 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47158 +peer1.org2.example.com | [235 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00264fcc0 +peer1.org2.example.com | [236 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [237 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [238 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [239 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [23a 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 59 a6 fe f4 af d4 ee b7 a8 5e 45 d3 5e 01 5e |.Y........^E.^.^| +peer1.org2.example.com | 00000010 b5 11 af 0b 2e 8d 9e ea a2 d7 26 c2 11 44 bf 77 |..........&..D.w| +peer1.org2.example.com | [23b 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de fd 97 9a 99 39 fe a7 65 6b 08 |0E.!......9..ek.| +peer1.org2.example.com | 00000010 1f f1 0e a9 30 bf 5e d6 3a e8 7a 22 69 9b b8 19 |....0.^.:.z"i...| +peer1.org2.example.com | 00000020 cf c3 30 e6 5b 02 20 7b 52 6d 1b 38 bb 54 17 91 |..0.[. {Rm.8.T..| +peer1.org2.example.com | 00000030 63 be e6 ac 71 c6 e7 c9 38 bf 6c 1a 2d de fb ae |c...q...8.l.-...| +peer1.org2.example.com | 00000040 0d 26 95 96 45 8f 9d |.&..E..| +peer1.org2.example.com | [23c 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [23d 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000122f50, header 0xc002f520f0 +peer1.org2.example.com | [23e 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [23f 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [][0e259e53] processing txid: 0e259e5329391c62dd212bcea1dbf69f8280dfa8e2e7620a08151b2d21e83cae +peer1.org2.example.com | [240 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [][0e259e53] Entry chaincode: name:"cscc" +peer1.org2.example.com | [241 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [][0e259e53] Entry chaincode: name:"cscc" +peer1.org2.example.com | [242 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [243 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [244 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [245 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [246 10-14 19:01:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [247 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 59 a6 fe f4 af d4 ee b7 a8 5e 45 d3 5e 01 5e |.Y........^E.^.^| +peer1.org2.example.com | 00000010 b5 11 af 0b 2e 8d 9e ea a2 d7 26 c2 11 44 bf 77 |..........&..D.w| +peer1.org2.example.com | [248 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de fd 97 9a 99 39 fe a7 65 6b 08 |0E.!......9..ek.| +peer1.org2.example.com | 00000010 1f f1 0e a9 30 bf 5e d6 3a e8 7a 22 69 9b b8 19 |....0.^.:.z"i...| +peer1.org2.example.com | 00000020 cf c3 30 e6 5b 02 20 7b 52 6d 1b 38 bb 54 17 91 |..0.[. {Rm.8.T..| +peer1.org2.example.com | 00000030 63 be e6 ac 71 c6 e7 c9 38 bf 6c 1a 2d de fb ae |c...q...8.l.-...| +peer1.org2.example.com | 00000040 0d 26 95 96 45 8f 9d |.&..E..| +peer1.org2.example.com | [249 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU [0e259e53] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [24a 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU [0e259e53] notifying Txid:0e259e5329391c62dd212bcea1dbf69f8280dfa8e2e7620a08151b2d21e83cae, channelID: +peer1.org2.example.com | [24b 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [24c 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> INFO [][0e259e53] Exit chaincode: name:"cscc" (4ms) +peer1.org2.example.com | [24d 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU [][0e259e53] Exit +peer1.org2.example.com | [24e 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47158 +peer1.org2.example.com | [24f 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47158 grpc.code=OK grpc.call_duration=8.2032ms +peer1.org2.example.com | [250 10-14 19:01:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [251 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting, peers found 0 +peer1.org2.example.com | [252 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [253 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [254 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [255 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [256 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...7482120C088498A4D78EA1FC9E161001 +peer1.org2.example.com | [257 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EAFED5437ED69E4769649563C30D126657AD9F9FB495B4E48302B791E51CBDCE +peer1.org2.example.com | [258 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [259 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47166 +peer1.org2.example.com | [25a 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002f52c30 +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c6 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c7 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c8 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c9 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ca Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:48.020 UTC [common.channelconfig] NewStandardValues -> DEBU 2cb Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:48.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cc Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:48.020 UTC [common.channelconfig] NewStandardValues -> DEBU 2cd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:48.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ce Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:48.020 UTC [common.channelconfig] validateMSP -> DEBU 2cf Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.025 UTC [msp] newBccspMsp -> DEBU 2d0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:48.025 UTC [msp] New -> DEBU 2d1 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:48.025 UTC [msp] Setup -> DEBU 2d2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:48.038 UTC [msp.identity] newIdentity -> DEBU 2d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:48.044 UTC [msp] Setup -> DEBU 2d4 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:48.044 UTC [msp] Setup -> DEBU 2d5 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:48.044 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2dd Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2de Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e2 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e3 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e4 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e5 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] GetPolicy -> DEBU 2e6 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e7 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e8 Proposed new policy Admins for Channel" +peer1.org1.example.com | [163 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [164 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [165 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [166 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [167 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [168 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [169 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [16b 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16c 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [16d 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6735771C9C09EA80F60202B4949F65976CA74ADAFCAB8CB6DBC326D3BAB19187 +peer1.org1.example.com | [16e 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16f 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [170 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [171 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [172 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > alive:\241\004\360(\254\323/mm\022'\252=\035*;^%\"\002 N\341\377d4p\320\213a\0059\230\305\202\030\343\235\314\356\222g\323Z\345#d\204\242\305\367\013\"" > > +peer1.org1.example.com | [173 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [174 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [176 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [177 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [178 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AF44C1BA3BA43D4B232C88A5C40C1F83FFF3CCA0DDB7E7ECD6BA06ED8F39DD02 +peer1.org1.example.com | [179 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [17a 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [17b 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [17c 10-14 19:00:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [17d 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org1.example.com:7051 +peer1.org1.example.com | [17e 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [17f 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [180 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [181 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [182 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [183 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [184 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7956695964355294646, Envelope: 960 bytes, Signature: 0 bytes +peer1.org1.example.com | [185 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7956695964355294646, Envelope: 960 bytes, Signature: 0 bytes +peer1.org1.example.com | [186 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer1.org1.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer1.org1.example.com | [187 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 38 38 3e f0 ca 9b 8c d8 f0 2d 18 |0D. ;88>......-.| +peer1.org1.example.com | 00000010 b7 87 f4 70 e6 25 52 0c 1b 8c e0 cb ed 4c 1b 91 |...p.%R......L..| +peer1.org1.example.com | 00000020 91 8a 6f c0 02 20 0b d8 77 32 2c f8 ce ee 02 f4 |..o.. ..w2,.....| +peer1.org1.example.com | 00000030 e1 8e d3 5e 65 ce 81 82 af d7 44 89 ff 80 f5 17 |...^e.....D.....| +peer1.org1.example.com | 00000040 8f c1 f4 89 79 c5 |....y.| +peer1.org1.example.com | [188 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 7956695964355294646, Envelope: 960 bytes, Signature: 0 bytes +peer1.org1.example.com | [189 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [18a 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 2 +peer1.org1.example.com | [18b 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [18d 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [18e 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [18f 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [190 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [191 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-10-14 19:00:48.047 UTC [policies] GetPolicy -> DEBU 2e9 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-10-14 19:00:48.047 UTC [policies] NewManagerImpl -> DEBU 2ea Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:48.054 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:48.054 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-10-14 19:00:48.055 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:48.064 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:48.064 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:48.065 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:48.065 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:48.067 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:48.067 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 309 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 30a Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30b Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30c Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30d Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [common.configtx] addToMap -> DEBU 310 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [common.configtx] addToMap -> DEBU 311 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [common.channelconfig] LogSanityChecks -> DEBU 312 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 314 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 315 Manager Channel has managers Consortiums" +orderer0.example.com | "2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 316 Manager Channel has managers Orderer" +peer1.org1.example.com | [192 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [193 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [194 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [195 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b e2 0e 27 fe 2d cd a0 75 d0 76 a5 44 3f f5 2c |...'.-..u.v.D?.,| +peer1.org1.example.com | 00000010 a6 46 ba 91 8a ed 76 6a a7 82 fc d8 9a 1c ee 24 |.F....vj.......$| +peer1.org1.example.com | [196 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a 78 14 9d 01 81 aa 64 a9 5a ee ea |0D. .x.....d.Z..| +peer1.org1.example.com | 00000010 5f 75 78 00 96 6b f0 da bd 63 b4 c6 7e e6 0c f9 |_ux..k...c..~...| +peer1.org1.example.com | 00000020 95 b3 01 79 02 20 74 a0 6d ba 38 9b 15 7f e0 84 |...y. t.m.8.....| +peer1.org1.example.com | 00000030 67 7b 9b c8 39 d9 45 a1 84 42 d9 94 36 e8 d5 93 |g{..9.E..B..6...| +peer1.org1.example.com | 00000040 ea 1b 8e bc 54 99 |....T.| +peer1.org1.example.com | [197 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [198 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 5b 73 88 2a d1 5a 35 66 e1 e9 3b |0D. .[s.*.Z5f..;| +peer1.org1.example.com | 00000010 e4 1e b4 7e b3 18 9d 4e 0c 67 13 10 14 c6 32 a5 |...~...N.g....2.| +peer1.org1.example.com | 00000020 fc bc 22 b1 02 20 2c 10 bc 47 9d 57 b4 6d fa d2 |..".. ,..G.W.m..| +peer1.org1.example.com | 00000030 40 e5 64 bb 4c 18 c4 33 c7 a7 73 9b ef 1e ea 36 |@.d.L..3..s....6| +peer1.org1.example.com | 00000040 5a 8c 52 40 d0 8b |Z.R@..| +peer0.org1.example.com | [15a 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [15b 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [15c 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [15d 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [15e 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [160 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [161 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [162 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [163 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [164 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [165 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [166 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [135 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [136 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [137 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [138 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [139 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002672f00)} +peer0.org2.example.com | [13a 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [13b 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [13c 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [13d 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org2.example.com | [13e 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org2.example.com | [13f 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org2.example.com | [140 10-14 19:01:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org2.example.com | [141 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +peer0.org2.example.com | txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +peer0.org2.example.com | ] +peer0.org2.example.com | [142 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to txid-index +peer0.org2.example.com | [143 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to blockNumTranNum index +peer0.org2.example.com | [144 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org2.example.com | [145 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org2.example.com | [146 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org2.example.com | [147 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org2.example.com | [148 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [149 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org2.example.com | [14a 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org2.example.com | [14d 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | [14e 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [14f 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org2.example.com | [14b 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [150 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org2.example.com | [14c 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [151 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [152 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [153 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [154 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [155 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org2.example.com | [157 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org2.example.com | [158 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [167 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [168 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 44 c1 ba 3b a4 3d 4b 23 2c 88 a5 c4 0c 1f 83 |.D..;.=K#,......| +peer0.org1.example.com | 00000010 ff f3 cc a0 dd b7 e7 ec d6 ba 06 ed 8f 39 dd 02 |.............9..| +peer0.org1.example.com | [169 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 55 91 10 a7 70 b4 b8 17 de 41 ff |0D. GU...p....A.| +peer0.org1.example.com | 00000010 29 12 18 7f c7 69 84 7e 0c f0 26 2f 7f c8 91 e2 |)....i.~..&/....| +peer0.org1.example.com | 00000020 8d d7 55 44 02 20 76 c1 eb 7a ca 78 86 14 60 95 |..UD. v..z.x..`.| +peer0.org1.example.com | 00000030 53 16 91 c6 77 f5 01 74 7f 65 b5 95 a3 32 f1 53 |S...w..t.e...2.S| +peer0.org1.example.com | 00000040 f8 bd 0c 73 38 82 |...s8.| +peer0.org1.example.com | [16a 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [16b 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 9e 05 18 72 bd a0 99 c4 fa a0 d7 |0D. 8...r.......| +peer0.org1.example.com | 00000010 24 fd 83 b0 72 85 d3 0a de f8 40 31 6f f8 3e e9 |$...r.....@1o.>.| +peer0.org1.example.com | 00000020 ba 3f 44 8a 02 20 49 d2 f9 e9 b0 32 da 63 3a cf |.?D.. I....2.c:.| +peer0.org1.example.com | 00000030 f9 31 18 a6 ab 38 24 e8 03 48 90 07 0c fe eb 2a |.1...8$..H.....*| +peer0.org1.example.com | 00000040 7a 88 0e 1d bd c5 |z.....| +peer0.org1.example.com | [16c 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [16d 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [16e 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [16f 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [25b 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [25c 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [25d 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [25e 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [25f 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 7f 1a eb c6 5a 3f 8e 8d d4 67 7b 16 74 05 d6 |.....Z?...g{.t..| +peer1.org2.example.com | 00000010 63 cb 7a a2 58 ef 06 84 5a d0 fa f7 e5 1a 06 e8 |c.z.X...Z.......| +peer1.org2.example.com | [260 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 2c 34 82 6f 05 84 c9 7c 72 a8 a5 |0D. w,4.o...|r..| +peer1.org2.example.com | 00000010 a7 d7 a4 51 22 b7 cb 2e 07 53 71 16 a9 b0 31 7e |...Q"....Sq...1~| +peer1.org2.example.com | 00000020 09 b7 08 9e 02 20 5d bc 84 16 64 bb 03 27 10 0c |..... ]...d..'..| +peer1.org2.example.com | 00000030 54 49 66 8a d3 b1 4e 1e 46 6a 72 a7 86 85 51 cb |TIf...N.Fjr...Q.| +peer1.org2.example.com | 00000040 4b f9 ad 14 c2 bb |K.....| +peer1.org2.example.com | [261 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [262 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000123500, header 0xc002f53040 +peer1.org2.example.com | [263 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [264 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU [][10bc1829] processing txid: 10bc18294b0935b00d8598e040de20f153ce2c849bf03e4953a7e26ca5bdc515 +peer1.org2.example.com | [265 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU [][10bc1829] Entry chaincode: name:"qscc" +peer1.org2.example.com | [266 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> INFO [][10bc1829] Entry chaincode: name:"qscc" +peer1.org2.example.com | [267 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [268 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [269 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [26a 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [26b 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26c 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26d 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [26e 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [270 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 gate 1602702064884670600 evaluation starts +peer1.org2.example.com | [271 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [272 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [273 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [274 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 principal evaluation fails +peer1.org2.example.com | [275 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f86e40 gate 1602702064884670600 evaluation fails +peer1.org2.example.com | [276 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [277 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [278 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [279 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 gate 1602702064886237700 evaluation starts +peer1.org2.example.com | [27a 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27b 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [27c 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [27d 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [27e 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [27f 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 principal matched by identity 0 +peer1.org2.example.com | [280 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 7f 1a eb c6 5a 3f 8e 8d d4 67 7b 16 74 05 d6 |.....Z?...g{.t..| +peer1.org2.example.com | 00000010 63 cb 7a a2 58 ef 06 84 5a d0 fa f7 e5 1a 06 e8 |c.z.X...Z.......| +peer1.org2.example.com | [281 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 2c 34 82 6f 05 84 c9 7c 72 a8 a5 |0D. w,4.o...|r..| +peer1.org2.example.com | 00000010 a7 d7 a4 51 22 b7 cb 2e 07 53 71 16 a9 b0 31 7e |...Q"....Sq...1~| +peer0.org1.example.com | [170 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [171 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [172 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [174 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [175 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [176 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1BE20E27FE2DCDA075D076A5443FF52CA646BA918AED766AA782FCD89A1CEE24 +peer0.org1.example.com | [177 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +peer0.org1.example.com | [178 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [17a 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [179 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17b 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [17c 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [17d 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [17e 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17f 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8777768387817457078, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [180 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [182 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer0.org1.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer0.org1.example.com | [183 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 93 db 1d 90 04 4a 71 e3 4a 77 |0E.!.......Jq.Jw| +peer0.org1.example.com | 00000010 5d 7d 59 25 26 9c b2 e2 4a 04 18 6b 92 b9 a2 98 |]}Y%&...J..k....| +peer0.org1.example.com | 00000020 25 fd b2 b1 b6 02 20 04 49 ec a7 b5 ab 8c 08 e9 |%..... .I.......| +peer0.org1.example.com | 00000030 49 a6 25 70 bd dd 25 38 c8 05 4d 66 a1 ec c4 c9 |I.%p..%8..Mf....| +peer0.org1.example.com | 00000040 55 58 a2 d0 10 df 2d |UX....-| +peer0.org1.example.com | [181 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [184 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8777768387817457078, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [186 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [187 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +peer0.org1.example.com | [188 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [189 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [18c 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18f 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [190 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 2c c0 26 ff b9 df dd 74 3a 98 c9 71 b6 db 97 |[,.&....t:..q...| +peer0.org1.example.com | 00000010 34 d6 c0 66 7e 8b 9c 4f e6 ca 2a 25 c7 e1 64 0c |4..f~..O..*%..d.| +peer0.org1.example.com | [191 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 41 f5 d5 4e d2 30 03 03 0b 4c |0E.!..A..N.0...L| +peer0.org1.example.com | 00000010 09 e0 fe a1 b7 99 0e 51 ea 37 f2 a2 50 1e f8 e1 |.......Q.7..P...| +peer0.org1.example.com | 00000020 23 41 f0 b2 43 02 20 0a a7 21 7e f1 30 d4 d1 ce |#A..C. ..!~.0...| +peer1.org1.example.com | [199 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [19a 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [19b 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [19c 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [19d 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [19e 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19f 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a0 10-14 19:00:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a1 10-14 19:00:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1a2 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1a3 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a4 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a5 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a6 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a7 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a8 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a9 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1aa 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [1ab 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B2CC026FFB9DFDD743A98C971B6DB9734D6C0667E8B9C4FE6CA2A25C7E1640C +peer1.org1.example.com | [1ac 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ad 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1ae 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1af 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b0 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b1 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b2 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b3 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b4 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b5 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b6 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 2c c0 26 ff b9 df dd 74 3a 98 c9 71 b6 db 97 |[,.&....t:..q...| +peer1.org1.example.com | 00000010 34 d6 c0 66 7e 8b 9c 4f e6 ca 2a 25 c7 e1 64 0c |4..f~..O..*%..d.| +peer1.org1.example.com | [1b7 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 41 f5 d5 4e d2 30 03 03 0b 4c |0E.!..A..N.0...L| +peer1.org1.example.com | 00000010 09 e0 fe a1 b7 99 0e 51 ea 37 f2 a2 50 1e f8 e1 |.......Q.7..P...| +peer1.org1.example.com | 00000020 23 41 f0 b2 43 02 20 0a a7 21 7e f1 30 d4 d1 ce |#A..C. ..!~.0...| +peer1.org1.example.com | 00000030 3f 37 73 73 45 3f b1 29 3b d1 20 8a b5 0c 26 74 |?7ssE?.);. ...&t| +peer1.org1.example.com | 00000040 d1 91 65 00 6e 7e 3b |..e.n~;| +peer1.org1.example.com | [1b8 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1b9 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 44 fc f2 5e 71 48 14 f5 b7 0e |0E.!..D..^qH....| +peer1.org1.example.com | 00000010 7e 21 75 a8 1c b2 c0 71 73 20 89 1d 14 cc a1 5b |~!u....qs .....[| +peer1.org1.example.com | 00000020 78 a1 09 5b bb 02 20 7c 7b 6d 10 ef 35 62 96 d8 |x..[.. |{m..5b..| +peer1.org1.example.com | 00000030 ff 2a d5 e0 26 fd 25 bc 1f 53 04 c6 1a 9b 3e 8f |.*..&.%..S....>.| +peer1.org1.example.com | 00000040 c8 86 b0 63 5f 25 ac |...c_%.| +peer1.org1.example.com | [1ba 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 317 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 318 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 319 Manager Channel has managers Consortiums" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 31a Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 31b Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31d As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31e As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31f As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:00:48.073 UTC [common.capabilities] Supported -> DEBU 320 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:00:48.073 UTC [common.capabilities] Supported -> DEBU 321 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:00:48.073 UTC [orderer.common.server] func1 -> DEBU 322 Executing callback to update root CAs" +orderer0.example.com | "2020-10-14 19:00:48.073 UTC [orderer.common.server] updateTrustedRoots -> DEBU 323 updating root CAs for channel [testchainid]" +orderer0.example.com | "2020-10-14 19:00:48.073 UTC [orderer.common.server] updateTrustedRoots -> DEBU 324 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [orderer.common.server] updateTrustedRoots -> DEBU 325 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [orderer.common.server] updateTrustedRoots -> DEBU 326 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [fsblkstorage] Next -> DEBU 327 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [fsblkstorage] newBlockfileStream -> DEBU 328 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 329 Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32a Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32b blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:00:48.074 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 32c [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 32d EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 32e No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 32f No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.088 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 330 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 331 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 332 Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [fsblkstorage] Next -> DEBU 333 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [fsblkstorage] newBlockfileStream -> DEBU 334 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org2.example.com | [156 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [159 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org2.example.com | [15a 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org2.example.com | [15b 10-14 19:01:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [15c 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org2.example.com | [15d 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 18ms (state_validation=3ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[] +peer0.org2.example.com | [15e 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org2.example.com | [15f 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [362dc646-16c7-4c44-a838-750914a28169] +peer0.org2.example.com | [160 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org2.example.com | [161 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [362dc646-16c7-4c44-a838-750914a28169] +peer0.org2.example.com | [162 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [163 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [164 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [165 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [166 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [167 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [168 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [169 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [16a 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [16b 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [16c 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [16d 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [16e 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [16f 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [170 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [171 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [172 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [173 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [174 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [175 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [176 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [177 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [178 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [179 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [17a 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [17b 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [17c 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [17d 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [17e 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [17f 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer0.org2.example.com | [180 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [181 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [182 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [183 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [184 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [1bb 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1bc 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bd 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1be 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bf 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1c2 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c3 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c4 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c5 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c6 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c7 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c d9 89 dc f1 5b b3 29 f0 d3 d0 0c 4d 6e 94 45 |.....[.)....Mn.E| +peer1.org1.example.com | 00000010 97 31 b8 98 d4 93 00 6e f3 03 9d a7 06 33 5b bf |.1.....n.....3[.| +peer1.org1.example.com | [1c8 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a3 2c 92 9e 53 73 da a8 47 8b 96 |0D. [.,..Ss..G..| +peer1.org1.example.com | 00000010 a5 db 10 54 40 56 ce b9 d5 df 21 bb b6 07 86 2e |...T@V....!.....| +peer1.org1.example.com | 00000020 6d ac bb f5 02 20 61 3c 58 e2 bf 54 cb 74 52 f9 |m.... a DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1ca 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 4f 68 c4 9a 99 c7 cd f0 15 13 |0E.!..Oh........| +peer1.org1.example.com | 00000010 36 97 ef 28 e5 f7 ab 4a dc ae ea d3 5a 5a a7 9e |6..(...J....ZZ..| +peer1.org1.example.com | 00000020 28 4d c7 66 03 02 20 21 4e 8d 1b 5b 8f 43 96 77 |(M.f.. !N..[.C.w| +peer1.org1.example.com | 00000030 38 d4 0a 3b be 3e d4 cf ce fd 79 fc 5b 30 ff d0 |8..;.>....y.[0..| +peer1.org1.example.com | 00000040 62 6e 4e e9 84 90 10 |bnN....| +peer1.org1.example.com | [1cb 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1cc 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1cd 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [1ce 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [1cf 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1d0 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d1 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1d4 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:00:48.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 336 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:00:48.091 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 337 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:00:48.091 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 338 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2020-10-14 19:00:48.091 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 339 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2020-10-14 19:00:48.091 UTC [fsblkstorage] Next -> DEBU 33a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:00:48.092 UTC [fsblkstorage] newBlockfileStream -> DEBU 33b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33c Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33e blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:00:48.093 UTC [orderer.commmon.multichannel] Initialize -> INFO 33f Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer0.example.com | "2020-10-14 19:00:48.093 UTC [orderer.consensus.etcdraft] Start -> INFO 340 Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.104 UTC [orderer.common.cluster] Configure -> INFO 341 Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer1.org2.example.com | 00000020 09 b7 08 9e 02 20 5d bc 84 16 64 bb 03 27 10 0c |..... ]...d..'..| +peer1.org2.example.com | 00000030 54 49 66 8a d3 b1 4e 1e 46 6a 72 a7 86 85 51 cb |TIf...N.Fjr...Q.| +peer1.org2.example.com | 00000040 4b f9 ad 14 c2 bb |K.....| +peer1.org2.example.com | [282 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [283 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f87c90 gate 1602702064886237700 evaluation succeeds +peer1.org2.example.com | [284 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [285 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [286 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [287 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [288 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU [10bc1829] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [289 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU [10bc1829] notifying Txid:10bc18294b0935b00d8598e040de20f153ce2c849bf03e4953a7e26ca5bdc515, channelID: +peer1.org2.example.com | [28a 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [28b 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> INFO [][10bc1829] Exit chaincode: name:"qscc" (7ms) +peer1.org2.example.com | [28c 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU [][10bc1829] Exit +peer1.org2.example.com | [28d 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47166 +peer1.org2.example.com | [28e 10-14 19:01:04.88 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47166 grpc.code=OK grpc.call_duration=8.9524ms +peer1.org2.example.com | [28f 10-14 19:01:04.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [290 10-14 19:01:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer1.org2.example.com | [291 10-14 19:01:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [292 10-14 19:01:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer1.org2.example.com | [293 10-14 19:01:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to publish state info to +peer1.org2.example.com | [294 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [295 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> INFO 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Becoming a leader +peer1.org2.example.com | [296 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer1.org2.example.com | [297 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org2.example.com | [298 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [29a 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [29b 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29c 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610021801 +peer1.org2.example.com | [29d 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B063539577359B79DB4B1A3BA38A4A66B8A360A59C56A663F35D0366791745D1 +peer1.org2.example.com | [29e 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [299 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org2.example.com | [29f 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [2a0 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [2a1 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer1.org2.example.com | [2a2 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [2a3 10-14 19:01:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002fec470, CONNECTING +peer1.org2.example.com | [2a4 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002fec470, READY +peer1.org2.example.com | [2a5 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer1.org2.example.com | [2a6 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer1.org2.example.com | [2a7 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer1.org2.example.com | [2a8 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org2.example.com | [2a9 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer1.org2.example.com | [2aa 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ab 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ac 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A91070A3D08051A0608F5959DFC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org2.example.com | [2ad 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2AD9408B74E0BEA3521156706D4F0025235B96151DAD5C93CB55C2B3C9195D2 +peer1.org2.example.com | [2ae 10-14 19:01:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2af 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b0 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b1 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2b2 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b3 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2b4 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b5 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [185 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [186 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [187 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [188 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [189 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org2.example.com | [18a 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [18b 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [18c 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [18d 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [18e 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [18f 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [190 10-14 19:01:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [191 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [192 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [193 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [194 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [195 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [196 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [197 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [198 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org2.example.com | [199 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [19a 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [19b 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [19c 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [19d 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [19e 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [19f 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [1a0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [1a1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [1a2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [1a3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [1a4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [1a5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [1a6 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [1a7 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [1a8 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | 00000030 3f 37 73 73 45 3f b1 29 3b d1 20 8a b5 0c 26 74 |?7ssE?.);. ...&t| +peer0.org1.example.com | 00000040 d1 91 65 00 6e 7e 3b |..e.n~;| +peer0.org1.example.com | [192 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [193 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 44 fc f2 5e 71 48 14 f5 b7 0e |0E.!..D..^qH....| +peer0.org1.example.com | 00000010 7e 21 75 a8 1c b2 c0 71 73 20 89 1d 14 cc a1 5b |~!u....qs .....[| +peer0.org1.example.com | 00000020 78 a1 09 5b bb 02 20 7c 7b 6d 10 ef 35 62 96 d8 |x..[.. |{m..5b..| +peer0.org1.example.com | 00000030 ff 2a d5 e0 26 fd 25 bc 1f 53 04 c6 1a 9b 3e 8f |.*..&.%..S....>.| +peer0.org1.example.com | 00000040 c8 86 b0 63 5f 25 ac |...c_%.| +peer0.org1.example.com | [194 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [195 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [196 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [197 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [198 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [199 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [19c 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:00:48.104 UTC [orderer.common.cluster] updateStubInMapping -> INFO 342 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2020-10-14 19:00:48.104 UTC [orderer.common.cluster] updateStubInMapping -> INFO 343 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-10-14 19:00:48.104 UTC [orderer.common.cluster] func1 -> DEBU 344 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +peer1.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | [19e 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\217\310\206\260c_%\254" > > alive: > +peer0.org1.example.com | [19f 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a0 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a1 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a2 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a3 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a4 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a5 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a9 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [1aa 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CD989DCF15BB329F0D3D00C4D6E94459731B898D493006EF3039DA706335BBF +peer0.org1.example.com | [1ab 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ac 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1ad 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1ae 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1af 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b0 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b1 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b2 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2020-10-14 19:00:48.109 UTC [grpc] DialContext -> DEBU 345 parsed scheme: """ +orderer0.example.com | "2020-10-14 19:00:48.109 UTC [grpc] DialContext -> DEBU 346 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2020-10-14 19:00:48.113 UTC [grpc] watcher -> DEBU 347 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2020-10-14 19:00:48.113 UTC [grpc] switchBalancer -> DEBU 348 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-10-14 19:00:48.114 UTC [grpc] HandleSubConnStateChange -> DEBU 349 pickfirstBalancer: HandleSubConnStateChange: 0xc0000aefb0, CONNECTING" +orderer0.example.com | "2020-10-14 19:00:48.113 UTC [orderer.common.cluster] updateStubInMapping -> INFO 34a Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2020-10-14 19:00:48.116 UTC [orderer.common.cluster] updateStubInMapping -> INFO 34b Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-10-14 19:00:48.116 UTC [orderer.common.cluster] func1 -> DEBU 34c Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [grpc] DialContext -> DEBU 34d parsed scheme: """ +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [grpc] DialContext -> DEBU 34e scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [orderer.common.cluster] func1 -> INFO 34f 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [grpc] watcher -> DEBU 350 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [grpc] switchBalancer -> DEBU 351 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [grpc] HandleSubConnStateChange -> DEBU 352 pickfirstBalancer: HandleSubConnStateChange: 0xc0000afc50, CONNECTING" +orderer0.example.com | "2020-10-14 19:00:48.117 UTC [orderer.common.cluster] func1 -> INFO 353 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +peer0.org2.example.com | [1a9 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [1aa 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [1ab 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [1ac 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [1ad 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [1ae 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [1af 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [1b0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [1b1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [1b2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [1b3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [1b4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [1b5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [1b6 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [1b7 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [1b8 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [1b9 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [1ba 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [1bb 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [1bc 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [1bd 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1be 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [1bf 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [1c0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [1c1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [1c2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [1c4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [1c5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [1c6 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [1c7 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [1c8 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [1c9 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [1ca 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [1cb 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [1cc 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [1cd 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [1ce 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [1cf 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [1d0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [1d1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [1d2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [1d3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [1d4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [1d5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [1d6 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [1d7 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [1d8 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [1d9 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1da 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1db 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [1dc 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [1dd 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [1de 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [1df 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [1e0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer1.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer1.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer1.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer1.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer1.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2b6 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 gate 1602702069044279300 evaluation starts +peer1.org2.example.com | [2b7 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b8 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2b9 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [2ba 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2bb 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [2bc 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 principal matched by identity 0 +peer1.org2.example.com | [2bd 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff cb e9 0a dc dd 93 4b 3a c6 d4 40 fe b8 22 cb |.......K:..@..".| +peer1.org2.example.com | 00000010 cc 9a ca 35 fb e8 e7 51 b6 74 3d 19 c8 72 98 71 |...5...Q.t=..r.q| +peer1.org2.example.com | [2be 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 09 11 d5 2a 27 eb 58 ea 8d dd af |0D. ....*'.X....| +peer1.org2.example.com | 00000010 cb f5 4b 6d a8 69 80 dd ae 0a bc 98 b8 e4 6a d0 |..Km.i........j.| +peer1.org2.example.com | 00000020 b4 1c 06 30 02 20 4c 8d 36 00 c8 70 00 d6 7e 55 |...0. L.6..p..~U| +peer1.org2.example.com | 00000030 5b 01 0a c8 f3 03 b6 26 b9 34 f3 61 fb b1 37 96 |[......&.4.a..7.| +peer1.org2.example.com | 00000040 de 4a 4a 2d c9 e7 |.JJ-..| +peer1.org2.example.com | [2bf 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c0 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002feca10 gate 1602702069044279300 evaluation succeeds +peer1.org2.example.com | [2c1 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2c2 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2c3 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2c4 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2c5 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2c6 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2c7 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2c8 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer1.org2.example.com | [2c9 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org2.example.com | [2ca 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2cb 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2cc 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org2.example.com | [2cd 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer1.org2.example.com | [2ce 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org2.example.com | [2cf 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org2.example.com | [2d0 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2d1 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f1ab80 env 0xc003004f00 txn 0 +peer1.org2.example.com | [2d2 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003004f00 +peer1.org2.example.com | [2d3 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d4 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer1.org2.example.com | [2d5 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d6 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [2d7 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2d8 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2d9 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2da 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2db 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2dd 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 gate 1602702069048128900 evaluation starts +peer1.org2.example.com | [2de 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2df 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1b3 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b4 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c d9 89 dc f1 5b b3 29 f0 d3 d0 0c 4d 6e 94 45 |.....[.)....Mn.E| +peer0.org1.example.com | 00000010 97 31 b8 98 d4 93 00 6e f3 03 9d a7 06 33 5b bf |.1.....n.....3[.| +peer0.org1.example.com | [1b5 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a3 2c 92 9e 53 73 da a8 47 8b 96 |0D. [.,..Ss..G..| +peer0.org1.example.com | 00000010 a5 db 10 54 40 56 ce b9 d5 df 21 bb b6 07 86 2e |...T@V....!.....| +peer0.org1.example.com | 00000020 6d ac bb f5 02 20 61 3c 58 e2 bf 54 cb 74 52 f9 |m.... a DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1b7 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 4f 68 c4 9a 99 c7 cd f0 15 13 |0E.!..Oh........| +peer0.org1.example.com | 00000010 36 97 ef 28 e5 f7 ab 4a dc ae ea d3 5a 5a a7 9e |6..(...J....ZZ..| +peer0.org1.example.com | 00000020 28 4d c7 66 03 02 20 21 4e 8d 1b 5b 8f 43 96 77 |(M.f.. !N..[.C.w| +peer0.org1.example.com | 00000030 38 d4 0a 3b be 3e d4 cf ce fd 79 fc 5b 30 ff d0 |8..;.>....y.[0..| +peer0.org1.example.com | 00000040 62 6e 4e e9 84 90 10 |bnN....| +peer0.org1.example.com | [1b8 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1b9 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1ba 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bc 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1bd 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1bf 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1c0 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d5 88 59 45 13 de d1 40 9e e9 5b 14 6a eb 49 |`..YE...@..[.j.I| +peer0.org1.example.com | 00000010 c2 7f 51 60 51 b3 3e 8a 2f 5f 84 92 f6 e5 c1 32 |..Q`Q.>./_.....2| +peer0.org1.example.com | [1c1 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 b1 a2 9d d3 99 75 87 e8 ba 3d 24 |0D. v.....u...=$| +peer0.org1.example.com | 00000010 0e 7d 60 38 58 11 d7 5b 5a 43 ec f1 50 86 c7 2f |.}`8X..[ZC..P../| +peer0.org1.example.com | 00000020 de ec 97 d3 02 20 18 f6 e2 29 b3 96 90 d0 f4 22 |..... ...)....."| +peer0.org1.example.com | 00000030 d0 19 cc b5 2b de eb 0e 46 75 99 0c ee fc b3 3b |....+...Fu.....;| +peer0.org1.example.com | 00000040 b8 b6 7a 1b e9 de |..z...| +peer0.org1.example.com | [1c2 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1c3 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 3c 4f 19 fb 22 6e 54 32 89 db fb |0D. . DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c5 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [2e0 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2e1 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 principal matched by identity 0 +peer1.org2.example.com | [2e2 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 f9 c1 20 15 cf df 55 6d 9b a0 06 f0 99 6b 98 |x.. ...Um.....k.| +peer1.org2.example.com | 00000010 b6 83 2e 5e 9e 97 be fe 6e 72 f7 f6 67 73 da 4e |...^....nr..gs.N| +peer1.org2.example.com | [2e3 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb d0 f8 7c 65 7e 6d ba 5f 50 a4 |0E.!....|e~m._P.| +peer1.org2.example.com | 00000010 ec 57 38 53 da de 25 9c b6 3d 35 53 5d 6e 35 5f |.W8S..%..=5S]n5_| +peer1.org2.example.com | 00000020 88 fa ad 23 85 02 20 36 31 a6 08 99 74 aa 1f f1 |...#.. 61...t...| +peer1.org2.example.com | 00000030 15 e0 c7 e6 aa 19 d4 db 07 58 1a 05 88 1b f9 96 |.........X......| +peer1.org2.example.com | 00000040 d9 ad 45 4e 69 e5 27 |..ENi.'| +peer1.org2.example.com | [2e4 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [2e5 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2e6 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e7 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030e04f0 gate 1602702069048128900 evaluation succeeds +peer1.org2.example.com | [2e8 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2e9 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [2ea 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2eb 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2ec 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2ed 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [2ee 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2ef 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [2f0 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2f1 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer1.org2.example.com | [2f2 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +peer1.org2.example.com | 00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..| +peer1.org2.example.com | [2f3 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +peer1.org2.example.com | 00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +peer1.org2.example.com | 00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +peer1.org2.example.com | 00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +peer1.org2.example.com | 00000040 69 60 4d b6 27 ea |i`M.'.| +peer1.org2.example.com | [2f4 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2f5 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org2.example.com | [2f6 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2f7 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0030d9500, header channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer1.org2.example.com | [2f8 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [2f9 10-14 19:01:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [2fa 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [1e1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [1e2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1e3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1e4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [1e5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [1e6 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [1e7 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [1e8 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [1e9 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [1ea 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [1eb 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [1ec 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org2.example.com | [1ed 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [1ee 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [1ef 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1f0 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E0CCCDAC8DA1FC9E16...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [1f1 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B2A66B518626A72F7EA06B82BD0481EA504BAD690647570DB59764A881CD46CB +peer0.org2.example.com | [1f2 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [1f3 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org2.example.com | [1f4 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [1f5 10-14 19:01:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [1f6 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [1f7 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [1f8 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [1f9 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [1fa 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org2.example.com | [1fb 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org2.example.com | [1fc 10-14 19:01:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org2.example.com | [1fd 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [1fe 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1ff 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [200 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [201 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org2.example.com | [202 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org2.example.com | [203 10-14 19:01:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org2.example.com | [204 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org2.example.com | [205 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org2.example.com | [206 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org2.example.com | [207 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [208 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b493d800-51b9-4926-bb8f-1c46e281e473] +peer0.org2.example.com | [209 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [20a 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [20b 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [20c 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [b493d800] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [20d 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [b493d800] notifying Txid:b493d800-51b9-4926-bb8f-1c46e281e473, channelID:businesschannel +peer0.org2.example.com | [20e 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [20f 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [210 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b493d800-51b9-4926-bb8f-1c46e281e473] +peer0.org2.example.com | [211 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [212 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [42bc1d10-a990-4508-bd27-200b97274b00] +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.common.cluster] Configure -> INFO 354 Exiting" +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] start -> DEBU 355 Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] start -> INFO 356 Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 357 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] newRaft -> INFO 358 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 359 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:48.118 UTC [orderer.common.server] Start -> INFO 35d Starting orderer: +orderer0.example.com | Version: 1.4.9 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.13.15 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2020-10-14 19:00:48.120 UTC [orderer.common.server] Start -> INFO 35e Starting cluster listener on [::]:7055" +orderer0.example.com | "2020-10-14 19:00:48.120 UTC [orderer.common.server] Start -> INFO 35f Beginning to serve requests" +orderer0.example.com | "2020-10-14 19:00:48.129 UTC [grpc] HandleSubConnStateChange -> DEBU 360 pickfirstBalancer: HandleSubConnStateChange: 0xc0000aefb0, READY" +orderer0.example.com | "2020-10-14 19:00:48.129 UTC [grpc] HandleSubConnStateChange -> DEBU 361 pickfirstBalancer: HandleSubConnStateChange: 0xc0000afc50, READY" +orderer0.example.com | "2020-10-14 19:00:49.088 UTC [orderer.common.cluster] Step -> DEBU 362 Connection from orderer2.example.com(172.18.0.4:35132)" +orderer0.example.com | "2020-10-14 19:00:49.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 363 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:49.089 UTC [orderer.consensus.etcdraft] Step -> INFO 364 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.092 UTC [orderer.common.cluster] NewStream -> DEBU 365 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 366 Sending msg of 28 bytes to 3 on channel testchainid took 2.9696ms" +orderer0.example.com | "2020-10-14 19:00:49.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 367 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159µs " +orderer0.example.com | "2020-10-14 19:00:49.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 368 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:49.094 UTC [orderer.consensus.etcdraft] Step -> INFO 369 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.095 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 36a 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.095 UTC [orderer.consensus.etcdraft] Step -> INFO 36b 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +orderer0.example.com | "2020-10-14 19:00:49.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.1µs " +orderer0.example.com | "2020-10-14 19:00:49.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2020-10-14 19:00:49.100 UTC [orderer.consensus.etcdraft] run -> INFO 36f raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 370 Sending msg of 28 bytes to 3 on channel testchainid took 126.8µs" +orderer0.example.com | "2020-10-14 19:00:49.102 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 371 Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:00:49.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 493.8µs " +orderer0.example.com | "2020-10-14 19:00:49.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:49.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-10-14 19:00:49.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 440.2µs " +orderer0.example.com | "2020-10-14 19:00:49.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:49.592 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-10-14 19:00:49.593 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.6µs " +orderer0.example.com | "2020-10-14 19:00:50.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:50.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2020-10-14 19:00:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 426.2µs " +orderer0.example.com | "2020-10-14 19:00:50.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:50.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-10-14 19:00:50.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +orderer0.example.com | "2020-10-14 19:00:51.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:51.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +orderer0.example.com | "2020-10-14 19:00:51.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.5µs " +orderer0.example.com | "2020-10-14 19:00:51.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:51.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer1.org1.example.com | [1d5 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > alive:\351\272?D\212\002 I\322\371\351\2602\332c:\317\3711\030\246\2538$\350\003H\220\007\014\376\353*z\210\016\035\275\305" > > +peer1.org1.example.com | [1d6 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d7 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1d9 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161007 +peer1.org1.example.com | [1da 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 60D588594513DED1409EE95B146AEB49C27F516051B33E8A2F5F8492F6E5C132 +peer1.org1.example.com | [1db 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1dc 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1dd 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1de 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1df 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e0 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1e1 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1e3 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1e4 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e5 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1e6 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1e7 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 74 64 d6 13 b7 cc c4 93 fd e0 3c 5c ba 8b f1 |.td........<\...| +peer1.org1.example.com | 00000010 f5 ce 57 d5 97 b5 a4 53 32 b7 76 f9 2a 26 a5 53 |..W....S2.v.*&.S| +peer1.org1.example.com | [1e8 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 bf 32 4a 5a 98 1b 74 ef e7 b2 41 |0D. y.2JZ..t...A| +peer1.org1.example.com | 00000010 61 79 9f cc 6a 81 54 6a 98 ce 4b ba 09 a2 8a 28 |ay..j.Tj..K....(| +peer1.org1.example.com | 00000020 6d 76 08 48 02 20 08 1f 3c 56 ad 10 ef 87 55 82 |mv.H. .......+,...~.| +peer1.org1.example.com | 00000040 9c 68 0c 69 ac 0f |.h.i..| +peer1.org1.example.com | [1e9 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1ea 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 2c e5 72 f0 54 b2 7f 27 9a de 3a |0D. `,.r.T..'..:| +peer1.org1.example.com | 00000010 1e 66 14 90 66 9f 6d 6a fa ce 62 f7 ec 04 a6 b9 |.f..f.mj..b.....| +peer1.org1.example.com | 00000020 16 a0 1b 75 02 20 0f 9c 6a a8 57 85 c5 24 b3 e3 |...u. ..j.W..$..| +peer1.org1.example.com | 00000030 c5 76 72 c3 1e 11 85 da e5 94 70 10 70 17 ee 19 |.vr.......p.p...| +peer1.org1.example.com | 00000040 44 59 ac b9 63 9f |DY..c.| +peer1.org1.example.com | [1eb 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1ec 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1ed 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ee 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ef 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1f0 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f1 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f2 10-14 19:01:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f3 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f4 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f5 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer0.org2.example.com | [213 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [214 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [215 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [42bc1d10] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [216 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [42bc1d10] notifying Txid:42bc1d10-a990-4508-bd27-200b97274b00, channelID:businesschannel +peer0.org2.example.com | [217 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [218 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [219 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [42bc1d10-a990-4508-bd27-200b97274b00] +peer0.org2.example.com | [21a 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [21b 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f4c92dae-d84c-436a-b615-6bd24d214883] +peer0.org2.example.com | [21c 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [21d 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [21e 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [f4c92dae] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [21f 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [f4c92dae] notifying Txid:f4c92dae-d84c-436a-b615-6bd24d214883, channelID:businesschannel +peer0.org2.example.com | [220 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [221 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [222 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f4c92dae-d84c-436a-b615-6bd24d214883] +peer0.org2.example.com | [223 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [224 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b78d868e-cb0b-417c-9493-23bda12c5f5b] +peer0.org2.example.com | [225 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [226 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b78d868e-cb0b-417c-9493-23bda12c5f5b] +peer0.org2.example.com | [227 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [228 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E0CCCDAC8DA1FC9E16...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [229 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 039E158B2319917F7C07CB9D7F28ED47E4C432F098949BB5E06D4DB27CEEC0BD +peer0.org2.example.com | [22a 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [22b 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [0423c4e8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [22c 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [0423c4e8] notifying Txid:0423c4e8b181b0307b568ba53473eb29773833e3c9cdf7a91d8bd491d72b34bb, channelID: +peer0.org2.example.com | [22d 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [22e 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO [][0423c4e8] Exit chaincode: name:"cscc" (85ms) +peer0.org2.example.com | [22f 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU [][0423c4e8] Exit +peer0.org2.example.com | [230 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:52912 +peer0.org2.example.com | [231 10-14 19:01:02.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:52912 grpc.code=OK grpc.call_duration=88.2794ms +peer0.org2.example.com | [232 10-14 19:01:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [233 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting, peers found 0 +peer0.org2.example.com | [234 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [235 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [236 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [237 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [238 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...9B28120C0880CFE4BB8DA1FC9E161001 +peer0.org2.example.com | [239 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 30A1B8FB29342A751997DC9EA099CA34F85A959E1079939770E735110363C782 +peer0.org2.example.com | [23a 10-14 19:01:03.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [23b 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:52920 +peer0.org2.example.com | [23c 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002a25d60 +peer0.org2.example.com | [23d 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [23e 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [23f 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [240 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [241 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 1d 6e 8f 16 fd cb 1c eb 2b ca 1c 73 80 3d b6 |..n......+..s.=.| +peer0.org2.example.com | 00000010 40 42 f5 40 fe e3 4f 87 9f 40 d7 21 57 8f 13 42 |@B.@..O..@.!W..B| +peer0.org2.example.com | [242 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 45 19 15 30 2d 9e 9a 26 d1 6c 5f |0D. TE..0-..&.l_| +peer0.org2.example.com | 00000010 85 1e 77 46 99 5f 49 5f ae 49 72 17 0b a2 81 b1 |..wF._I_.Ir.....| +peer0.org2.example.com | 00000020 1b 05 06 e2 02 20 61 ef 7a 0c 82 28 9e a6 6b 36 |..... a.z..(..k6| +peer0.org2.example.com | 00000030 03 82 e4 a9 b6 d4 d0 9a 78 45 2d 3b 9e b7 20 2c |........xE-;.. ,| +peer0.org2.example.com | 00000040 b7 62 20 b4 4d e7 |.b .M.| +orderer0.example.com | "2020-10-14 19:00:51.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2020-10-14 19:00:52.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:52.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 44.1µs" +orderer0.example.com | "2020-10-14 19:00:52.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +orderer0.example.com | "2020-10-14 19:00:52.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:52.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-10-14 19:00:52.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +orderer0.example.com | "2020-10-14 19:00:53.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:53.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38c Sending msg of 28 bytes to 3 on channel testchainid took 11.3µs" +orderer0.example.com | "2020-10-14 19:00:53.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.1µs " +orderer0.example.com | "2020-10-14 19:00:53.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:53.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2020-10-14 19:00:53.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.8µs " +orderer0.example.com | "2020-10-14 19:00:54.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:54.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 32.2µs" +orderer0.example.com | "2020-10-14 19:00:54.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +orderer0.example.com | "2020-10-14 19:00:54.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:54.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2020-10-14 19:00:54.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 596.1µs " +orderer0.example.com | "2020-10-14 19:00:55.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 397 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:55.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 398 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2020-10-14 19:00:55.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529µs " +orderer0.example.com | "2020-10-14 19:00:55.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:55.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39b Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-10-14 19:00:55.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.9µs " +orderer0.example.com | "2020-10-14 19:00:56.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:56.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39e Sending msg of 28 bytes to 3 on channel testchainid took 112.7µs" +orderer0.example.com | "2020-10-14 19:00:56.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +orderer0.example.com | "2020-10-14 19:00:56.588 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:56.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a1 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2020-10-14 19:00:56.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 961.4µs " +orderer0.example.com | "2020-10-14 19:00:57.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:57.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a4 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +orderer0.example.com | "2020-10-14 19:00:57.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.1µs " +orderer0.example.com | "2020-10-14 19:00:57.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:57.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a7 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2020-10-14 19:00:57.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229µs " +orderer0.example.com | "2020-10-14 19:00:57.997 UTC [orderer.common.server] replicateDisabledChains -> DEBU 3a9 No inactive chains to try to replicate" +orderer0.example.com | "2020-10-14 19:00:58.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3aa Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:58.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ab Sending msg of 28 bytes to 3 on channel testchainid took 85.8µs" +orderer0.example.com | "2020-10-14 19:00:58.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3ac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.7µs " +orderer0.example.com | "2020-10-14 19:00:58.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3ad Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:58.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ae Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2020-10-14 19:00:58.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.4µs " +orderer0.example.com | "2020-10-14 19:00:59.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3b0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:59.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3b1 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2020-10-14 19:00:59.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.3µs " +orderer0.example.com | "2020-10-14 19:00:59.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3b3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:00:59.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3b4 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2020-10-14 19:00:59.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 896.3µs " +orderer0.example.com | "2020-10-14 19:00:59.899 UTC [orderer.common.server] Deliver -> DEBU 3b6 Starting new Deliver handler" +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [1f6 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a0 8b 15 7c 1f 00 ac ad 0b 2d 0f |0D. %...|.....-.| +peer1.org1.example.com | 00000010 a8 71 f8 5e e2 d9 00 a4 4d d4 a7 c6 45 eb 9e d4 |.q.^....M...E...| +peer1.org1.example.com | 00000020 78 c7 fb 5f 02 20 5a f3 7f 7f e1 13 f9 db 02 fd |x.._. Z.........| +peer1.org1.example.com | 00000030 2b 22 82 64 70 e0 12 5f 84 1e 87 64 24 1c bd e1 |+".dp.._...d$...| +peer1.org1.example.com | 00000040 cc 9e cd ae 87 26 |.....&| +peer1.org1.example.com | [1f7 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU No such channel [] discarding message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f8 10-14 19:01:02.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9 10-14 19:01:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54596 +peer1.org1.example.com | [1fa 10-14 19:01:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0029be500 +peer1.org1.example.com | [1fb 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [1fc 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [1fd 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [1ff 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [200 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [201 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [202 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [203 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 0f da 4e 6a 4c 52 b2 0c 2e 03 10 9f b6 e1 d7 |...NjLR.........| +peer1.org1.example.com | 00000010 8a 82 e9 51 5d 5b 1c a6 2a 39 c5 5d c9 c3 2a d1 |...Q][..*9.]..*.| +peer1.org1.example.com | [204 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 92 94 cd 9a 73 9a af b8 03 cd 24 |0D. .....s.....$| +peer1.org1.example.com | 00000010 e9 5e 89 8d eb ec 09 ea 21 43 91 77 3a c6 58 35 |.^......!C.w:.X5| +peer1.org1.example.com | 00000020 c8 53 9a f4 02 20 26 f1 55 4d 4c f0 d9 dc 11 85 |.S... &.UML.....| +peer1.org1.example.com | 00000030 58 3b 2f bf c7 6d 90 65 97 80 e4 41 fa e8 b6 ce |X;/..m.e...A....| +peer1.org1.example.com | 00000040 56 b2 33 e5 03 34 |V.3..4| +peer1.org1.example.com | [205 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [206 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003818f0, header 0xc0029bee10 +peer1.org1.example.com | [207 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [208 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU [][f862aac2] processing txid: f862aac2134c6f48f179337ccd00fe40adf0626a5468bf5d22c1b433a5dcc6bd +peer1.org1.example.com | [209 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU [][f862aac2] Entry chaincode: name:"cscc" +peer1.org1.example.com | [20a 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> INFO [][f862aac2] Entry chaincode: name:"cscc" +peer1.org1.example.com | [20b 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [20c 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org1.example.com | [20d 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [20e 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [20f 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [210 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [211 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [212 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [213 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 0f da 4e 6a 4c 52 b2 0c 2e 03 10 9f b6 e1 d7 |...NjLR.........| +peer1.org1.example.com | 00000010 8a 82 e9 51 5d 5b 1c a6 2a 39 c5 5d c9 c3 2a d1 |...Q][..*9.]..*.| +peer1.org1.example.com | [214 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 92 94 cd 9a 73 9a af b8 03 cd 24 |0D. .....s.....$| +peer1.org1.example.com | 00000010 e9 5e 89 8d eb ec 09 ea 21 43 91 77 3a c6 58 35 |.^......!C.w:.X5| +peer1.org1.example.com | 00000020 c8 53 9a f4 02 20 26 f1 55 4d 4c f0 d9 dc 11 85 |.S... &.UML.....| +peer0.org1.example.com | [1c6 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c7 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c8 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1c9 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cc 10-14 19:01:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1cd 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161007 +peer0.org1.example.com | [1ce 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D7464D613B7CCC493FDE03C5CBA8BF1F5CE57D597B5A45332B776F92A26A553 +peer0.org1.example.com | [1cf 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d0 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1d1 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1d2 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1d3 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1d4 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1d5 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d6 10-14 19:01:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41666 +peer0.org1.example.com | [1d7 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002946460 +peer0.org1.example.com | [1d8 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [1d9 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [1da 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1db 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [1dc 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [1dd 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1de 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1df 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [1e0 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 88 96 ba 69 ce 68 1f 86 ec 54 91 82 39 5d 6c |....i.h...T..9]l| +peer0.org1.example.com | 00000010 b4 97 ce b8 49 b6 5c a6 b8 50 08 c5 d6 d3 ca f2 |....I.\..P......| +peer0.org1.example.com | [1e1 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1d fb 91 ad 2c d1 fc 06 bd 82 a5 |0D. 9....,......| +peer0.org1.example.com | 00000010 fe c5 ec 84 b8 3d 88 bd ba c9 93 91 cc 64 6e 8b |.....=.......dn.| +peer0.org1.example.com | 00000020 a0 53 c8 9c 02 20 50 b3 93 3e 56 36 81 d4 c9 38 |.S... P..>V6...8| +peer0.org1.example.com | 00000030 8f d2 b4 c8 a2 a3 6c f6 9e 9b e1 7c 0c 25 6e 5d |......l....|.%n]| +peer0.org1.example.com | 00000040 b8 4c 60 e5 13 20 |.L`.. | +peer0.org1.example.com | [1e2 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [1e3 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cfea0, header 0xc002946d70 +peer0.org1.example.com | [1e4 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [2fb 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [2fc 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [2fd 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fe 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [2ff 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [300 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [301 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [302 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [303 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [304 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [305 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [306 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [307 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [308 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [309 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org2.example.com | [30a 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [30b 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [30c 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [30d 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [30e 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [30f 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [310 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org2.example.com | [311 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [312 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [313 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org2.example.com | [314 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [315 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [316 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [317 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 gate 1602702069055812400 evaluation starts +peer1.org2.example.com | [318 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [319 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:00:59.900 UTC [common.deliver] Handle -> DEBU 3b7 Starting new deliver loop for 172.18.0.9:39938" +orderer0.example.com | "2020-10-14 19:00:59.900 UTC [common.deliver] Handle -> DEBU 3b8 Attempting to read seek info message from 172.18.0.9:39938" +orderer0.example.com | "2020-10-14 19:00:59.964 UTC [orderer.common.server] Broadcast -> DEBU 3b9 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:00:59.964 UTC [orderer.common.broadcast] Handle -> DEBU 3ba Starting new broadcast loop for 172.18.0.9:39940" +orderer0.example.com | "2020-10-14 19:00:59.965 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3bb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39940" +orderer0.example.com | "2020-10-14 19:00:59.965 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3bc Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2020-10-14 19:00:59.965 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3bd Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2020-10-14 19:00:59.966 UTC [common.channelconfig] NewStandardValues -> DEBU 3be Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c0 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:59.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c2 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:00:59.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] NewStandardValues -> DEBU 3c4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c5 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c6 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c7 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c8 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c9 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ca Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:59.970 UTC [common.channelconfig] NewStandardValues -> DEBU 3cb Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:00:59.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cc Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:00:59.970 UTC [common.channelconfig] NewStandardValues -> DEBU 3cd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:59.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ce Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:59.971 UTC [common.channelconfig] validateMSP -> DEBU 3cf Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:59.972 UTC [msp] newBccspMsp -> DEBU 3d0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.972 UTC [msp] New -> DEBU 3d1 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.973 UTC [msp] Setup -> DEBU 3d2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:00:59.975 UTC [msp.identity] newIdentity -> DEBU 3d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | [243 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [244 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0000f9f10, header 0xc002f68190 +peer0.org2.example.com | [245 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [246 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][c19c46a3] processing txid: c19c46a3e0cfa1fdb1dcc608f80675ab64f61306f86bb52d00942a9ff7a6a2c4 +peer0.org2.example.com | [247 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][c19c46a3] Entry chaincode: name:"cscc" +peer0.org2.example.com | [248 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> INFO [][c19c46a3] Entry chaincode: name:"cscc" +peer0.org2.example.com | [249 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [24a 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [24b 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [24c 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [24d 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [24e 10-14 19:01:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 1d 6e 8f 16 fd cb 1c eb 2b ca 1c 73 80 3d b6 |..n......+..s.=.| +peer0.org2.example.com | 00000010 40 42 f5 40 fe e3 4f 87 9f 40 d7 21 57 8f 13 42 |@B.@..O..@.!W..B| +peer0.org2.example.com | [24f 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 45 19 15 30 2d 9e 9a 26 d1 6c 5f |0D. TE..0-..&.l_| +peer0.org2.example.com | 00000010 85 1e 77 46 99 5f 49 5f ae 49 72 17 0b a2 81 b1 |..wF._I_.Ir.....| +peer0.org2.example.com | 00000020 1b 05 06 e2 02 20 61 ef 7a 0c 82 28 9e a6 6b 36 |..... a.z..(..k6| +peer0.org2.example.com | 00000030 03 82 e4 a9 b6 d4 d0 9a 78 45 2d 3b 9e b7 20 2c |........xE-;.. ,| +peer0.org2.example.com | 00000040 b7 62 20 b4 4d e7 |.b .M.| +peer0.org2.example.com | [250 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU [c19c46a3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [251 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU [c19c46a3] notifying Txid:c19c46a3e0cfa1fdb1dcc608f80675ab64f61306f86bb52d00942a9ff7a6a2c4, channelID: +peer0.org2.example.com | [252 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [253 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> INFO [][c19c46a3] Exit chaincode: name:"cscc" (2ms) +peer0.org2.example.com | [254 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU [][c19c46a3] Exit +peer0.org2.example.com | [255 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:52920 +peer0.org2.example.com | [256 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:52920 grpc.code=OK grpc.call_duration=6.56ms +peer0.org2.example.com | [257 10-14 19:01:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [258 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:52928 +peer0.org2.example.com | [259 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002e95a90 +peer0.org2.example.com | [25a 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [25b 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [25c 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [25d 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [25e 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 6d 90 9e f1 8d 67 73 d7 dc b8 4f c9 45 bc 3b |.m....gs...O.E.;| +peer0.org2.example.com | 00000010 74 43 8f 00 cb 03 96 8a 2b 0e 48 eb cd a4 32 40 |tC......+.H...2@| +peer0.org2.example.com | [25f 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 25 63 9e 8b 4f de 90 a4 e9 8a |0E.!..%c..O.....| +peer0.org2.example.com | 00000010 8a e5 d6 0d 8a 79 62 33 91 91 7c 9b b9 82 21 f5 |.....yb3..|...!.| +peer0.org2.example.com | 00000020 31 4a d4 ec 02 02 20 12 d1 36 ad 68 7a bb cf f7 |1J.... ..6.hz...| +peer1.org1.example.com | 00000030 58 3b 2f bf c7 6d 90 65 97 80 e4 41 fa e8 b6 ce |X;/..m.e...A....| +peer1.org1.example.com | 00000040 56 b2 33 e5 03 34 |V.3..4| +peer1.org1.example.com | [215 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org1.example.com | [216 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer1.org1.example.com | [217 10-14 19:01:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org1.example.com | [218 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer1.org1.example.com | [219 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org1.example.com | [21a 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org1.example.com | [21b 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org1.example.com | [21c 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org1.example.com | [21d 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer1.org1.example.com | [21e 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer1.org1.example.com | [21f 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer1.org1.example.com | [220 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0029aa780)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org1.example.com | [221 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org1.example.com | [222 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org1.example.com | [223 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org1.example.com | [224 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org1.example.com | [225 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org1.example.com | [227 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org1.example.com | [226 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org1.example.com | [228 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org1.example.com | [229 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org1.example.com | [22a 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org1.example.com | [22b 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [22c 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org1.example.com | [22d 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org1.example.com | [22e 10-14 19:01:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | [22f 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [230 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer1.org1.example.com | [231 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org1.example.com | [232 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer1.org1.example.com | [233 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org1.example.com | [234 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [235 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [236 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [237 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org1.example.com | [238 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [239 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [23a 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [23b 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [23c 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:59.978 UTC [common.channelconfig] NewStandardValues -> DEBU 3d4 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:00:59.978 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d5 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:00:59.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:00:59.979 UTC [common.channelconfig] NewStandardValues -> DEBU 3d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:00:59.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d8 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:00:59.980 UTC [common.channelconfig] NewStandardValues -> DEBU 3d9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:59.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3da Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:59.981 UTC [common.channelconfig] Validate -> DEBU 3db Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:00:59.981 UTC [common.channelconfig] validateMSP -> DEBU 3dc Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.981 UTC [msp] newBccspMsp -> DEBU 3dd Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.981 UTC [msp] New -> DEBU 3de Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.981 UTC [msp] Setup -> DEBU 3df Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.982 UTC [msp.identity] newIdentity -> DEBU 3e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3e1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3e2 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3e3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3e4 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] Validate -> DEBU 3e5 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-10-14 19:00:59.983 UTC [common.channelconfig] validateMSP -> DEBU 3e6 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.984 UTC [msp] newBccspMsp -> DEBU 3e7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.984 UTC [msp] New -> DEBU 3e8 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:00:59.984 UTC [msp] Setup -> DEBU 3e9 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.984 UTC [msp.identity] newIdentity -> DEBU 3ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | 00000030 0d c6 1a 76 dd 03 7d 9b 31 25 22 c8 48 93 4e 4d |...v..}.1%".H.NM| +peer0.org2.example.com | 00000040 1d 36 ae f5 56 9f 3d |.6..V.=| +peer0.org2.example.com | [260 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [261 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003684d0, header 0xc002e95ea0 +peer0.org2.example.com | [262 10-14 19:01:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [263 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [][e38dc76f] processing txid: e38dc76f8d06e3b4a9d12d327d76a8d7e0cd9cb907bba4981ef6fb2a345c3566 +peer0.org2.example.com | [264 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [][e38dc76f] Entry chaincode: name:"qscc" +peer0.org2.example.com | [265 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> INFO [][e38dc76f] Entry chaincode: name:"qscc" +peer0.org2.example.com | [266 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [267 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [268 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [269 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [26a 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26b 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26c 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [26d 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26e 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [23d 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [23e 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [msp] Setup -> DEBU 3eb Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [msp] Setup -> DEBU 3ec MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f2 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:59.987 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:59.988 UTC [policies] NewManagerImpl -> DEBU 3f4 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.989 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.990 UTC [policies] NewManagerImpl -> DEBU 3f6 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f8 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f9 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3fa Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3fb Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 3fc Proposed new policy ChannelCreationPolicy for Channel/Application" +peer0.org1.example.com | [1e5 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] processing txid: 9bfc48aeb1a2ab57085ed14a1091c211424fc9a3c081edeb0134860cfa4f73f8 +peer0.org1.example.com | [1e6 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1e7 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [][9bfc48ae] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1e8 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [1e9 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer0.org1.example.com | [1ea 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [26f 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 gate 1602702064721986500 evaluation starts +peer0.org2.example.com | [270 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [271 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [272 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [273 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 principal evaluation fails +peer0.org2.example.com | [274 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3d970 gate 1602702064721986500 evaluation fails +peer0.org2.example.com | [275 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [276 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [277 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [278 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 gate 1602702064722891300 evaluation starts +peer0.org2.example.com | [279 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27a 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [27b 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [27c 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [27d 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [27e 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 principal matched by identity 0 +peer0.org2.example.com | [27f 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 6d 90 9e f1 8d 67 73 d7 dc b8 4f c9 45 bc 3b |.m....gs...O.E.;| +peer0.org2.example.com | 00000010 74 43 8f 00 cb 03 96 8a 2b 0e 48 eb cd a4 32 40 |tC......+.H...2@| +peer0.org2.example.com | [280 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 25 63 9e 8b 4f de 90 a4 e9 8a |0E.!..%c..O.....| +peer0.org2.example.com | 00000010 8a e5 d6 0d 8a 79 62 33 91 91 7c 9b b9 82 21 f5 |.....yb3..|...!.| +peer0.org2.example.com | 00000020 31 4a d4 ec 02 02 20 12 d1 36 ad 68 7a bb cf f7 |1J.... ..6.hz...| +peer0.org2.example.com | 00000030 0d c6 1a 76 dd 03 7d 9b 31 25 22 c8 48 93 4e 4d |...v..}.1%".H.NM| +peer0.org2.example.com | 00000040 1d 36 ae f5 56 9f 3d |.6..V.=| +peer0.org2.example.com | [281 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [282 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc87c0 gate 1602702064722891300 evaluation succeeds +peer0.org2.example.com | [283 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [284 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [285 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [286 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [287 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [e38dc76f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [288 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [e38dc76f] notifying Txid:e38dc76f8d06e3b4a9d12d327d76a8d7e0cd9cb907bba4981ef6fb2a345c3566, channelID: +peer0.org2.example.com | [289 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [28a 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> INFO [][e38dc76f] Exit chaincode: name:"qscc" (5ms) +peer1.org1.example.com | [23f 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [240 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [241 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [242 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [243 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a33f80)} +peer1.org1.example.com | [244 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [245 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [246 10-14 19:01:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [247 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org1.example.com | [248 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org1.example.com | [249 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org1.example.com | [24a 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org1.example.com | [24b 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +peer1.org1.example.com | txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +peer1.org1.example.com | ] +peer1.org1.example.com | [24c 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to txid-index +peer1.org1.example.com | [24d 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to blockNumTranNum index +peer1.org1.example.com | [24e 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org1.example.com | [24f 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org1.example.com | [250 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer1.org1.example.com | [251 10-14 19:01:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org1.example.com | [252 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [254 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org1.example.com | [255 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [253 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer1.org1.example.com | [257 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org1.example.com | [256 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer1.org1.example.com | [258 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [259 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [25a 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [25b 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org1.example.com | [25c 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [25d 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [25e 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [25f 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org1.example.com | [260 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [262 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org1.example.com | [261 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org1.example.com | [263 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org1.example.com | [264 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org1.example.com | [265 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [266 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org1.example.com | [267 10-14 19:01:02.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 26ms (state_validation=7ms block_and_pvtdata_commit=9ms state_commit=5ms) commitHash=[] +peer1.org1.example.com | [268 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org1.example.com | [269 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [5550b12f-a666-4f90-a32b-ef2247aac050] +peer1.org1.example.com | [26a 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org1.example.com | [26b 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5550b12f-a666-4f90-a32b-ef2247aac050] +peer1.org1.example.com | [26c 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [31a 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [31b 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [31c 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [31d 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [31e 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [31f 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [320 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 principal matched by identity 0 +peer1.org2.example.com | [321 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +peer1.org2.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...| +peer1.org2.example.com | [322 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +peer1.org2.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +peer1.org2.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +peer1.org2.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +peer1.org2.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...| +peer1.org2.example.com | [323 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [324 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031375b0 gate 1602702069055812400 evaluation succeeds +peer1.org2.example.com | [325 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [326 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [327 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [328 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [329 10-14 19:01:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [32a 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [32b 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [32c 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [32d 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [32e 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [32f 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [330 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [331 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [332 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [333 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [334 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [335 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [336 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [337 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [338 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [339 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [33a 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33b 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33c 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [33d 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [33e 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [33f 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [340 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [341 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [342 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [343 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [344 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [345 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [1eb 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [1ec 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [1ed 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1ee 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [1ef 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [1f0 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 88 96 ba 69 ce 68 1f 86 ec 54 91 82 39 5d 6c |....i.h...T..9]l| +peer0.org1.example.com | 00000010 b4 97 ce b8 49 b6 5c a6 b8 50 08 c5 d6 d3 ca f2 |....I.\..P......| +peer0.org1.example.com | [1f1 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1d fb 91 ad 2c d1 fc 06 bd 82 a5 |0D. 9....,......| +peer0.org1.example.com | 00000010 fe c5 ec 84 b8 3d 88 bd ba c9 93 91 cc 64 6e 8b |.....=.......dn.| +peer0.org1.example.com | 00000020 a0 53 c8 9c 02 20 50 b3 93 3e 56 36 81 d4 c9 38 |.S... P..>V6...8| +peer0.org1.example.com | 00000030 8f d2 b4 c8 a2 a3 6c f6 9e 9b e1 7c 0c 25 6e 5d |......l....|.%n]| +peer0.org1.example.com | 00000040 b8 4c 60 e5 13 20 |.L`.. | +peer0.org1.example.com | [1f2 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [1f3 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [1f4 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [1f5 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | [1f6 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | [1f7 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [1f8 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | [1f9 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org1.example.com | [1fa 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [1fb 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [1fc 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [1fd 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002a72080)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [1fe 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [1ff 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [201 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | [200 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer0.org1.example.com | [202 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org1.example.com | [203 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org1.example.com | [204 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org1.example.com | [205 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer0.org1.example.com | [206 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org1.example.com | [207 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org1.example.com | [208 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org1.example.com | [209 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org1.example.com | [20a 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org1.example.com | [20b 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org1.example.com | [20c 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 3fd Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 3fe Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 3ff Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 400 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 401 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 402 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:00:59.992 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Policy] /Channel/Writers" +peer0.org2.example.com | [28b 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [][e38dc76f] Exit +peer0.org2.example.com | [28c 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:52928 +peer0.org2.example.com | [28d 10-14 19:01:04.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:52928 grpc.code=OK grpc.call_duration=6.9075ms +peer0.org2.example.com | [28e 10-14 19:01:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [28f 10-14 19:01:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to send a heartbeat to +peer0.org2.example.com | [290 10-14 19:01:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [291 10-14 19:01:06.14 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +peer0.org2.example.com | [292 10-14 19:01:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Empty membership, no one to publish state info to +peer0.org2.example.com | [293 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.585Z grpc.peer_address=172.18.0.8:50200 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=93.9µs +peer0.org2.example.com | [294 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [295 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [296 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [297 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [29a 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29b 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [29c 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [29d 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [29e 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29f 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a0 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a1 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a2 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a3 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a5 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a6 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a4 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.607Z grpc.peer_address=172.18.0.5:59174 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=962.1µs +peer0.org2.example.com | [2a7 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26d 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [26e 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [26f 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [270 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [271 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [272 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [273 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [274 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [275 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [276 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [277 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [278 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [279 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [27a 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [27b 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [27c 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [27d 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [27e 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [27f 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [280 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [281 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [282 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [283 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [284 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [285 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [286 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [287 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [288 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [289 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org1.example.com | [28a 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [28b 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [28c 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [28d 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [28e 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [346 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [347 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [348 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [349 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [34a 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [34b 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [34c 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [34d 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [34e 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [34f 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [350 10-14 19:01:09.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [351 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [352 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [353 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [354 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [355 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [356 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [357 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [358 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [359 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [35a 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [35b 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [35c 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [35d 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [35e 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [35f 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [360 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [361 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [362 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [363 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [20d 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | [20e 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | [20f 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | [210 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | [211 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [212 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [213 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [214 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org1.example.com | [215 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [216 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [217 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [218 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [219 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [21a 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [21b 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [2a8 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a9 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2aa 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ab 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [2ac 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [2ad 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072000 gate 1602702068620510200 evaluation starts +peer0.org2.example.com | [2ae 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [2ba 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bb 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2bc 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2b8 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2bd 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003072000 gate 1602702068620510200 evaluation succeeds +peer0.org2.example.com | [2be 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2bf 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c0 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2c1 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c2 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c3 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:50200 +peer0.org2.example.com | [2c4 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:50200 +peer0.org2.example.com | [2c5 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c6 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c8 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c9 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ca 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2cb 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cc 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cd 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ce 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2cf 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2d0 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 gate 1602702068638543000 evaluation starts +peer0.org2.example.com | [2d1 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d2 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2d3 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [2d4 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2d5 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2d6 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 principal matched by identity 0 +peer0.org2.example.com | [2d7 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [2d8 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 40 19 4e 7b 3c 18 1e a2 ca 84 47 |0D. `@.N{<.....G| +peer0.org2.example.com | 00000010 4f af 53 ee e4 da 92 45 44 cb ba 05 9e 38 ba b6 |O.S....ED....8..| +peer0.org2.example.com | 00000020 34 27 41 00 02 20 0f 7e 2c 3d 6f b6 29 e7 17 dd |4'A.. .~,=o.)...| +peer0.org2.example.com | 00000030 18 25 0a 22 3c 87 0b 85 42 30 38 b6 10 0c ef 9d |.%."<...B08.....| +peer0.org2.example.com | 00000040 8d cc c2 2f fc ba |.../..| +peer0.org2.example.com | [2d9 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2dd 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e840 gate 1602702068638543000 evaluation succeeds +peer0.org2.example.com | [2de 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2da 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [2db 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:50200 disconnected +peer0.org2.example.com | [2df 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.59Z grpc.peer_address=172.18.0.8:50200 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=55.3771ms +peer0.org2.example.com | [2dc 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2e0 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [2e1 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e2 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e3 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [28f 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [290 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [291 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [292 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [293 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [294 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [295 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [296 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [297 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [298 10-14 19:01:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [299 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [29a 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [29b 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [29c 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [29d 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [29e 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [29f 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [2a0 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [2a1 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [2a2 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [2a3 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [2a4 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org1.example.com | [2a5 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [2a6 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [2a7 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [2a8 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [2a9 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [2aa 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [2ab 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [2ac 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [2ad 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [2ae 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [2af 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [2b0 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [2b1 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [2b2 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [2b3 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [2b4 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [2e4 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:59174 +peer0.org2.example.com | [2e5 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:59174 +peer0.org2.example.com | [2e6 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [2e7 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:59174 disconnected +peer0.org2.example.com | [2e8 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.619Z grpc.peer_address=172.18.0.5:59174 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.2451ms +peer0.org2.example.com | [2e9 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2ea 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [364 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [365 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [366 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [367 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [368 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [369 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [36a 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36b 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [36c 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [36d 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [36e 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [36f 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [370 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [371 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [372 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [373 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [374 10-14 19:01:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [375 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [376 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [377 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [378 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [379 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [37a 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [37b 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37c 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37d 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37e 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [37f 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [380 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [381 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [382 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [383 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [384 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [385 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [386 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [387 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [388 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [389 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [38a 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38b 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [38c 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [38d 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [38e 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [38f 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [390 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [391 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [392 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [393 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [394 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [395 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [396 10-14 19:01:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [397 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [398 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [399 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [2eb 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.68Z grpc.peer_address=172.18.0.8:50206 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.6µs +peer0.org2.example.com | [2ec 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2ed 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Becoming a leader +peer0.org2.example.com | [2ee 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org2.example.com | [2ef 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org2.example.com | [2f0 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2f1 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [2f2 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2f3 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0880CFE4BB8DA1FC9E1610021801 +peer0.org2.example.com | [2f4 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3717735974DDC478513A62295022716F22A2623B7B528D101D3B96A094EBFFE9 +peer0.org2.example.com | [2f5 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [2f6 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org2.example.com | [2f7 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [2f8 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [2f9 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer0.org2.example.com | [2fa 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [2fb 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00312f470, CONNECTING +peer0.org2.example.com | [2fc 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.701Z grpc.peer_address=172.18.0.5:59180 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=103.6µs +peer0.org2.example.com | [2fd 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2fe 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [2ff 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [300 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [305 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer0.org2.example.com | [306 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer0.org2.example.com | [307 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [308 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org2.example.com | [309 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [30a 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30b 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30c 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [30d 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608F4959DFC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org2.example.com | [30f 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30e 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D217B04FE311F8736E4894FF34A12982278D901C0503271E5B15F231A70D7489 +peer0.org2.example.com | [310 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [311 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [312 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [313 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [314 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [315 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [316 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [317 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org1.example.com | [2b5 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [2b6 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [2b7 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2b8 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [2b9 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [2ba 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [2bb 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [2bc 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [2bd 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [2be 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [2bf 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [2c0 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2c1 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [2c2 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [2c3 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [2c4 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [2c5 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2c6 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [2c7 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [2c8 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2c9 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [2ca 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [2cb 10-14 19:01:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [2cc 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [2cd 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ce 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [2cf 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [2d0 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [2d1 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [2d2 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [2d3 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [2d4 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [2d5 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [2d6 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [2d7 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [2d8 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [2d9 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [2da 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [2db 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [2dc 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [2dd 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [2de 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [2df 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [2e0 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [2e1 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [2e2 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [2e3 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2e4 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2e5 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [2e6 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [2e7 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [2e8 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [2e9 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [2ea 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [2eb 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [2ec 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [2ed 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [2ee 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [2ef 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [2f0 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [318 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [31b 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31c 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31d 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31e 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39a 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [39b 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [39c 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [39d 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [39e 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [39f 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [3a0 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [3a1 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [3a2 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [3a3 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [3a4 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [3a5 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [3a6 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [3a7 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [3a8 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [3a9 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [3aa 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [3ab 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [3ac 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [3ad 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [3ae 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [3af 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [3b0 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3b1 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3b2 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3b3 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3b4 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3b5 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3b6 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3b7 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3b8 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3b9 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [3ba 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [3bb 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [3bc 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [3bd 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3be 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3bf 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [3c0 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [3c1 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [3c2 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [3c3 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3c4 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3c5 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3c6 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3c7 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3c8 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3c9 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3ca 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [3cb 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3cc 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [3cd 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [3ce 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3cf 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [3d1 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3d2 10-14 19:01:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [3d3 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [3d4 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 430 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 431 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 432 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 433 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 434 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43a Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43b Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43c Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [common.configtx] policyForItem -> DEBU 43d Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 43e Manager Channel looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 43f Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 440[0m Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 441 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 442 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 443 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 444 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 445 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 446 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 447 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 448 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 449 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:00.002 UTC [msp] DeserializeIdentity -> DEBU 44a Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:00.003 UTC [msp.identity] newIdentity -> DEBU 44b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.003 UTC [cauthdsl] func1 -> DEBU 44c 0xc000c707d0 gate 1602702060003938200 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44d 0xc000c707d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44e 0xc000c707d0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44f 0xc000c707d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 450 0xc000c707d0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func1 -> DEBU 451 0xc000c707d0 gate 1602702060003938200 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 452 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 453 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 454 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:00.004 UTC [cauthdsl] func1 -> DEBU 455 0xc000c71990 gate 1602702060004704800 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [cauthdsl] func2 -> DEBU 456 0xc000c71990 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [cauthdsl] func2 -> DEBU 457 0xc000c71990 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 458 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 459 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [msp] Validate -> DEBU 45a MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:00.005 UTC [msp] getCertificationChain -> DEBU 45b MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [msp] hasOURole -> DEBU 45c MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [msp] getCertificationChain -> DEBU 45d MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [cauthdsl] func2 -> DEBU 45e 0xc000c71990 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [msp.identity] Verify -> DEBU 45f Verify: digest = 00000000 8d 0c 30 bf 9e 22 01 dc 8d 32 f9 57 cc f4 45 f9 |..0.."...2.W..E.| +orderer0.example.com | 00000010 d4 24 db 30 5d 70 f7 ba a6 3e 37 f2 ff 17 bf b2 |.$.0]p...>7.....|" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [msp.identity] Verify -> DEBU 460 Verify: sig = 00000000 30 45 02 21 00 fc 78 ec d9 43 1f f3 19 65 b0 3c |0E.!..x..C...e.<| +orderer0.example.com | 00000010 32 ba cd b0 cf f9 1a fe 51 c9 05 96 dc 57 88 f3 |2.......Q....W..| +orderer0.example.com | 00000020 ac 44 85 68 3c 02 20 2e 39 eb df 1d 72 ff 17 61 |.D.h<. .9...r..a| +orderer0.example.com | 00000030 80 28 c7 8f e8 21 e1 3f de 84 89 ba d7 5a 25 4b |.(...!.?.....Z%K| +orderer0.example.com | 00000040 92 4c 80 d6 72 30 74 |.L..r0t|" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [cauthdsl] func2 -> DEBU 461 0xc000c71990 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:00.006 UTC [cauthdsl] func1 -> DEBU 462 0xc000c71990 gate 1602702060004704800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 463 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 464 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 465 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 466 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 467 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 468 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 469 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 46a Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 46b Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [31f 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [320 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [321 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [322 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [323 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [324 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [325 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 gate 1602702068722431200 evaluation starts +peer0.org2.example.com | [326 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [327 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [328 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 principal matched by identity 0 +peer0.org2.example.com | [329 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [32a 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 ff 45 f0 d8 c6 27 81 ea b8 5e |0E.!...E...'...^| +peer0.org2.example.com | 00000010 4b 5c 7f 1f 76 23 ad 64 b6 52 7e c9 d8 39 91 da |K\..v#.d.R~..9..| +peer0.org2.example.com | 00000020 80 28 d7 7a 67 02 20 39 7a bc 16 5a 25 0a eb c1 |.(.zg. 9z..Z%...| +peer0.org2.example.com | 00000030 79 1b 5b 90 9d 91 4d 47 95 3a c3 f9 7a 09 ab 32 |y.[...MG.:..z..2| +peer0.org2.example.com | 00000040 41 30 ad 2e fd ff 41 |A0....A| +peer0.org2.example.com | [32b 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32c 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b6860 gate 1602702068722431200 evaluation succeeds +peer0.org2.example.com | [32d 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32e 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32f 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [330 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [331 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:50206 +peer0.org2.example.com | [332 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:50206 +peer0.org2.example.com | [333 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [335 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [336 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [334 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [338 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [339 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [33a 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [337 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 gate 1602702068733489400 evaluation starts +peer0.org2.example.com | [33b 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33c 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [33d 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33e 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [340 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 principal matched by identity 0 +peer0.org2.example.com | [341 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [342 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc d1 9d 0c 2d 34 05 9c d4 06 07 |0E.!.....-4.....| +peer0.org2.example.com | 00000010 ff cb 0d 99 85 ad e6 d6 80 a7 92 91 d6 fd 0d 18 |................| +peer0.org2.example.com | 00000020 18 91 7e 43 52 02 20 71 de 64 0e cd 8b 76 3a 35 |..~CR. q.d...v:5| +peer0.org2.example.com | 00000030 44 05 13 22 94 f5 27 d7 df d2 a0 49 8d b5 18 6b |D.."..'....I...k| +peer0.org2.example.com | 00000040 d5 97 c3 28 86 f6 7d |...(..}| +peer0.org2.example.com | [343 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [344 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c700 gate 1602702068733489400 evaluation succeeds +peer1.org2.example.com | [3d5 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [3d6 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3d7 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003270790, CONNECTING +peer1.org2.example.com | [3d8 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003270790, READY +peer1.org2.example.com | [3d9 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3da 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [3db 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [3dc 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [3dd 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org2.example.com | [3de 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e0 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3e1 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [3e2 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [3e3 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [3e4 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [3e5 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [3e6 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f1ab80 env 0xc003004f00 txn 0 +peer1.org2.example.com | [3e7 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [3e9 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 82ms +peer1.org2.example.com | [3e8 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3ea 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [3eb 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [3ec 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [3ed 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org2.example.com | [3ef 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [3f0 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [3f1 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [3f2 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 471 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [msp] GetDefaultSigningIdentity -> DEBU 483 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [msp] GetDefaultSigningIdentity -> DEBU 484 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.011 UTC [msp.identity] Sign -> DEBU 485 Sign: plaintext: 0AEA060A1B08011A0608EC959DFC0522...433938FB9F6E8C6E0B851E2CF8548782 " +orderer0.example.com | "2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 486 Sign: digest: B16181B4C0E4A604135765090A953E8BA7E62752FE5624315B95253E17D7E983 " +orderer0.example.com | "2020-10-14 19:01:00.012 UTC [msp] GetDefaultSigningIdentity -> DEBU 487 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.012 UTC [msp] GetDefaultSigningIdentity -> DEBU 488 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 489 Sign: plaintext: 0AE6060A1708041A0608EC959DFC0522...9AC89DA5FAD94AE601D86A7642B2640B " +orderer0.example.com | "2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 48a Sign: digest: FC13F66C1ACF484AC6E20D5E634B4E4CE5B679DC30C461BBE9023CFF4D25ABB3 " +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [msp] DeserializeIdentity -> DEBU 490 Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [msp.identity] newIdentity -> DEBU 491 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [cauthdsl] func1 -> DEBU 492 0xc000cccdf0 gate 1602702060013840100 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [cauthdsl] func2 -> DEBU 493 0xc000cccdf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:00.013 UTC [cauthdsl] func2 -> DEBU 494 0xc000cccdf0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 495 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [msp] Validate -> DEBU 496 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [msp] getCertificationChain -> DEBU 497 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [cauthdsl] func2 -> DEBU 498 0xc000cccdf0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [msp.identity] Verify -> DEBU 499 Verify: digest = 00000000 fc 13 f6 6c 1a cf 48 4a c6 e2 0d 5e 63 4b 4e 4c |...l..HJ...^cKNL| +orderer0.example.com | 00000010 e5 b6 79 dc 30 c4 61 bb e9 02 3c ff 4d 25 ab b3 |..y.0.a...<.M%..|" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [msp.identity] Verify -> DEBU 49a Verify: sig = 00000000 30 44 02 20 5c ea bc 18 b3 30 07 fe ee 1c f3 e7 |0D. \....0......| +orderer0.example.com | 00000010 1c f1 e5 85 96 e8 db 91 20 e2 8a a6 a2 63 f3 bf |........ ....c..| +orderer0.example.com | 00000020 19 3f 33 6b 02 20 79 6c fd 49 69 1c 14 a8 05 32 |.?3k. yl.Ii....2| +orderer0.example.com | 00000030 65 4f 49 bf f0 51 9c f8 06 7b 18 58 12 ed bb 26 |eOI..Q...{.X...&| +orderer0.example.com | 00000040 8a 6d c8 85 e4 af |.m....|" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [cauthdsl] func2 -> DEBU 49b 0xc000cccdf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:00.014 UTC [cauthdsl] func1 -> DEBU 49c 0xc000cccdf0 gate 1602702060013840100 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [345 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [346 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [21c 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [21d 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [21e 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [21f 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [220 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a331c0)} +peer0.org1.example.com | [221 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [222 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [223 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [224 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org1.example.com | [225 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer0.org1.example.com | [226 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer0.org1.example.com | [227 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer0.org1.example.com | [228 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +peer0.org1.example.com | txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +peer0.org1.example.com | ] +peer0.org1.example.com | [229 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to txid-index +peer0.org1.example.com | [22a 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to blockNumTranNum index +peer0.org1.example.com | [22b 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org1.example.com | [22c 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer0.org1.example.com | [22d 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org1.example.com | [22e 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [22f 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org1.example.com | [230 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [231 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer0.org1.example.com | [232 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org1.example.com | [233 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [234 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org1.example.com | [236 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [235 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [237 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org1.example.com | [238 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [3ee 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3f3 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [3f4 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [3f5 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [3f6 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [3f7 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f8 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [3f9 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fa 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3fc 10-14 19:01:09.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3fd 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3fe 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ff 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [239 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [23a 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [23b 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [23c 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org1.example.com | [23d 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org1.example.com | [23e 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [23f 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [240 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org1.example.com | [241 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org1.example.com | [242 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [243 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org1.example.com | [244 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 34ms (state_validation=6ms block_and_pvtdata_commit=16ms state_commit=7ms) commitHash=[] +peer0.org1.example.com | [245 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org1.example.com | [246 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a31b6670-80e5-401b-a70e-7b9afbc8bc9a] +peer0.org1.example.com | [247 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org1.example.com | [248 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a31b6670-80e5-401b-a70e-7b9afbc8bc9a] +peer0.org1.example.com | [249 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [24a 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [24b 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [24c 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [24d 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [24e 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [24f 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [250 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [251 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [252 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [253 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [254 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [255 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [256 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [257 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [258 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [259 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [25a 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [25b 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [25c 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [25d 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [25e 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49f Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a1 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [common.channelconfig] NewStandardValues -> DEBU 4a3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a4 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a6 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a7 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4a9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4aa Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4ae Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4af Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] Validate -> DEBU 4b0 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [common.channelconfig] validateMSP -> DEBU 4b1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [msp] newBccspMsp -> DEBU 4b2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [msp] New -> DEBU 4b3 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.016 UTC [msp] Setup -> DEBU 4b4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.017 UTC [msp.identity] newIdentity -> DEBU 4b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4b8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b9 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.018 UTC [common.channelconfig] Validate -> DEBU 4ba Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-10-14 19:01:00.019 UTC [common.channelconfig] validateMSP -> DEBU 4bb Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.019 UTC [msp] newBccspMsp -> DEBU 4bc Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.019 UTC [msp] New -> DEBU 4bd Creating Cache-MSP instance" +peer1.org1.example.com | [2f1 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [2f2 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [2f3 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [2f4 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [2f5 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [2f6 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org1.example.com | [2f7 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [2f8 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [2f9 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2fa 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0D0DF898CA1FC9E16...387B0008A61A99B98BA4E6D12A020801 +peer1.org1.example.com | [2fb 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9505CB428C6CD27110CC9A0C9E69D1326F9F6CB91B70D4B1C1407B3DC649FE9F +peer1.org1.example.com | [2fc 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [2fd 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org1.example.com | [2fe 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [2ff 10-14 19:01:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [300 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [301 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [302 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [303 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [304 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org1.example.com | [305 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org1.example.com | [306 10-14 19:01:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org1.example.com | [307 10-14 19:01:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [308 10-14 19:01:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [309 10-14 19:01:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [30a 10-14 19:01:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [30b 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org1.example.com | [30c 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org1.example.com | [30d 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org1.example.com | [30e 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org1.example.com | [30f 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [310 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [311 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer1.org1.example.com | [312 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer1.org1.example.com | [313 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [314 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [6754e372-ccc7-4213-a4f1-770a56b34b2c] +peer1.org1.example.com | [315 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [316 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU [6754e372] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [317 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU [6754e372] notifying Txid:6754e372-ccc7-4213-a4f1-770a56b34b2c, channelID:businesschannel +peer0.org2.example.com | [347 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [401 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:00.019 UTC [msp] Setup -> DEBU 4be Setting up MSP instance Org1MSP" +peer1.org1.example.com | [318 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [319 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | [31a 10-14 19:01:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6754e372-ccc7-4213-a4f1-770a56b34b2c] +peer1.org1.example.com | [31b 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [31c 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1bc63e93-2c9a-470a-9e1a-4d9c142da634] +peer1.org1.example.com | [31d 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [31e 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | [31f 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [1bc63e93] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | "2020-10-14 19:01:00.019 UTC [msp.identity] newIdentity -> DEBU 4bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [348 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33f 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [402 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [403 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25f 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [320 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [1bc63e93] notifying Txid:1bc63e93-2c9a-470a-9e1a-4d9c142da634, channelID:businesschannel +peer1.org2.example.com | [404 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [405 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [260 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | [321 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [322 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [323 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1bc63e93-2c9a-470a-9e1a-4d9c142da634] +peer1.org2.example.com | [406 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | [324 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [407 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 gate 1602702069142170200 evaluation starts +peer1.org2.example.com | [408 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [325 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [969d92a2-314a-4859-933e-a963149edacb] +peer1.org1.example.com | [326 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [409 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [40a 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [261 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [40b 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 principal evaluation fails +peer0.org1.example.com | [262 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [327 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org2.example.com | [40c 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335a890 gate 1602702069142170200 evaluation fails +peer1.org1.example.com | [328 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [969d92a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | [40d 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [263 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [329 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [969d92a2] notifying Txid:969d92a2-314a-4859-933e-a963149edacb, channelID:businesschannel +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" +peer0.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer1.org2.example.com | [40e 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [264 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [32a 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" +peer0.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer1.org2.example.com | [40f 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [265 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [32b 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" +peer0.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer1.org2.example.com | [410 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 gate 1602702069143630400 evaluation starts +peer0.org1.example.com | [266 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org1.example.com | [32c 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [969d92a2-314a-4859-933e-a963149edacb] +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" +peer0.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org2.example.com | [411 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [267 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [32d 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" +peer0.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer1.org2.example.com | [412 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [268 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [32e 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f634b1c5-bc40-4118-ad61-45a1f2363fad] +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" +peer0.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer1.org2.example.com | [413 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [269 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [32f 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer1.org2.example.com | [414 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [26a 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [330 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f634b1c5-bc40-4118-ad61-45a1f2363fad] +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [415 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [26b 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [331 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [349 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:59180 +peer1.org2.example.com | [416 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 principal matched by identity 0 +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [332 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0D0DF898CA1FC9E16...387B0008A61A99B98BA4E6D12A020801 +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" +peer0.org2.example.com | [34a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:59180 +peer1.org2.example.com | [417 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [333 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7EEB00607B61BF9D2EC2AADAFA0E93DAB0303BFC99E3416FD45DD41CB410494C +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" +peer0.org2.example.com | [34b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 gate 1602702068752029800 evaluation starts +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [334 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [335 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [f862aac2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-10-14 19:01:00.020 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.021 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [336 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [f862aac2] notifying Txid:f862aac2134c6f48f179337ccd00fe40adf0626a5468bf5d22c1b433a5dcc6bd, channelID: +orderer0.example.com | "2020-10-14 19:01:00.021 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" +peer0.org2.example.com | [34c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [34e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [337 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [338 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO [][f862aac2] Exit chaincode: name:"cscc" (133ms) +peer1.org1.example.com | [339 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU [][f862aac2] Exit +peer1.org1.example.com | [33a 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54596 +peer1.org1.example.com | [33b 10-14 19:01:02.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54596 grpc.code=OK grpc.call_duration=141.6438ms +peer1.org1.example.com | [33c 10-14 19:01:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [33d 10-14 19:01:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [33e 10-14 19:01:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [33f 10-14 19:01:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [340 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [341 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [342 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [343 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [344 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | [418 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 65 21 ca 3e 6f 7e 2b ed 83 5a |0E.!..e!.>o~+..Z| +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [345 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [346 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 8b c1 19 b4 60 85 4b 81 4a 76 ab 3a 13 dc 25 |.....`.K.Jv.:..%| +orderer0.example.com | "2020-10-14 19:01:00.021 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [347 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [34f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [350 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59180 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | [351 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | [352 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | 00000020 0a 13 1b 18 20 02 20 43 a5 42 2b 12 97 c5 87 1e |.... . C.B+.....| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [353 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | 00000030 2c 90 a2 6b b1 d7 e4 74 07 83 56 93 fd 31 b4 b7 |,..k...t..V..1..| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | [348 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [349 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161008 +peer0.org1.example.com | [26c 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [26d 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | 00000040 96 1c 08 68 c9 8c 2b |...h..+| +peer1.org1.example.com | [34a 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2E7A6DC560CE4428A3AE43D56044C616E725AD0271DC9A002A1E0C79255A6710 +peer0.org1.example.com | [26e 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [26f 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [270 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [271 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [34b 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [34c 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [272 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [354 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [355 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [357 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [273 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [274 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [275 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [34d 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [419 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34e 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41b 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00335ae20 gate 1602702069143630400 evaluation succeeds +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | [41c 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41d 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41a 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [358 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [359 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [35b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [34f 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 gate 1602702068757684500 evaluation starts +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | [350 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | [351 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | [352 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | nw== +peer1.org1.example.com | [353 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 principal matched by identity 0 +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [354 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org2.example.com | [360 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +peer1.org2.example.com | [420 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [msp] Setup -> DEBU 4d0 Setting up the MSP manager (3 msps)" +peer1.org1.example.com | [355 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +peer1.org2.example.com | [421 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [msp] Setup -> DEBU 4d1 MSP manager setup complete, setup 3 msps" +peer1.org1.example.com | [356 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 7a 6d c5 60 ce 44 28 a3 ae 43 d5 60 44 c6 16 |.zm.`.D(..C.`D..| +peer1.org2.example.com | [422 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000010 e7 25 ad 02 71 dc 9a 00 2a 1e 0c 79 25 5a 67 10 |.%..q...*..y%Zg.| +peer0.org2.example.com | 00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +peer1.org2.example.com | [423 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [357 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 cc ef 61 c2 35 54 9a fc ee 3a 59 |0D. ...a.5T...:Y| +peer0.org2.example.com | 00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +peer1.org2.example.com | [424 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161005 +peer0.org1.example.com | [276 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000010 c3 39 2e 9b 27 30 0d 6d 26 d5 56 98 2f de cb 11 |.9..'0.m&.V./...| +peer0.org2.example.com | 00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +peer1.org2.example.com | [425 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F793DA1FB76197342DA2C77FD4EE06DBB7A5C874356A48047A401EEFCE20D29A +peer0.org1.example.com | [277 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org1.example.com | 00000020 9f ac b6 03 02 20 3e 4a eb 2f 1d e7 cd 43 4e 2b |..... >J./...CN+| +peer0.org2.example.com | 00000040 18 33 db 7a 92 d8 |.3.z..| +peer1.org2.example.com | [426 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [278 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Readers for Channel/Orderer" +peer1.org1.example.com | 00000030 56 58 79 3c 7f 5c f3 50 a1 3a 76 82 7a 36 cb a5 |VXy<.\.P.:v.z6..| +peer0.org2.example.com | [362 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [427 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [279 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Writers for Channel/Orderer" +peer1.org1.example.com | 00000040 51 e7 ad d3 cd 1d |Q.....| +peer0.org2.example.com | [363 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319dc80 gate 1602702068757684500 evaluation succeeds +peer1.org2.example.com | [428 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [27a 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [27b 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [358 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [364 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [429 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42a 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Orderer" +peer0.org2.example.com | [365 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [27c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [359 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db ee 3d 86 9a 0e e7 e3 75 48 f4 |0E.!...=.....uH.| +peer1.org2.example.com | [42b 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [42c 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [42d 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [27d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | 00000010 4e 9c 95 5f 58 a7 db 58 e1 2e 2f 39 33 f9 51 c9 |N.._X..X../93.Q.| +peer0.org1.example.com | [27e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [27f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [280 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [281 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [282 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org2.example.com | [42e 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | 00000020 43 08 20 ae 5d 02 20 5e 40 95 ab 20 44 72 16 6a |C. .]. ^@.. Dr.j| +peer1.org1.example.com | 00000030 e0 31 a3 5d b4 47 cd 6a 78 9d 92 6a 10 80 41 05 |.1.].G.jx..j..A.| +peer1.org1.example.com | 00000040 71 ef c7 b1 e4 01 8e |q......| +peer0.org1.example.com | [283 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [284 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [285 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [286 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org1.example.com | [287 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [288 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [289 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [28a 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [28b 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [28c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [28d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [28e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [28f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [290 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [291 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [292 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [293 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [294 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [295 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [296 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [297 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [298 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [299 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [29a 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [29b 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [29c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [29d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [42f 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [430 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [431 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003219240)} +peer1.org2.example.com | [432 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [434 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [435 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [436 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [437 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [438 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [433 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [439 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [43a 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [43b 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [43d 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [43e 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002945d10, CONNECTING +peer1.org2.example.com | [43c 10-14 19:01:09.15 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [43f 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +peer1.org2.example.com | txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +peer1.org2.example.com | ] +peer1.org2.example.com | [440 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to txid-index +peer1.org2.example.com | [441 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx number:[0] ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to blockNumTranNum index +peer1.org2.example.com | [442 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002945d10, READY +peer1.org2.example.com | [443 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56677], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org2.example.com | [444 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [445 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | [446 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [366 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [367 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [368 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [369 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org2.example.com | [356 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [36a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [36b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 principal matched by identity 0 +peer0.org2.example.com | [36f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [370 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff cb e9 0a dc dd 93 4b 3a c6 d4 40 fe b8 22 cb |.......K:..@..".| +peer0.org2.example.com | 00000010 cc 9a ca 35 fb e8 e7 51 b6 74 3d 19 c8 72 98 71 |...5...Q.t=..r.q| +peer0.org2.example.com | [371 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 09 11 d5 2a 27 eb 58 ea 8d dd af |0D. ....*'.X....| +peer0.org2.example.com | 00000010 cb f5 4b 6d a8 69 80 dd ae 0a bc 98 b8 e4 6a d0 |..Km.i........j.| +peer0.org2.example.com | 00000020 b4 1c 06 30 02 20 4c 8d 36 00 c8 70 00 d6 7e 55 |...0. L.6..p..~U| +peer0.org2.example.com | 00000030 5b 01 0a c8 f3 03 b6 26 b9 34 f3 61 fb b1 37 96 |[......&.4.a..7.| +peer0.org2.example.com | 00000040 de 4a 4a 2d c9 e7 |.JJ-..| +peer0.org2.example.com | [372 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [373 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161002 +peer0.org2.example.com | [374 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1A5C5BA1C5D042F310984BF18DE343FC6711544540FD8A65AB61DA15F47E4813 +peer0.org2.example.com | [375 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [377 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b7510 gate 1602702068752029800 evaluation succeeds +peer0.org2.example.com | [376 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [378 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [379 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [37a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [37b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [37c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [37d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [37e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [380 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [381 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [382 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [383 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer0.org2.example.com | [384 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org2.example.com | [387 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org2.example.com | [388 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org2.example.com | [389 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org2.example.com | [38a 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org2.example.com | [38b 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [38c 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00300ff40 env 0xc0032227d0 txn 0 +peer0.org2.example.com | [38d 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0032227d0 +peer0.org1.example.com | [29e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [29f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [2a0 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [2a1 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [2a2 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [2a3 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [2a4 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a5 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2a6 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [2a7 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [2a8 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2a9 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [2aa 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [2ab 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ac 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [2ad 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [2ae 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [2af 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [2b0 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [2b1 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [2b2 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [2b3 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [2b4 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [2b5 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [2b6 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [2b7 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [2b8 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [2b9 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [2ba 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [2bb 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [2bc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [2bd 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [2be 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [2bf 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [2c0 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [2c1 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [2c2 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [2c3 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [2c4 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [2c5 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [2c6 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [2c7 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [2c8 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [2c9 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [2ca 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [2cb 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [2cc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [2cd 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [2ce 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [2cf 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [2d0 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [2d1 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [2d2 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [2d3 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org1.example.com | [2d4 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [2d5 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2d6 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2d7 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [2d8 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 15E7C93E7C5E98F226110C490D26EFA65A9344E3AABBC45F1956BDFF92FF5C50 +peer0.org1.example.com | [2d9 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [2da 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [2db 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [2dc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [2dd 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [2de 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [2df 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [2e0 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [2e1 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org1.example.com | [2e2 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org1.example.com | [2e3 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org1.example.com | [2e4 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [2e5 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2e6 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [2e7 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [2e8 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org1.example.com | [2e9 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [2ea 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org1.example.com | [2eb 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org1.example.com | [2ec 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org1.example.com | [2ee 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2ed 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2ef 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org1.example.com | [2f0 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f1 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [69463385-4c0a-4b7e-977b-2b7599a5d555] +peer0.org1.example.com | [2f2 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f3 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [69463385] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f4 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [69463385] notifying Txid:69463385-4c0a-4b7e-977b-2b7599a5d555, channelID:businesschannel +peer0.org1.example.com | [2f5 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f6 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [2f7 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [69463385-4c0a-4b7e-977b-2b7599a5d555] +peer0.org1.example.com | [2f8 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f9 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [37cb7972-24af-4629-a9a3-1a8b9395249c] +peer0.org1.example.com | [2fa 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2fb 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [2fc 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [37cb7972] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2fd 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [37cb7972] notifying Txid:37cb7972-24af-4629-a9a3-1a8b9395249c, channelID:businesschannel +peer0.org1.example.com | [2fe 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2ff 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [300 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [37cb7972-24af-4629-a9a3-1a8b9395249c] +peer0.org1.example.com | [301 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [302 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c86b0933-1fdb-4eaf-9900-db1777bc7163] +peer0.org1.example.com | [303 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [304 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [305 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [c86b0933] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [306 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [c86b0933] notifying Txid:c86b0933-1fdb-4eaf-9900-db1777bc7163, channelID:businesschannel +peer0.org1.example.com | [307 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [308 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [309 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c86b0933-1fdb-4eaf-9900-db1777bc7163] +peer0.org1.example.com | [30a 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [30b 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ea343cc4-ea62-479b-8acb-7c663ee6c48d] +peer0.org1.example.com | [30c 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [38e 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer0.org2.example.com | [38f 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [385 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [390 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: +peer0.org2.example.com | [391 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [392 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer0.org2.example.com | [393 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [386 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [394 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org2.example.com | [395 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [396 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [397 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [398 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [399 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [39a 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 gate 1602702068770023900 evaluation starts +peer0.org2.example.com | [39b 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39c 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39d 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 principal matched by identity 0 +peer0.org2.example.com | [39e 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 f9 c1 20 15 cf df 55 6d 9b a0 06 f0 99 6b 98 |x.. ...Um.....k.| +peer0.org2.example.com | 00000010 b6 83 2e 5e 9e 97 be fe 6e 72 f7 f6 67 73 da 4e |...^....nr..gs.N| +peer0.org2.example.com | [39f 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb d0 f8 7c 65 7e 6d ba 5f 50 a4 |0E.!....|e~m._P.| +peer0.org2.example.com | 00000010 ec 57 38 53 da de 25 9c b6 3d 35 53 5d 6e 35 5f |.W8S..%..=5S]n5_| +peer0.org2.example.com | 00000020 88 fa ad 23 85 02 20 36 31 a6 08 99 74 aa 1f f1 |...#.. 61...t...| +peer0.org2.example.com | 00000030 15 e0 c7 e6 aa 19 d4 db 07 58 1a 05 88 1b f9 96 |.........X......| +peer0.org2.example.com | 00000040 d9 ad 45 4e 69 e5 27 |..ENi.'| +peer0.org2.example.com | [3a0 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a1 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032595b0 gate 1602702068770023900 evaluation succeeds +peer0.org2.example.com | [3a2 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3a3 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3a4 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3a5 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3a6 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [3a7 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [3a8 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3a9 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer0.org2.example.com | [3aa 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3ab 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org2.example.com | [3ac 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3ad 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ae 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3af 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [3b0 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [448 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [449 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [447 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [44a 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [44b 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [44c 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [44d 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [44e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [44f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [450 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org2.example.com | [451 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [452 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [453 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [454 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [457 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [455 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [458 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [459 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [456 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [45a 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [45b 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [45c 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [45d 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [461 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [462 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [463 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [460 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [465 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 50ms (state_validation=20ms block_and_pvtdata_commit=15ms state_commit=11ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [466 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [467 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org2.example.com | [468 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [469 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org2.example.com | [46a 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org2.example.com | [46b 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [46c 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc000096e00 env 0xc00028ecd0 txn 0 +peer1.org2.example.com | [46d 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00028ecd0 +peer1.org2.example.com | [464 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [46e 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 gate 1602702069183675000 evaluation starts +peer1.org2.example.com | [46f 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [470 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [471 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [472 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 principal evaluation fails +peer0.org2.example.com | [3b1 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [3b2 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3b3 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:9819258719419633674 tag:EMPTY mem_req:OL\215\353\3048@\\r\031Nm\335\016F.\333'\235\276N\363\326\234\300&\014\177" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b5 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b6 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9819258719419633674 tag:EMPTY mem_req:OL\215\353\3048@\\r\031Nm\335\016F.\333'\235\276N\363\326\234\300&\014\177" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b7 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3b8 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ba 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bb 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b4 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +peer0.org2.example.com | 00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..| +peer0.org2.example.com | [3bd 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bc 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3be 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bf 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c0 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 gate 1602702068781970200 evaluation starts +peer0.org2.example.com | [3c1 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c2 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c3 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 principal matched by identity 0 +peer0.org2.example.com | [3c4 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 2e 8d 0c 45 77 67 33 b9 5f 9f 11 b8 0e fc c9 |....Ewg3._......| +peer0.org2.example.com | 00000010 f3 a8 08 5b 83 8b 98 d3 3b 20 da a6 50 79 6e db |...[....; ..Pyn.| +peer0.org2.example.com | [3c5 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 45 17 9d cb 87 2e ea fd e6 d6 26 |0D. IE.........&| +peer0.org2.example.com | 00000010 23 76 2d ff d6 18 7e 1b 00 27 aa 23 2b f2 51 a6 |#v-...~..'.#+.Q.| +peer0.org2.example.com | 00000020 84 f5 97 97 02 20 27 a9 21 3e 4f 4c 8d eb c4 38 |..... '.!>OL...8| +peer0.org2.example.com | 00000030 40 5c 72 19 4e 6d dd 0e 46 2e db 27 9d be 4e f3 |@\r.Nm..F..'..N.| +peer0.org2.example.com | 00000040 d6 9c c0 26 0c 7f |...&..| +peer0.org2.example.com | [3c6 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c7 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eaf60 gate 1602702068781970200 evaluation succeeds +peer0.org2.example.com | [3c8 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c9 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ca 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3cb 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3cc 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cd 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org2.example.com | [3ce 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3cf 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d0 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d1 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d2 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3d3 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d4 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161003 +peer0.org2.example.com | [3d5 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 443388493D13DDAA065A86000B485A75A05C13CDD8B7CD5D2ED0A19341288AE2 +peer0.org2.example.com | [3d6 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d7 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3d8 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3d9 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3da 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3db 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dc 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9819258719419633674, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3dd 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:OL\215\353\3048@\\r\031Nm\335\016F.\333'\235\276N\363\326\234\300&\014\177" > alive: +peer0.org2.example.com | [3de 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9819258719419633674, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer0.org2.example.com | [3df 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e0 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +peer0.org2.example.com | 00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +peer0.org2.example.com | 00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +peer0.org2.example.com | 00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +peer0.org2.example.com | 00000040 69 60 4d b6 27 ea |i`M.'.| +peer0.org2.example.com | [3e1 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3e2 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003288a80, header channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer0.org2.example.com | [3e3 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [3e4 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3e5 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3e6 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [30d 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ea343cc4-ea62-479b-8acb-7c663ee6c48d] +peer0.org1.example.com | [30e 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [30f 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [310 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E80CA59D4B5D2E53BC03E275B038F2E83D346351F41D5ACAFD982B571F37FAD +peer0.org1.example.com | [311 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [312 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [9bfc48ae] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [313 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [9bfc48ae] notifying Txid:9bfc48aeb1a2ab57085ed14a1091c211424fc9a3c081edeb0134860cfa4f73f8, channelID: +peer0.org1.example.com | [314 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [315 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> INFO [][9bfc48ae] Exit chaincode: name:"cscc" (149ms) +peer0.org1.example.com | [316 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] Exit +peer0.org1.example.com | [317 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41666 +peer0.org1.example.com | [318 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41666 grpc.code=OK grpc.call_duration=154.2405ms +peer0.org1.example.com | [319 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [31a 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [31b 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c 10-14 19:01:02.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41666: read: connection reset by peer +peer0.org1.example.com | [31d 10-14 19:01:02.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [31e 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [31f 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [320 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [321 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [322 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [323 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [324 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [325 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [326 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [327 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [328 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 gate 1602702062396672700 evaluation starts +peer0.org1.example.com | [329 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32a 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32b 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [32c 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 principal evaluation fails +peer0.org1.example.com | [32d 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 gate 1602702062396672700 evaluation fails +peer0.org1.example.com | [32e 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32f 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [330 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [331 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 gate 1602702062398866200 evaluation starts +peer0.org1.example.com | [332 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [333 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [334 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [335 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [336 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [337 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 principal matched by identity 0 +peer0.org1.example.com | [338 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [339 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] GetPolicy -> DEBU 4e2 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [policies] GetPolicy -> DEBU 4e4 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [policies] GetPolicy -> DEBU 4e6 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 512 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 515 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Value] /Channel/Consortium" +peer1.org1.example.com | [35a 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [35b 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [35c 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35d 10-14 19:01:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [360 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [361 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [362 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [473 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004439d0 gate 1602702069183675000 evaluation fails +peer1.org2.example.com | [474 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [475 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer1.org2.example.com | [477 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [476 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [478 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [47a 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 gate 1602702069185821300 evaluation starts +peer1.org2.example.com | [47b 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47c 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [479 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [47d 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 principal matched by identity 0 +peer1.org2.example.com | [47f 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [480 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 8c 34 71 e9 d6 cc 2e 5b d6 e1 8a |0D. \.4q....[...| +peer1.org2.example.com | 00000010 8b 21 97 e2 16 71 57 8c a5 45 ec 1a f1 ab 00 52 |.!...qW..E.....R| +peer1.org2.example.com | 00000020 0d 47 3e 2c 02 20 52 ea fb 9f 45 4e 40 41 db 38 |.G>,. R...EN@A.8| +peer1.org2.example.com | 00000030 af 44 5d 0f 4d cc 88 70 d4 54 d5 c8 46 cf 6c ee |.D].M..p.T..F.l.| +peer1.org2.example.com | 00000040 2a 03 15 07 0a fb |*.....| +peer1.org2.example.com | [481 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [482 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443f40 gate 1602702069185821300 evaluation succeeds +peer1.org2.example.com | [483 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [484 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [485 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [486 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [487 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org2.example.com | [488 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [489 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [48a 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47e 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [48b 10-14 19:01:09.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [48c 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | [364 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [365 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [366 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [367 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [368 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d a3 ff cd 2a f4 72 2e 55 e6 56 24 1f 02 93 e3 |}...*.r.U.V$....| +peer1.org1.example.com | 00000010 a0 ca 0d ae 35 63 91 af 05 93 62 d3 4f 42 9d b3 |....5c....b.OB..| +peer1.org1.example.com | [369 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 1d 62 02 6a 23 7e 2d 76 2e a6 |0E.!...b.j#~-v..| +peer1.org1.example.com | 00000010 13 1b a7 a0 93 0a d9 1a a7 8b 24 6a df 7d 28 27 |..........$j.}('| +peer1.org1.example.com | 00000020 f3 08 cc 01 54 02 20 36 55 a7 01 c0 9f f7 ec 6b |....T. 6U......k| +peer1.org1.example.com | 00000030 ac 77 fa a9 51 1e 9d 34 eb df 99 70 6a 98 4c 2d |.w..Q..4...pj.L-| +peer1.org1.example.com | 00000040 79 75 a4 f6 39 90 ca |yu..9..| +peer1.org1.example.com | [36a 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [36b 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 88 45 bf 76 3b b9 61 c8 3e 86 |0E.!...E.v;.a.>.| +peer1.org1.example.com | 00000010 29 b1 d5 e6 3c f3 35 8d fa 34 65 57 73 4e ef 62 |)...<.5..4eWsN.b| +peer1.org1.example.com | 00000020 06 78 f0 f7 8c 02 20 5f 95 d8 b4 45 05 ec 81 26 |.x.... _...E...&| +peer1.org1.example.com | 00000030 96 b4 7d be 5d 3e c9 2e 29 1c a0 26 0d 12 f5 54 |..}.]>..)..&...T| +peer1.org1.example.com | 00000040 40 1e af a5 04 5c 8b |@....\.| +peer1.org1.example.com | [36c 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [36d 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [36e 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [36f 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [370 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [371 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [374 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [375 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [376 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | [377 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [378 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > alive: > +peer1.org1.example.com | [379 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting, peers found 0 +peer1.org1.example.com | [37a 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [37b 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [33a 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33b 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 gate 1602702062398866200 evaluation succeeds +peer0.org1.example.com | [33c 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [33d 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [33e 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33f 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [340 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [341 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [342 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [343 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [344 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [345 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [346 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [347 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [348 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [349 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 7a 6d c5 60 ce 44 28 a3 ae 43 d5 60 44 c6 16 |.zm.`.D(..C.`D..| +peer0.org1.example.com | 00000010 e7 25 ad 02 71 dc 9a 00 2a 1e 0c 79 25 5a 67 10 |.%..q...*..y%Zg.| +peer0.org1.example.com | [34a 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 cc ef 61 c2 35 54 9a fc ee 3a 59 |0D. ...a.5T...:Y| +peer0.org1.example.com | 00000010 c3 39 2e 9b 27 30 0d 6d 26 d5 56 98 2f de cb 11 |.9..'0.m&.V./...| +peer0.org1.example.com | 00000020 9f ac b6 03 02 20 3e 4a eb 2f 1d e7 cd 43 4e 2b |..... >J./...CN+| +peer0.org1.example.com | 00000030 56 58 79 3c 7f 5c f3 50 a1 3a 76 82 7a 36 cb a5 |VXy<.\.P.:v.z6..| +peer0.org1.example.com | 00000040 51 e7 ad d3 cd 1d |Q.....| +peer0.org1.example.com | [34b 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [34c 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db ee 3d 86 9a 0e e7 e3 75 48 f4 |0E.!...=.....uH.| +peer0.org1.example.com | 00000010 4e 9c 95 5f 58 a7 db 58 e1 2e 2f 39 33 f9 51 c9 |N.._X..X../93.Q.| +peer0.org1.example.com | 00000020 43 08 20 ae 5d 02 20 5e 40 95 ab 20 44 72 16 6a |C. .]. ^@.. Dr.j| +peer0.org1.example.com | 00000030 e0 31 a3 5d b4 47 cd 6a 78 9d 92 6a 10 80 41 05 |.1.].G.jx..j..A.| +peer0.org1.example.com | 00000040 71 ef c7 b1 e4 01 8e |q......| +peer0.org1.example.com | [34d 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [34e 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [34f 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e7 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [3e8 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e9 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [3ea 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3eb 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3ec 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3ed 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3ee 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [3ef 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [3f0 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [37c 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [37d 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [37e 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...3D9B120C08F8939BA18CA1FC9E161001 +peer1.org1.example.com | [37f 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA660E13C16A6B02EE2FEA4E81C4BEE1AA6529B404991A01B76698DB9E765FFF +peer1.org1.example.com | [380 10-14 19:01:03.36 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [381 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54604 +peer1.org1.example.com | [382 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000118280 +peer1.org1.example.com | [383 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [384 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [385 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [386 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [387 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 3f 55 8b 0e e5 b9 76 28 ae d1 d2 5f 13 cd 3d |.?U....v(..._..=| +peer1.org1.example.com | 00000010 73 f9 fc 6f 42 98 c5 d0 6d 3a 40 14 e8 c9 ed 9a |s..oB...m:@.....| +peer1.org1.example.com | [388 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 9c 4b 39 8e 18 4f ca bd 1d 92 |0E.!...K9..O....| +peer1.org1.example.com | 00000010 9d 84 33 42 fc 03 1f de 30 d7 14 b8 56 25 6e 40 |..3B....0...V%n@| +peer1.org1.example.com | 00000020 58 ab a0 66 0c 02 20 23 5e be 2f b0 5b 01 95 a8 |X..f.. #^./.[...| +peer1.org1.example.com | 00000030 ed e0 1b cb ff 94 2d c5 2f 94 ea 94 e2 99 c6 65 |......-./......e| +peer1.org1.example.com | 00000040 17 8e 58 d0 d7 fa bf |..X....| +peer1.org1.example.com | [389 10-14 19:01:03.57 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [38a 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00018bc00, header 0xc000119a40 +peer1.org1.example.com | [38b 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [38c 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU [][6cebddd8] processing txid: 6cebddd852185b8729e09956b553e1a5f5527630f0d88d0e5cd7c3989fd695c1 +peer1.org1.example.com | [38d 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU [][6cebddd8] Entry chaincode: name:"cscc" +peer1.org1.example.com | [38e 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> INFO [][6cebddd8] Entry chaincode: name:"cscc" +peer1.org1.example.com | [38f 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [390 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [391 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [392 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [393 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [394 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 3f 55 8b 0e e5 b9 76 28 ae d1 d2 5f 13 cd 3d |.?U....v(..._..=| +peer1.org1.example.com | 00000010 73 f9 fc 6f 42 98 c5 d0 6d 3a 40 14 e8 c9 ed 9a |s..oB...m:@.....| +peer1.org1.example.com | [395 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 9c 4b 39 8e 18 4f ca bd 1d 92 |0E.!...K9..O....| +peer1.org1.example.com | 00000010 9d 84 33 42 fc 03 1f de 30 d7 14 b8 56 25 6e 40 |..3B....0...V%n@| +peer1.org1.example.com | 00000020 58 ab a0 66 0c 02 20 23 5e be 2f b0 5b 01 95 a8 |X..f.. #^./.[...| +peer1.org1.example.com | 00000030 ed e0 1b cb ff 94 2d c5 2f 94 ea 94 e2 99 c6 65 |......-./......e| +peer1.org1.example.com | 00000040 17 8e 58 d0 d7 fa bf |..X....| +peer1.org1.example.com | [396 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU [6cebddd8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [397 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU [6cebddd8] notifying Txid:6cebddd852185b8729e09956b553e1a5f5527630f0d88d0e5cd7c3989fd695c1, channelID: +peer1.org1.example.com | [398 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [399 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> INFO [][6cebddd8] Exit chaincode: name:"cscc" (2ms) +peer1.org1.example.com | [39a 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU [][6cebddd8] Exit +peer1.org1.example.com | [39b 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54604 +peer1.org1.example.com | [39c 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54604 grpc.code=OK grpc.call_duration=4.4059ms +peer1.org1.example.com | [39d 10-14 19:01:03.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [39e 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes +peer1.org1.example.com | [39f 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a0 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b f3 ff f4 f7 3c 6c 61 d8 b3 bd 72 1c 97 22 a6 |..... DEBU Verify: sig = 00000000 30 44 02 20 79 bd c9 17 bb 23 7a cb c7 70 6d d4 |0D. y....#z..pm.| +peer1.org1.example.com | 00000010 02 a3 c7 f7 a9 e4 f9 ac c7 07 85 f0 7d 9e 20 e0 |............}. .| +peer1.org1.example.com | 00000020 0a 79 1c 47 02 20 49 62 61 8f 6c 42 71 1a ed cc |.y.G. Iba.lBq...| +peer1.org1.example.com | 00000030 d6 21 f7 2d cf 97 00 82 93 c6 af 0e 27 b8 30 35 |.!.-........'.05| +peer1.org1.example.com | 00000040 0b 5b ef 7c 09 24 |.[.|.$| +peer1.org1.example.com | [3a2 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a3 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Got message from 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c but it is not in the view +peer1.org1.example.com | [3a4 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54612 +peer1.org1.example.com | [3a5 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002508a50 +peer1.org1.example.com | [3a6 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3a7 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3a8 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3a9 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3aa 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 bc a4 7a 16 a9 9e be ed 8e 6f 19 3e c3 6c 3c |1..z......o.>.l<| +peer1.org1.example.com | 00000010 41 f1 10 e0 c2 c5 e8 9f f9 08 45 a5 6f 46 42 9e |A.........E.oFB.| +peer1.org1.example.com | [3ab 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 de f4 53 76 0b 0e f8 40 7f a8 |0E.!....Sv...@..| +peer1.org1.example.com | 00000010 56 ed 5b 49 57 e0 28 a2 e0 1c c4 cd 81 f7 60 27 |V.[IW.(.......`'| +peer1.org1.example.com | 00000020 9c fa b0 06 58 02 20 78 44 95 8f a1 0e d6 6b 2f |....X. xD.....k/| +peer1.org1.example.com | 00000030 ab b0 ee 5c 6d a4 44 e9 51 4e db 00 38 e6 b8 5d |...\m.D.QN..8..]| +peer1.org1.example.com | 00000040 3e e4 f8 4b 49 e8 b9 |>..KI..| +peer1.org1.example.com | [3ac 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3ad 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000272380, header 0xc002508e60 +peer1.org1.example.com | [3ae 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [3af 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][cb508775] processing txid: cb5087750436e0992c7c9a5064961f426516be31e319efb008c95af0dffe9d06 +peer1.org1.example.com | [3b0 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU [][cb508775] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3b1 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> INFO [][cb508775] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3b2 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3b3 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [3b4 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [3b5 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [3b6 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b7 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b8 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b9 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3bb 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 gate 1602702064528164000 evaluation starts +peer1.org1.example.com | [3bc 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bd 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3be 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3bf 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3c0 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3c1 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 principal matched by identity 0 +peer1.org1.example.com | [3c2 10-14 19:01:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 bc a4 7a 16 a9 9e be ed 8e 6f 19 3e c3 6c 3c |1..z......o.>.l<| +peer1.org1.example.com | 00000010 41 f1 10 e0 c2 c5 e8 9f f9 08 45 a5 6f 46 42 9e |A.........E.oFB.| +peer1.org1.example.com | [3c3 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 de f4 53 76 0b 0e f8 40 7f a8 |0E.!....Sv...@..| +peer1.org1.example.com | 00000010 56 ed 5b 49 57 e0 28 a2 e0 1c c4 cd 81 f7 60 27 |V.[IW.(.......`'| +peer1.org1.example.com | 00000020 9c fa b0 06 58 02 20 78 44 95 8f a1 0e d6 6b 2f |....X. xD.....k/| +peer1.org1.example.com | 00000030 ab b0 ee 5c 6d a4 44 e9 51 4e db 00 38 e6 b8 5d |...\m.D.QN..8..]| +peer1.org1.example.com | 00000040 3e e4 f8 4b 49 e8 b9 |>..KI..| +peer1.org1.example.com | [3c4 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c5 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002692920 gate 1602702064528164000 evaluation succeeds +peer1.org1.example.com | [3c6 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c7 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c8 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c9 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ca 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cb508775] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3cb 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [cb508775] notifying Txid:cb5087750436e0992c7c9a5064961f426516be31e319efb008c95af0dffe9d06, channelID: +peer1.org1.example.com | [3cc 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3cd 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> INFO [][cb508775] Exit chaincode: name:"qscc" (7ms) +peer1.org1.example.com | [3ce 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [][cb508775] Exit +peer1.org1.example.com | [3cf 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54612 +peer1.org1.example.com | [3d0 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54612 grpc.code=OK grpc.call_duration=10.9187ms +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [common.configtx] verifyDeltaSet -> DEBU 51f Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [common.configtx] verifyDeltaSet -> DEBU 520 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [common.configtx] policyForItem -> DEBU 521 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 522 Manager Channel looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 523 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 524 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 525 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 526 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 527 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 528 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 529 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 52a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Evaluate -> DEBU 52b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-10-14 19:01:00.030 UTC [policies] Evaluate -> DEBU 52c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [policies] Evaluate -> DEBU 52d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [msp] DeserializeIdentity -> DEBU 52e Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [cauthdsl] func1 -> DEBU 530 0xc00056c0b0 gate 1602702060031806500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [cauthdsl] func2 -> DEBU 531 0xc00056c0b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:00.031 UTC [cauthdsl] func2 -> DEBU 532 0xc00056c0b0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 533 0xc00056c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 534 0xc00056c0b0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func1 -> DEBU 535 0xc00056c0b0 gate 1602702060031806500 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 536 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func1 -> DEBU 539 0xc00056d270 gate 1602702060032372300 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 53a 0xc00056d270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 53b 0xc00056d270 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 53c Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 53d Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.032 UTC [msp] Validate -> DEBU 53e MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [msp] getCertificationChain -> DEBU 53f MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [msp] hasOURole -> DEBU 540 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [msp] getCertificationChain -> DEBU 541 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [cauthdsl] func2 -> DEBU 542 0xc00056d270 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [msp.identity] Verify -> DEBU 543 Verify: digest = 00000000 8d 0c 30 bf 9e 22 01 dc 8d 32 f9 57 cc f4 45 f9 |..0.."...2.W..E.| +orderer0.example.com | 00000010 d4 24 db 30 5d 70 f7 ba a6 3e 37 f2 ff 17 bf b2 |.$.0]p...>7.....|" +orderer0.example.com | "2020-10-14 19:01:00.033 UTC [msp.identity] Verify -> DEBU 544 Verify: sig = 00000000 30 45 02 21 00 fc 78 ec d9 43 1f f3 19 65 b0 3c |0E.!..x..C...e.<| +orderer0.example.com | 00000010 32 ba cd b0 cf f9 1a fe 51 c9 05 96 dc 57 88 f3 |2.......Q....W..| +orderer0.example.com | 00000020 ac 44 85 68 3c 02 20 2e 39 eb df 1d 72 ff 17 61 |.D.h<. .9...r..a| +orderer0.example.com | 00000030 80 28 c7 8f e8 21 e1 3f de 84 89 ba d7 5a 25 4b |.(...!.?.....Z%K| +orderer0.example.com | 00000040 92 4c 80 d6 72 30 74 |.L..r0t|" +orderer0.example.com | "2020-10-14 19:01:00.034 UTC [cauthdsl] func2 -> DEBU 545 0xc00056d270 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:00.034 UTC [cauthdsl] func1 -> DEBU 546 0xc00056d270 gate 1602702060032372300 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 547 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [48d 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [48e 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [48f 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [490 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [491 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +peer1.org2.example.com | 00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2| +peer1.org2.example.com | [492 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +peer1.org2.example.com | 00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +peer1.org2.example.com | 00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +peer1.org2.example.com | 00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +peer1.org2.example.com | 00000040 7f 4b 57 be 84 c8 e9 |.KW....| +peer1.org2.example.com | [493 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [494 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc000501500, header channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer1.org2.example.com | [495 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [496 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [497 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [498 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [499 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [49a 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [49b 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [49c 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [49d 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [49e 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [49f 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4a0 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [4a1 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4a2 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4a3 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [4a4 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4a5 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4a6 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org2.example.com | [4a7 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [4a8 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [4a9 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [4aa 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [4ab 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4ac 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4ad 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [4ae 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4af 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4b0 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org2.example.com | [4b1 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [4b2 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4b3 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4b4 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 gate 1602702069200818800 evaluation starts +peer1.org2.example.com | [4b5 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b6 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4b7 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [4b9 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [4ba 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bb 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4bc 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [4bd 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4be 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 93 da 1f b7 61 97 34 2d a2 c7 7f d4 ee 06 db |.....a.4-.......| +peer1.org2.example.com | 00000010 b7 a5 c8 74 35 6a 48 04 7a 40 1e ef ce 20 d2 9a |...t5jH.z@... ..| +peer1.org2.example.com | [4bf 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 1c 82 5d c3 66 d1 1b f6 3c dd 86 |0D. :..].f...<..| +peer1.org2.example.com | 00000010 8b d2 67 74 03 08 9d c1 f1 28 89 d4 d8 f7 3e 7c |..gt.....(....>|| +peer1.org2.example.com | 00000020 d8 d1 4d 5d 02 20 43 c6 59 86 4a ac 0c e6 cf 1e |..M]. C.Y.J.....| +peer1.org2.example.com | 00000030 b1 ec 53 3a 42 62 e2 22 1b 20 5f 62 27 a6 88 9c |..S:Bb.". _b'...| +peer1.org2.example.com | 00000040 94 10 bd 9c c9 63 |.....c| +peer1.org2.example.com | [4c0 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 549 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 54a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54b Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54c Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54d Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54e Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] verifyDeltaSet -> DEBU 54f Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] verifyDeltaSet -> DEBU 550 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.037 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 556 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 557 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 558 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 559 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 55a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 560 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 561 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 562 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 563 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 564 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 565 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 566 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.configtx] recurseConfigMap -> DEBU 567 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56d Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] NewStandardValues -> DEBU 56e Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56f Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 571 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 572 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 573 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] NewStandardValues -> DEBU 575 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | [350 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [351 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [352 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [353 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [354 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [355 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [356 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [357 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > alive:\364\366\311\014\377+,\353\032\347~\211\234h\014i\254\017" secret_envelope: > +peer0.org1.example.com | [358 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org1.example.com | [359 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [35b 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [35c 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [35d 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35e 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [360 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [361 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [362 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161008 +peer0.org1.example.com | [363 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DA3FFCD2AF4722E55E656241F0293E3A0CA0DAE356391AF059362D34F429DB3 +peer0.org1.example.com | [364 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [365 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [366 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [367 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [368 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [369 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36a 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [36b 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [36d 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [36e 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d a3 ff cd 2a f4 72 2e 55 e6 56 24 1f 02 93 e3 |}...*.r.U.V$....| +peer0.org1.example.com | 00000010 a0 ca 0d ae 35 63 91 af 05 93 62 d3 4f 42 9d b3 |....5c....b.OB..| +peer0.org1.example.com | [36f 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 1d 62 02 6a 23 7e 2d 76 2e a6 |0E.!...b.j#~-v..| +peer0.org1.example.com | 00000010 13 1b a7 a0 93 0a d9 1a a7 8b 24 6a df 7d 28 27 |..........$j.}('| +peer0.org1.example.com | 00000020 f3 08 cc 01 54 02 20 36 55 a7 01 c0 9f f7 ec 6b |....T. 6U......k| +peer0.org1.example.com | 00000030 ac 77 fa a9 51 1e 9d 34 eb df 99 70 6a 98 4c 2d |.w..Q..4...pj.L-| +peer0.org1.example.com | 00000040 79 75 a4 f6 39 90 ca |yu..9..| +peer0.org1.example.com | [370 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [371 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 88 45 bf 76 3b b9 61 c8 3e 86 |0E.!...E.v;.a.>.| +peer0.org1.example.com | 00000010 29 b1 d5 e6 3c f3 35 8d fa 34 65 57 73 4e ef 62 |)...<.5..4eWsN.b| +peer0.org1.example.com | 00000020 06 78 f0 f7 8c 02 20 5f 95 d8 b4 45 05 ec 81 26 |.x.... _...E...&| +peer0.org1.example.com | 00000030 96 b4 7d be 5d 3e c9 2e 29 1c a0 26 0d 12 f5 54 |..}.]>..)..&...T| +peer0.org1.example.com | 00000040 40 1e af a5 04 5c 8b |@....\.| +peer0.org1.example.com | [372 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [373 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [374 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [375 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [376 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41674 +peer0.org1.example.com | [377 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0031c71d0 +peer0.org1.example.com | [378 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [379 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [37a 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [37b 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [37c 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 09 b4 95 ed 97 7c 82 52 8d dd 92 8e e9 40 51 |......|.R.....@Q| +peer0.org1.example.com | 00000010 38 46 c5 84 c0 78 64 39 f8 f8 e0 4f af e0 82 3e |8F...xd9...O...>| +peer0.org1.example.com | [37d 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 5e 56 9b 46 ff c2 fa 69 06 d7 |0E.!..^V.F...i..| +peer0.org1.example.com | 00000010 50 81 02 00 ec 5a af 35 f3 b4 b3 aa 6a d4 6e d6 |P....Z.5....j.n.| +peer0.org1.example.com | 00000020 8f d5 3b 6f b8 02 20 0b 35 2c 24 22 ef c6 2b 97 |..;o.. .5,$"..+.| +peer0.org1.example.com | 00000030 cb 2b e9 cd d7 60 7f 7a db 32 c7 e9 c9 86 aa 89 |.+...`.z.2......| +peer0.org1.example.com | 00000040 93 fb 49 6b 5d 40 51 |..Ik]@Q| +peer0.org1.example.com | [37e 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [37f 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e16c0, header 0xc0031c75e0 +peer0.org1.example.com | [380 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [381 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] processing txid: abdafc19fa063b4a226cc0b3405d67c8ab53ac1a421c467c4927b17d7dba3886 +peer0.org1.example.com | [382 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] Entry chaincode: name:"cscc" +peer0.org1.example.com | [383 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO [][abdafc19] Entry chaincode: name:"cscc" +peer0.org1.example.com | [384 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [385 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [386 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3d1 10-14 19:01:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3d2 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [387 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [4c1 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4c2 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d3 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161009 +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] NewStandardValues -> DEBU 577 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [388 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [389 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 09 b4 95 ed 97 7c 82 52 8d dd 92 8e e9 40 51 |......|.R.....@Q| +peer0.org1.example.com | 00000010 38 46 c5 84 c0 78 64 39 f8 f8 e0 4f af e0 82 3e |8F...xd9...O...>| +peer0.org1.example.com | [38a 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 5e 56 9b 46 ff c2 fa 69 06 d7 |0E.!..^V.F...i..| +peer0.org1.example.com | 00000010 50 81 02 00 ec 5a af 35 f3 b4 b3 aa 6a d4 6e d6 |P....Z.5....j.n.| +peer1.org1.example.com | [3d4 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 80568E24D1488A5840AD5F1E7573061F4AAB81B2C0138B35C63D74D73E6DC769 +peer1.org2.example.com | [4c3 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer0.org1.example.com | 00000020 8f d5 3b 6f b8 02 20 0b 35 2c 24 22 ef c6 2b 97 |..;o.. .5,$"..+.| +peer0.org2.example.com | [3f1 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f2 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [3d5 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000030 cb 2b e9 cd d7 60 7f 7a db 32 c7 e9 c9 86 aa 89 |.+...`.z.2......| +peer0.org1.example.com | 00000040 93 fb 49 6b 5d 40 51 |..Ik]@Q| +peer0.org1.example.com | [38b 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [abdafc19] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [38c 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [abdafc19] notifying Txid:abdafc19fa063b4a226cc0b3405d67c8ab53ac1a421c467c4927b17d7dba3886, channelID: +peer0.org1.example.com | [38d 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [38e 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO [][abdafc19] Exit chaincode: name:"cscc" (3ms) +peer0.org1.example.com | [38f 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] Exit +peer0.org1.example.com | [390 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41674 +peer0.org1.example.com | [391 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41674 grpc.code=OK grpc.call_duration=6.763ms +peer0.org1.example.com | [392 10-14 19:01:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [393 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +peer0.org1.example.com | [394 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [395 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [396 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [397 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [398 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C08C0CBCAED8AA1FC9E161001 +peer0.org1.example.com | [399 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9BF3FFF4F73C6C61D8B3BD721C9722A66915A6819EDFC0D34F7645023ADC2529 +peer0.org1.example.com | [39a 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [39b 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [39c 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes +peer0.org1.example.com | [39d 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39e 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41682 +peer0.org1.example.com | [39f 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00325a460 +peer0.org1.example.com | [3a0 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3a1 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3a2 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3a3 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3a4 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 8b 73 48 06 86 d3 f8 71 51 0d ae ae 8d 52 5e |..sH....qQ....R^| +peer0.org1.example.com | 00000010 47 8d 69 0d 50 98 6e 18 6a 04 0b b2 0d 67 93 a7 |G.i.P.n.j....g..| +peer0.org1.example.com | [3a5 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 51 f4 47 1a ca 79 ff d2 b2 5c |0E.!..Q.G..y...\| +peer0.org1.example.com | 00000010 3e 96 ca 9b 68 4f 95 f8 0a 5d ea 7c 19 19 ad 3c |>...hO...].|...<| +peer0.org1.example.com | 00000020 b7 6c 68 e3 dc 02 20 58 f8 c0 75 fa b8 ce c4 12 |.lh... X..u.....| +peer0.org1.example.com | 00000030 3d 7f d2 8c 0c d0 d7 77 ee 34 01 1d df 40 76 64 |=......w.4...@vd| +peer0.org1.example.com | 00000040 a2 d9 89 9b 29 d5 9b |....)..| +peer0.org1.example.com | [3a6 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3a7 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e1c70, header 0xc00325a870 +peer0.org1.example.com | [3a8 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [3a9 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] processing txid: 3ad0fce8e380797bc4744f1ef3a30915f025925a7694ea92334f7c11e956910e +peer0.org1.example.com | [3aa 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3ab 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> INFO [][3ad0fce8] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3ac 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3ad 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [3ae 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [3af 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3b0 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b1 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b2 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3b3 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b4 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3b5 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 gate 1602702064328925100 evaluation starts +peer0.org1.example.com | [3b6 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b7 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3b8 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3b9 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 principal evaluation fails +peer0.org1.example.com | [3ba 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 gate 1602702064328925100 evaluation fails +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: MSP" +peer0.org2.example.com | [3f3 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3f4 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org2.example.com | [3f5 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [4c4 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [4c5 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4c6 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bb 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bc 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bd 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3be 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 gate 1602702064330066700 evaluation starts +peer0.org1.example.com | [3bf 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d6 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3c0 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f6 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [common.channelconfig] validateMSP -> DEBU 579 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [msp] newBccspMsp -> DEBU 57a Creating BCCSP-based MSP instance" +peer1.org1.example.com | [3d7 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [4c7 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f7 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3f8 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [3f9 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [3d8 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3d9 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3da 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3db 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dc 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3dd 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3de 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3e0 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [msp] New -> DEBU 57b Creating Cache-MSP instance" +peer1.org1.example.com | [3e1 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 ce 9d c7 43 65 26 31 8c ed 2d 2b c5 c9 a2 ea |....Ce&1..-+....| +peer1.org1.example.com | 00000010 d8 d5 14 56 b7 d5 2b 4b 04 b1 b6 18 42 a5 85 e9 |...V..+K....B...| +peer1.org2.example.com | [4c8 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e2 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad da c1 ae 86 08 bb be 74 6a fe |0E.!.........tj.| +peer1.org2.example.com | [4c9 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4ca 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4cb 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4cc 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4cd 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 gate 1602702069205376300 evaluation starts +peer1.org2.example.com | [4ce 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4cf 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4d0 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4b8 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [4d1 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 principal evaluation fails +peer1.org2.example.com | [4d3 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c84f0 gate 1602702069205376300 evaluation fails +peer1.org2.example.com | [4d4 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4d5 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 1c fa bf 5b 27 de e4 a6 f9 46 42 bb ec bb 89 34 |...['....FB....4| +peer1.org1.example.com | 00000020 15 bb 74 fd af 02 20 50 68 a8 0c 3c 09 8e fc 67 |..t... Ph..<...g| +peer0.org2.example.com | [3fa 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3fb 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | [3c1 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [3c2 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [3c3 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000030 13 06 1d 2f 92 9b 65 9c e6 c6 56 2e dc 77 82 4e |.../..e...V..w.N| +peer1.org1.example.com | 00000040 06 92 b0 a2 aa 70 d3 |.....p.| +peer1.org1.example.com | [3e3 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3e4 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 95 3d 00 38 71 8d c0 86 d5 |0E.!....=.8q....| +peer1.org1.example.com | 00000010 cb a3 95 8a 33 61 5b 4c 7a aa a8 82 88 47 b7 b5 |....3a[Lz....G..| +peer1.org1.example.com | 00000020 d4 a5 cc 8d a5 02 20 02 97 b7 d7 21 c2 8d 37 5b |...... ....!..7[| +peer1.org1.example.com | 00000030 fe 6b 12 83 74 11 ad ce c3 4d 55 0d 6d d5 fe 26 |.k..t....MU.m..&| +peer1.org1.example.com | 00000040 11 75 cd 53 ce 49 3a |.u.S.I:| +peer1.org1.example.com | [3e5 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3e6 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [3e7 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e8 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e9 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3ea 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eb 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ec 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ed 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ee 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ef 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f0 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f1 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f2 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have StateInfo message of peer 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3f3 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f4 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f5 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f6 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [3f7 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +peer1.org1.example.com | 00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +peer1.org1.example.com | 00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +peer1.org1.example.com | 00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +peer1.org1.example.com | 00000040 05 90 52 6c a0 f6 |..Rl..| +peer1.org1.example.com | [3f8 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f9 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fa 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fb 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fc 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3fd 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fe 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3ff 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 gate 1602702065973445600 evaluation starts +peer1.org1.example.com | [400 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [401 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [402 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [403 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [404 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [405 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 principal matched by identity 0 +peer1.org1.example.com | [406 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [407 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +peer1.org1.example.com | 00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +peer1.org1.example.com | 00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +peer1.org1.example.com | 00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +peer1.org1.example.com | 00000040 05 90 52 6c a0 f6 |..Rl..| +peer1.org1.example.com | [408 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [409 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026bf120 gate 1602702065973445600 evaluation succeeds +peer1.org1.example.com | [40a 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40b 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40c 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [40d 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [40e 10-14 19:01:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f 10-14 19:01:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [410 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [411 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [412 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [413 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [414 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [415 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [416 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [417 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0D0DF898CA1FC9E16...387B0008A61A99B98BA4E6D12A020801 +peer1.org1.example.com | [418 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7EEB00607B61BF9D2EC2AADAFA0E93DAB0303BFC99E3416FD45DD41CB410494C +peer1.org1.example.com | [419 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer1.org1.example.com | [41b 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer1.org1.example.com | [41a 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [41c 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [41e 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 a0 8b 15 7c 1f 00 ac ad 0b 2d 0f |0D. %...|.....-.| +peer1.org1.example.com | 00000010 a8 71 f8 5e e2 d9 00 a4 4d d4 a7 c6 45 eb 9e d4 |.q.^....M...E...| +peer1.org1.example.com | 00000020 78 c7 fb 5f 02 20 5a f3 7f 7f e1 13 f9 db 02 fd |x.._. Z.........| +peer1.org1.example.com | 00000030 2b 22 82 64 70 e0 12 5f 84 1e 87 64 24 1c bd e1 |+".dp.._...d$...| +peer1.org1.example.com | 00000040 cc 9e cd ae 87 26 |.....&| +peer1.org1.example.com | [41d 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [41f 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [420 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer1.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer1.org1.example.com | [421 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer1.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer1.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer1.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer1.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer1.org1.example.com | [422 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [423 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [424 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [425 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [426 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [427 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [428 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [429 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42b 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [42c 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16100A +peer1.org1.example.com | [42d 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4FC25E03504F17AF3762CB29AAA6FCF52B6E97D1435FECDF9224C0A5C79034F6 +orderer0.example.com | "2020-10-14 19:01:00.042 UTC [msp] Setup -> DEBU 57c Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:00.043 UTC [msp.identity] newIdentity -> DEBU 57d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.043 UTC [common.channelconfig] NewStandardValues -> DEBU 57e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:00.043 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57f Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:00.043 UTC [common.channelconfig] initializeProtosStruct -> DEBU 580 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 581 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] initializeProtosStruct -> DEBU 582 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 583 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] initializeProtosStruct -> DEBU 584 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] Validate -> DEBU 585 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] validateMSP -> DEBU 586 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [msp] newBccspMsp -> DEBU 587 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [msp] New -> DEBU 588 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [msp] Setup -> DEBU 589 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [msp.identity] newIdentity -> DEBU 58a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [common.channelconfig] NewStandardValues -> DEBU 58d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [common.channelconfig] Validate -> DEBU 58f Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [common.channelconfig] validateMSP -> DEBU 590 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [msp] newBccspMsp -> DEBU 591 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [msp] New -> DEBU 592 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [msp] Setup -> DEBU 593 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.045 UTC [msp.identity] newIdentity -> DEBU 594 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.046 UTC [msp] Setup -> DEBU 595 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:00.046 UTC [msp] Setup -> DEBU 596 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:00.046 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.046 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59e Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org2.example.com | [4d6 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4d2 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4d7 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 gate 1602702069208376800 evaluation starts +peer1.org2.example.com | [4d8 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4d9 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [4da 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4db 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 principal matched by identity 0 +peer1.org2.example.com | [4dc 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +peer1.org2.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.| +peer1.org2.example.com | [4dd 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +peer1.org2.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +peer1.org2.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +peer1.org2.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +peer1.org2.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...| +peer1.org2.example.com | [4de 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4df 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5440 gate 1602702069200818800 evaluation succeeds +peer1.org2.example.com | [4e0 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4e1 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4e2 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4e3 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e4 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e5 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4e6 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [4e7 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [4e8 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [4e9 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ea 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4eb 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ec 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ed 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ee 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ef 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f0 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f1 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f2 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f3 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f4 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f5 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f6 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f7 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4f8 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [4f9 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [4fa 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [4fb 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [4fc 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [4fd 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4fe 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [4ff 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [500 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [501 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [502 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [503 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [504 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [505 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [506 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 principal matched by identity 0 +peer1.org2.example.com | [507 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 ce 9d c7 43 65 26 31 8c ed 2d 2b c5 c9 a2 ea |....Ce&1..-+....| +peer1.org2.example.com | 00000010 d8 d5 14 56 b7 d5 2b 4b 04 b1 b6 18 42 a5 85 e9 |...V..+K....B...| +peer1.org2.example.com | [508 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad da c1 ae 86 08 bb be 74 6a fe |0E.!.........tj.| +peer1.org2.example.com | 00000010 1c fa bf 5b 27 de e4 a6 f9 46 42 bb ec bb 89 34 |...['....FB....4| +peer1.org2.example.com | 00000020 15 bb 74 fd af 02 20 50 68 a8 0c 3c 09 8e fc 67 |..t... Ph..<...g| +peer1.org2.example.com | 00000030 13 06 1d 2f 92 9b 65 9c e6 c6 56 2e dc 77 82 4e |.../..e...V..w.N| +peer1.org2.example.com | 00000040 06 92 b0 a2 aa 70 d3 |.....p.| +peer1.org2.example.com | [509 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [50a 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000330720 gate 1602702069208376800 evaluation succeeds +peer1.org2.example.com | [50b 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50c 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [50d 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [50e 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [50f 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [42e 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [42f 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [430 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [431 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [432 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [433 10-14 19:01:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [434 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [435 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [436 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [437 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [438 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [439 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c2 5e 03 50 4f 17 af 37 62 cb 29 aa a6 fc f5 |O.^.PO..7b.)....| +peer1.org1.example.com | 00000010 2b 6e 97 d1 43 5f ec df 92 24 c0 a5 c7 90 34 f6 |+n..C_...$....4.| +peer1.org1.example.com | [43a 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 d7 0e b6 36 90 5d cc 50 1d |0E.!......6.].P.| +peer1.org1.example.com | 00000010 92 d7 2d 10 f0 67 12 ae a4 15 28 3d 73 39 c6 e0 |..-..g....(=s9..| +peer1.org1.example.com | 00000020 87 2a a2 e3 2e 02 20 58 97 17 97 a7 09 0a 15 f2 |.*.... X........| +peer1.org1.example.com | 00000030 b0 22 c6 2f 75 ef 8c e1 bd b9 e0 33 5f c8 9c 05 |."./u......3_...| +peer1.org1.example.com | 00000040 9b 93 54 14 9d d7 02 |..T....| +peer1.org1.example.com | [43b 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [43c 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 98 4b ce b4 ff 7e d9 71 d0 39 d0 |0D. B.K...~.q.9.| +peer1.org1.example.com | 00000010 29 31 b9 e7 d0 10 dc 1d 5f 4a e2 bc ec 05 2b 19 |)1......_J....+.| +peer1.org1.example.com | 00000020 82 f4 5d 3f 02 20 04 9d 0c 55 df 9f 8e a5 c1 e4 |..]?. ...U......| +peer1.org1.example.com | 00000030 ab b3 81 28 70 da 81 d6 4d 21 a0 5e 6b 75 48 40 |...(p...M!.^kuH@| +peer1.org1.example.com | 00000040 37 1a 8d 6c 08 b4 |7..l..| +peer1.org1.example.com | [43d 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [43e 10-14 19:01:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [43f 10-14 19:01:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [440 10-14 19:01:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [441 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [442 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [443 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [444 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [445 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [446 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [447 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [448 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [449 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [44a 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [44b 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 74 2a 05 d3 c4 37 2c 09 f1 73 86 5c 39 32 3e |.t*...7,..s.\92>| +peer1.org1.example.com | 00000010 dc 16 0d ee 37 c3 a1 a6 be f8 3a 7d 54 0f c8 a5 |....7.....:}T...| +peer1.org1.example.com | [44c 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 2c c4 84 d1 7f b6 e5 d2 82 84 |0E.!..,.........| +peer1.org1.example.com | 00000010 4a 37 27 2c ec ab f5 33 18 f0 1a b7 81 64 f7 84 |J7',...3.....d..| +peer1.org1.example.com | 00000020 e7 cb 38 da e8 02 20 4a c0 b6 b8 03 13 8e 43 93 |..8... J......C.| +peer1.org1.example.com | 00000030 f7 dc 4c 1d c1 be 94 e5 c9 08 47 4e 80 e5 8a d1 |..L.......GN....| +peer1.org1.example.com | 00000040 5d a6 7d 23 e3 0b cd |].}#...| +peer1.org1.example.com | [44d 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [44e 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 8b bf 4f 88 1d 9a 5b 11 86 15 |0E.!....O...[...| +peer1.org1.example.com | 00000010 8e e2 06 b2 96 8f 46 dc 72 9d d7 b3 6d ca 87 df |......F.r...m...| +peer1.org1.example.com | 00000020 94 48 6b 78 63 02 20 12 cb 74 9d f3 cc 24 aa 65 |.Hkxc. ..t...$.e| +peer1.org1.example.com | 00000030 e8 35 a9 e2 f6 4b 66 98 7a 8d 6b 0c b5 c1 56 9f |.5...Kf.z.k...V.| +peer1.org1.example.com | 00000040 20 34 ff 3e 29 bc ff | 4.>)..| +peer1.org1.example.com | [44f 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [450 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [451 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [452 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [510 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer1.org2.example.com | [511 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [512 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [513 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [514 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [515 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [516 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [517 10-14 19:01:09.21 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [518 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [519 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [51a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [51b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [51c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [51d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [51e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [51f 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [520 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [521 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [522 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [523 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [524 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [525 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [3fc 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3fd 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3fe 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org2.example.com | [3ff 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [400 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [401 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [402 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 gate 1602702068807873300 evaluation starts +peer0.org2.example.com | [403 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [404 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [405 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [406 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [407 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [408 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [409 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [40a 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [40b 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 principal matched by identity 0 +peer0.org2.example.com | [40c 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +peer0.org2.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...| +peer0.org2.example.com | [40d 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +peer0.org2.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +peer0.org2.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +peer0.org2.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +peer0.org2.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...| +peer0.org2.example.com | [40e 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40f 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033168b0 gate 1602702068807873300 evaluation succeeds +peer0.org2.example.com | [410 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [411 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [412 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [413 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [414 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [415 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [416 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [417 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [418 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [419 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [41a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [41b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [41c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [41d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [41e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [453 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [454 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [455 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [456 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [457 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [458 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:)\274\377" > > alive:\231N-\367\330\354\0342e\332Z\225\252jp`\264\273\235H\n\002 $\327\365\274\021\221\022\007L\371Q-\266^\027\243\031r)\270C\366\207J\351Ck\223}\315\241\027" > > +peer1.org1.example.com | [459 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | [45a 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45b 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45c 10-14 19:01:07.31 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]] +peer1.org1.example.com | [45d 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [45e 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> INFO 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Becoming a leader +peer1.org1.example.com | [45f 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59f Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a1 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a2 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a3 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a4 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a5 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a6 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a7 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a8 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a9 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5aa Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ab Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ac Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ad Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cc Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cd Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5ce Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cf Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5d0 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d1 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d2 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d6 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d7 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d8 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d9 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.capabilities] Supported -> DEBU 5da Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:00.053 UTC [common.capabilities] Supported -> DEBU 5db Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:00.054 UTC [orderer.common.cluster] NewStream -> DEBU 5dc Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2020-10-14 19:01:00.054 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5dd Sending msg of 29303 bytes to 3 on channel testchainid took 169µs" +orderer0.example.com | "2020-10-14 19:01:00.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5de Send of SubmitRequest for channel testchainid with payload of size 29303 to orderer2.example.com(orderer2.example.com:7050) took 106.8µs " +orderer0.example.com | "2020-10-14 19:01:00.054 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5df [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39940" +orderer0.example.com | "2020-10-14 19:01:00.065 UTC [orderer.common.broadcast] Handle -> DEBU 5e0 Received EOF from 172.18.0.9:39940, hangup" +orderer0.example.com | "2020-10-14 19:01:00.066 UTC [common.deliver] deliverBlocks -> DEBU 5e1 Rejecting deliver for 172.18.0.9:39938 because channel businesschannel not found" +orderer0.example.com | "2020-10-14 19:01:00.066 UTC [orderer.common.server] func1 -> DEBU 5e2 Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:00.066 UTC [comm.grpc.server] 1 -> INFO 5e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39940 grpc.code=OK grpc.call_duration=102.2832ms +orderer0.example.com | "2020-10-14 19:01:00.066 UTC [orderer.common.server] func1 -> DEBU 5e4 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:00.066 UTC [comm.grpc.server] 1 -> INFO 5e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39938 grpc.code=OK grpc.call_duration=166.5639ms +orderer0.example.com | "2020-10-14 19:01:00.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5e6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 29513" +orderer0.example.com | "2020-10-14 19:01:00.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5e7 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2020-10-14 19:01:00.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +orderer0.example.com | "2020-10-14 19:01:00.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5e9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:00.085 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ea Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2020-10-14 19:01:00.086 UTC [common.channelconfig] NewStandardValues -> DEBU 5eb Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:00.086 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ec Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.087 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.090 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ee Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.092 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ef Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:00.092 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f0 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.092 UTC [common.channelconfig] NewStandardValues -> DEBU 5f1 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:00.093 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f2 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:00.093 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f3 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f4 Processing field: BatchTimeout" +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [526 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [527 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [528 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [529 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [52a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [52b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [52c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [52d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [52e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [52f 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [530 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [531 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [532 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [533 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [534 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [535 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [536 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [537 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [538 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [539 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [53a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [53b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [53c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [53d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [53e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [53f 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [460 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org1.example.com | [461 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [462 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [463 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [464 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610021801 +peer1.org1.example.com | [465 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org1.example.com | [466 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B4D8FB1A3896BE282B60C88632B03A71B4BAEBCFE6E63B0D99C4D4851ED931A +peer1.org1.example.com | [467 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [468 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [469 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [46a 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer1.org1.example.com | [46b 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [46c 10-14 19:01:08.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002815090, CONNECTING +peer1.org1.example.com | [46d 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002815090, READY +peer1.org1.example.com | [46e 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer1.org1.example.com | [46f 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer1.org1.example.com | [470 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer1.org1.example.com | [471 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org1.example.com | [472 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer1.org1.example.com | [473 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [474 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [475 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608F4959DFC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org1.example.com | [476 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F3EAA4DCEE183F12ED39AA0E5FA837390CCD43F448D54943FC3285F24B051E90 +peer1.org1.example.com | [477 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [478 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [479 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [47b 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [47c 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [47d 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [47e 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [47f 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [480 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [47a 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [481 10-14 19:01:08.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer1.org1.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer1.org1.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer1.org1.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [482 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c9b0 gate 1602702068390649300 evaluation starts +peer1.org1.example.com | [483 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c9b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [484 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c9b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [485 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [486 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [487 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [488 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c9b0 principal matched by identity 0 +peer1.org1.example.com | [489 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff cb e9 0a dc dd 93 4b 3a c6 d4 40 fe b8 22 cb |.......K:..@..".| +peer1.org1.example.com | 00000010 cc 9a ca 35 fb e8 e7 51 b6 74 3d 19 c8 72 98 71 |...5...Q.t=..r.q| +orderer0.example.com | "2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f6 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:00.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f7 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.095 UTC [common.channelconfig] NewStandardValues -> DEBU 5f8 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f9 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:00.098 UTC [common.channelconfig] NewStandardValues -> DEBU 5fa Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fb Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.100 UTC [common.channelconfig] validateMSP -> DEBU 5fc Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.101 UTC [msp] newBccspMsp -> DEBU 5fd Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.101 UTC [msp] New -> DEBU 5fe Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.101 UTC [msp] Setup -> DEBU 5ff Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:00.102 UTC [msp.identity] newIdentity -> DEBU 600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.104 UTC [common.channelconfig] NewStandardValues -> DEBU 601 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:00.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 605 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:00.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 602 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2020-10-14 19:01:00.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 603 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:00.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 604 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676.3µs " +orderer0.example.com | "2020-10-14 19:01:00.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 606 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.119 UTC [common.channelconfig] NewStandardValues -> DEBU 607 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 608 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.119 UTC [common.channelconfig] NewStandardValues -> DEBU 609 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60a Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.119 UTC [common.channelconfig] Validate -> DEBU 60b Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:00.120 UTC [common.channelconfig] validateMSP -> DEBU 60c Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.120 UTC [msp] newBccspMsp -> DEBU 60d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.120 UTC [msp] New -> DEBU 60e Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.120 UTC [msp] Setup -> DEBU 60f Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.121 UTC [msp.identity] newIdentity -> DEBU 610 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.124 UTC [common.channelconfig] NewStandardValues -> DEBU 611 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:00.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 612 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:00.125 UTC [orderer.common.server] Deliver -> DEBU 613 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:00.125 UTC [common.deliver] Handle -> DEBU 614 Starting new deliver loop for 172.18.0.9:39942" +orderer0.example.com | "2020-10-14 19:01:00.126 UTC [common.deliver] Handle -> DEBU 615 Attempting to read seek info message from 172.18.0.9:39942" +orderer0.example.com | "2020-10-14 19:01:00.125 UTC [common.channelconfig] NewStandardValues -> DEBU 616 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:00.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 617 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:00.132 UTC [common.channelconfig] Validate -> DEBU 618 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-10-14 19:01:00.136 UTC [common.channelconfig] validateMSP -> DEBU 619 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.137 UTC [msp] newBccspMsp -> DEBU 61a Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.138 UTC [msp] New -> DEBU 61b Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:00.138 UTC [msp] Setup -> DEBU 61c Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.139 UTC [msp.identity] newIdentity -> DEBU 61d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:00.141 UTC [msp] Setup -> DEBU 61e Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:00.141 UTC [msp] Setup -> DEBU 61f MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:00.141 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [41f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [420 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [421 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [422 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [423 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [424 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [425 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [426 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [427 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [428 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [429 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [42a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [42b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [42c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [42d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [42e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [42f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [430 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [431 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [432 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [433 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [434 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [435 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [436 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [437 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [438 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [439 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [43a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [43b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [43c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [43d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [43e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [43f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [440 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org2.example.com | [441 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [442 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [443 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [444 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [445 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [446 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [447 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [448 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [449 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [44a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [44b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [44c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [44d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [44e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [540 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [541 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [542 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [543 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [544 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [545 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [546 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [547 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [548 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [549 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [54a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [54b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [54c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [54d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [54e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [54f 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [550 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [551 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [552 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [553 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [554 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [555 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [556 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [557 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [558 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [559 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [55a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [55b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [55c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [55d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [55e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [55f 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [560 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [561 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [562 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [563 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [564 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [565 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [566 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [567 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [568 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [569 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [56a 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [56b 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [56c 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [56d 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [56e 10-14 19:01:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [56f 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [570 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [571 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [572 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [573 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [574 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [44f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [450 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [451 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [452 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [453 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [454 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [455 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [456 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [457 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [458 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [459 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [45a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [45b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [45c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [45d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [45e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [45f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [460 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [461 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [462 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [463 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [464 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [465 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [466 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [467 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [468 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [469 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [46a 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [46b 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [46c 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [46d 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [46e 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [46f 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [470 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [471 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [472 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [473 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [474 10-14 19:01:08.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [475 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [476 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [477 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [478 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [479 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [47a 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [47b 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [47c 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [47d 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [47e 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [47f 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [480 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [481 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [482 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [483 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [484 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:01:00.142 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.142 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 624 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 625 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 626 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 627 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 628 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 629 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62b Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62c Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62d Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 62e Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 62f Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 630 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 631 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 632 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 633 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | [3c4 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 principal matched by identity 0 +peer0.org1.example.com | [3c5 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 8b 73 48 06 86 d3 f8 71 51 0d ae ae 8d 52 5e |..sH....qQ....R^| +peer0.org1.example.com | 00000010 47 8d 69 0d 50 98 6e 18 6a 04 0b b2 0d 67 93 a7 |G.i.P.n.j....g..| +peer0.org1.example.com | [3c6 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 51 f4 47 1a ca 79 ff d2 b2 5c |0E.!..Q.G..y...\| +peer0.org1.example.com | 00000010 3e 96 ca 9b 68 4f 95 f8 0a 5d ea 7c 19 19 ad 3c |>...hO...].|...<| +peer0.org1.example.com | 00000020 b7 6c 68 e3 dc 02 20 58 f8 c0 75 fa b8 ce c4 12 |.lh... X..u.....| +peer0.org1.example.com | 00000030 3d 7f d2 8c 0c d0 d7 77 ee 34 01 1d df 40 76 64 |=......w.4...@vd| +peer0.org1.example.com | 00000040 a2 d9 89 9b 29 d5 9b |....)..| +peer0.org1.example.com | [3c7 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c8 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 gate 1602702064330066700 evaluation succeeds +peer0.org1.example.com | [3c9 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ca 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3cb 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3cc 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3cd 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [3ad0fce8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3ce 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [3ad0fce8] notifying Txid:3ad0fce8e380797bc4744f1ef3a30915f025925a7694ea92334f7c11e956910e, channelID: +peer0.org1.example.com | [3cf 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3d0 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> INFO [][3ad0fce8] Exit chaincode: name:"qscc" (8ms) +peer0.org1.example.com | [3d1 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] Exit +peer0.org1.example.com | [3d2 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41682 +peer0.org1.example.com | [3d3 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41682 grpc.code=OK grpc.call_duration=12.0289ms +peer0.org1.example.com | [3d4 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41682: read: connection reset by peer +peer0.org1.example.com | [3d5 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3d6 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3d7 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d8 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3d9 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3da 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 56 8e 24 d1 48 8a 58 40 ad 5f 1e 75 73 06 1f |.V.$.H.X@._.us..| +peer0.org1.example.com | 00000010 4a ab 81 b2 c0 13 8b 35 c6 3d 74 d7 3e 6d c7 69 |J......5.=t.>m.i| +peer0.org1.example.com | [3db 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 ca db be 91 c0 b5 c4 6e b5 39 04 |0D. ........n.9.| +peer0.org1.example.com | 00000010 0c c3 d2 12 d5 83 4a ba c4 1d 4a 32 cd cd d9 dc |......J...J2....| +peer0.org1.example.com | 00000020 7f 3b 9d 2b 02 20 1d ea 4b 0b 02 8b 04 bd 5e e0 |.;.+. ..K.....^.| +peer0.org1.example.com | 00000030 ee 37 82 ac b4 8e 3a 0f 75 8e 33 fd 82 dd 60 5a |.7....:.u.3...`Z| +peer0.org1.example.com | 00000040 5d 2b 13 ce 3f 9e |]+..?.| +peer0.org1.example.com | [3dc 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3dd 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 02 52 08 fe c0 b0 66 ba ae 3e 99 |0D. ..R....f..>.| +peer0.org1.example.com | 00000010 4e 2d f7 d8 ec 1c 32 65 da 5a 95 aa 6a 70 60 b4 |N-....2e.Z..jp`.| +peer0.org1.example.com | 00000020 bb 9d 48 0a 02 20 24 d7 f5 bc 11 91 12 07 4c f9 |..H.. $.......L.| +peer0.org1.example.com | 00000030 51 2d b6 5e 17 a3 19 72 29 b8 43 f6 87 4a e9 43 |Q-.^...r).C..J.C| +peer0.org1.example.com | 00000040 6b 93 7d cd a1 17 |k.}...| +peer0.org1.example.com | [3de 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [485 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [486 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [487 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [488 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [489 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [48a 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [48b 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [48c 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [48d 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [48e 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [48f 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [490 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [491 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [492 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [493 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [494 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [495 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [496 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [497 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [498 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [499 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [49a 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [49b 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [49c 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [49d 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [49e 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [49f 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4a0 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4a1 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [4a2 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [4a3 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [4a4 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [4a5 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [4a6 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [4a7 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [4a8 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4a9 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4aa 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [4ab 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [4ac 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [4ad 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [4ae 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [4af 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [4b0 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [4b1 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [4b2 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [4b3 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [4b4 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [4b5 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [4b6 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [4b7 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [4b8 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [4b9 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [4ba 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bb 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [4bc 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [4bd 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4be 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4bf 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4c0 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4c1 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [4c2 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [4c3 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [4c4 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [4c5 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [4c6 10-14 19:01:08.82 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003d3b10, CONNECTING +peer0.org2.example.com | [4c7 10-14 19:01:08.83 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003d3b10, READY +peer0.org2.example.com | [4c8 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4c9 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4ca 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4cb 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [49f 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [4a0 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [4a1 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4a2 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [4a3 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [4a4 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [4a5 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [4a6 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [4a7 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +peer1.org1.example.com | 00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..| +peer1.org1.example.com | [4a8 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +peer1.org1.example.com | 00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +peer1.org1.example.com | 00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +peer1.org1.example.com | 00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +peer1.org1.example.com | 00000040 69 60 4d b6 27 ea |i`M.'.| +peer1.org1.example.com | [4a9 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 634 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 635 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 636 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 652 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 657 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 658 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 659 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65b Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65c Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65d Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:00.152 UTC [common.configtx] addToMap -> DEBU 65e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:00.153 UTC [common.configtx] addToMap -> DEBU 65f Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:00.153 UTC [common.configtx] addToMap -> DEBU 660 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:00.154 UTC [common.configtx] addToMap -> DEBU 661 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:00.154 UTC [common.configtx] addToMap -> DEBU 662 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:00.154 UTC [common.channelconfig] LogSanityChecks -> DEBU 663 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:01:00.155 UTC [common.channelconfig] LogSanityChecks -> DEBU 664 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:01:00.155 UTC [policies] Manager -> DEBU 665 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:00.156 UTC [policies] Manager -> DEBU 666 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.157 UTC [policies] Manager -> DEBU 667 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.157 UTC [policies] Manager -> DEBU 668 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 669 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 66a Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66b As expected, current configuration has policy '/Channel/Application/Readers'" +peer1.org1.example.com | [4aa 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00284f500, header channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer1.org1.example.com | [4ab 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [4ac 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [4ad 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [4ae 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4af 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4b0 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4b1 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4b2 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4b3 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [4b4 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [4b5 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4b6 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4b7 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4b8 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4b9 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4ba 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4bb 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4bc 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org1.example.com | [4bd 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [4be 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [4bf 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [4c0 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [4c1 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4c2 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4c3 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org1.example.com | [4c4 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4c5 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4c6 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org1.example.com | [4c7 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [4c8 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 gate 1602702068405016400 evaluation starts +peer1.org1.example.com | [4ca 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4cb 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4cc 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [4cd 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [4ce 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [4cf 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4d0 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [4d1 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4d2 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 principal matched by identity 0 +peer1.org1.example.com | [4c9 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [4d3 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +peer1.org1.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...| +peer1.org1.example.com | [4d5 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +peer1.org1.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +peer1.org1.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +peer1.org1.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +peer1.org1.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...| +peer1.org1.example.com | [4d6 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4d7 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cdb30 gate 1602702068405016400 evaluation succeeds +peer1.org1.example.com | [4d8 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4d9 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4da 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4db 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4dc 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d4 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer1.org1.example.com | [4dd 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4de 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e0 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e1 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e2 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e3 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [4e4 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [4e5 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [4e6 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e7 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e8 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4df 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4e9 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4eb 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ec 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ed 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ee 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ef 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f0 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f1 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f2 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f3 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [4ea 10-14 19:01:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4f4 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [4f6 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [4f7 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [4f8 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [4f9 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [4fa 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [4fb 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [4fc 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [4fd 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [4f5 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [4ff 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [500 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [501 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 gate 1602702068412658000 evaluation starts +peer1.org1.example.com | [502 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [503 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [504 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 principal matched by identity 0 +peer1.org1.example.com | [505 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 f9 c1 20 15 cf df 55 6d 9b a0 06 f0 99 6b 98 |x.. ...Um.....k.| +peer1.org1.example.com | 00000010 b6 83 2e 5e 9e 97 be fe 6e 72 f7 f6 67 73 da 4e |...^....nr..gs.N| +peer1.org1.example.com | [506 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb d0 f8 7c 65 7e 6d ba 5f 50 a4 |0E.!....|e~m._P.| +peer1.org1.example.com | 00000010 ec 57 38 53 da de 25 9c b6 3d 35 53 5d 6e 35 5f |.W8S..%..=5S]n5_| +peer1.org1.example.com | 00000020 88 fa ad 23 85 02 20 36 31 a6 08 99 74 aa 1f f1 |...#.. 61...t...| +peer1.org1.example.com | 00000030 15 e0 c7 e6 aa 19 d4 db 07 58 1a 05 88 1b f9 96 |.........X......| +peer1.org1.example.com | 00000040 d9 ad 45 4e 69 e5 27 |..ENi.'| +peer1.org1.example.com | [507 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [508 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8230 gate 1602702068412658000 evaluation succeeds +peer1.org1.example.com | [509 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [50a 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [50b 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [50c 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [50d 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org1.example.com | [50e 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org1.example.com | [50f 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [510 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +peer1.org1.example.com | [511 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [512 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org1.example.com | [4fe 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [513 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [514 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [515 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [516 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [4cc 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer0.org2.example.com | [4cd 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ce 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4cf 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4d2 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4d3 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d4 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4d5 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4d6 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4d7 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4d8 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 gate 1602702068857131300 evaluation starts +peer0.org2.example.com | [4d9 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4da 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4db 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 principal matched by identity 0 +peer0.org2.example.com | [4dc 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [4dd 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 d8 c4 33 6f ac ee fa 70 73 56 b8 |0D. e..3o...psV.| +peer0.org2.example.com | 00000010 dc a7 47 35 1f 35 76 5e ee a1 0c 88 77 b9 36 5a |..G5.5v^....w.6Z| +peer0.org2.example.com | 00000020 b6 73 ff 88 02 20 52 06 52 31 9f 20 27 18 97 57 |.s... R.R1. '..W| +peer0.org2.example.com | 00000030 e9 0c 92 55 81 c8 2f 0b 37 88 7c c2 df 5d 2f 0f |...U../.7.|..]/.| +peer0.org2.example.com | 00000040 4c fa 4c e2 a0 6f |L.L..o| +peer0.org2.example.com | [4de 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4e0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024c3840 gate 1602702068857131300 evaluation succeeds +peer0.org2.example.com | [4e2 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e4 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:59180 disconnected +peer0.org2.example.com | [4e5 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:59180 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=155.8972ms +peer0.org2.example.com | [4e6 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4e8 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4e9 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4ea 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [4eb 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ec 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4ed 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161007 +peer0.org2.example.com | [4ee 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B2D57E8678CD4BEB80D568109299096593F15E1EAF40AB24C1422652A32BB0F9 +peer0.org2.example.com | [4ef 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4f0 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4f1 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4f2 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f3 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4f4 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [4f5 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4e3 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [4e1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4e7 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [4f6 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4df 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [4f7 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [4f8 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [4f9 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [4fa 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [4fb 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [4fc 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [4fd 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [4fe 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025d4900, CONNECTING +peer0.org2.example.com | [4ff 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [500 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025d4900, READY +peer0.org2.example.com | [501 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00300ff40 env 0xc0032227d0 txn 0 +peer0.org2.example.com | [502 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [503 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 110ms +peer0.org2.example.com | [504 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [505 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [506 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [507 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org2.example.com | [508 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [509 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [50a 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [50b 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org2.example.com | [50c 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [50d 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [50e 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [50f 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [510 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [511 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [512 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [517 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [518 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [519 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [51a 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [51b 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [51c 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [51d 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [51e 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [51f 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [520 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [522 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [523 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [524 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [525 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [521 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [527 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [528 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes +peer1.org1.example.com | [529 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes +peer1.org1.example.com | [52a 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [52b 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [526 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [52c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [52d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [52e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [52f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [530 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [575 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [576 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [577 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [578 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [579 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [57a 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [57b 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [57c 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [57d 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [57e 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [57f 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [580 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [581 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [582 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [583 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [584 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [585 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [586 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [587 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [588 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [589 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [58a 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [58b 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [58c 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [58d 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [58e 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [58f 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [590 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [591 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [592 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [593 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [594 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [595 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [596 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [597 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [598 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [599 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [59a 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [59b 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [59c 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [59d 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [59e 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [59f 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00262d2e0, CONNECTING +peer1.org2.example.com | [5a0 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00262d2e0, READY +peer1.org2.example.com | [5a1 10-14 19:01:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5a2 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [5a3 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5a4 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [5a5 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [5a6 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [5a7 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [5a8 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5aa 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [5ab 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org2.example.com | [5ac 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5ad 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5ae 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [3df 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3e0 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3e1 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3e2 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3e3 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e5 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e6 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e7 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161009 +peer0.org1.example.com | [3e8 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B9CE9DC7436526318CED2D2BC5C9A2EAD8D51456B7D52B4B04B1B61842A585E9 +peer0.org1.example.com | [3e9 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ea 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3eb 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3ec 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3ed 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3ee 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3ef 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f0 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3f1 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f2 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f4 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f3 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f6 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f7 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f8 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f5 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3f9 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [3fa 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [3fb 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fc 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [3fd 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E80CA59D4B5D2E53BC03E275B038F2E83D346351F41D5ACAFD982B571F37FAD +peer0.org1.example.com | [3fe 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3ff 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [400 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [401 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [402 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [403 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [404 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [405 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [406 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [407 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [408 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb fc 80 42 35 24 a9 74 28 e9 78 |0E.!....B5$.t(.x| +peer0.org1.example.com | 00000010 7c f8 85 70 64 44 10 e1 ab 13 af fb 36 de 4d b1 ||..pdD......6.M.| +peer0.org1.example.com | 00000020 5c bd ec ac f7 02 20 0d c7 77 59 7c 21 39 23 26 |\..... ..wY|!9#&| +peer0.org1.example.com | 00000030 c3 3d 1a 03 f5 48 69 fa 96 75 8c 4a 53 76 4f 65 |.=...Hi..u.JSvOe| +peer0.org1.example.com | 00000040 83 37 4e 7e 88 2f fc |.7N~./.| +peer0.org1.example.com | [409 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40a 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40b 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [40c 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [40d 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [40f 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [410 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [411 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [412 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c2 5e 03 50 4f 17 af 37 62 cb 29 aa a6 fc f5 |O.^.PO..7b.)....| +peer0.org1.example.com | 00000010 2b 6e 97 d1 43 5f ec df 92 24 c0 a5 c7 90 34 f6 |+n..C_...$....4.| +peer0.org1.example.com | [413 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 d7 0e b6 36 90 5d cc 50 1d |0E.!......6.].P.| +peer0.org1.example.com | 00000010 92 d7 2d 10 f0 67 12 ae a4 15 28 3d 73 39 c6 e0 |..-..g....(=s9..| +peer0.org1.example.com | 00000020 87 2a a2 e3 2e 02 20 58 97 17 97 a7 09 0a 15 f2 |.*.... X........| +peer0.org1.example.com | 00000030 b0 22 c6 2f 75 ef 8c e1 bd b9 e0 33 5f c8 9c 05 |."./u......3_...| +peer0.org1.example.com | 00000040 9b 93 54 14 9d d7 02 |..T....| +peer0.org1.example.com | [414 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [415 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 98 4b ce b4 ff 7e d9 71 d0 39 d0 |0D. B.K...~.q.9.| +peer0.org1.example.com | 00000010 29 31 b9 e7 d0 10 dc 1d 5f 4a e2 bc ec 05 2b 19 |)1......_J....+.| +peer0.org1.example.com | 00000020 82 f4 5d 3f 02 20 04 9d 0c 55 df 9f 8e a5 c1 e4 |..]?. ...U......| +peer0.org1.example.com | 00000030 ab b3 81 28 70 da 81 d6 4d 21 a0 5e 6b 75 48 40 |...(p...M!.^kuH@| +peer0.org1.example.com | 00000040 37 1a 8d 6c 08 b4 |7..l..| +peer0.org1.example.com | [416 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [417 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [418 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [5af 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5b0 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [5b1 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [5b2 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [5b3 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [5b4 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 49 06 65 46 9c 8e 50 e2 2a 84 |0E.!..I.eF..P.*.| +peer1.org2.example.com | 00000010 20 39 d0 3c 3f e3 7c dd 98 15 f3 73 19 de 15 9d | 9. DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [5b6 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5b7 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16100B +peer1.org2.example.com | [5b8 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6182D4D00AFDE5DB4E2F73CFEC63DD5CF9DB2B7478F49373B96FB931A327E298 +peer1.org2.example.com | [5b9 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5ba 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [5bb 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [5a9 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [531 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [532 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [533 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [534 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [535 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [536 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [537 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [538 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [539 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [53a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [53b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [53c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [53d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [53e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [53f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [540 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [541 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [542 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [543 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [544 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [545 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [546 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [547 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [548 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [549 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [54a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [54b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [54c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [54d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [54e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [54f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [550 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [551 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [552 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [419 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [41a 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [41b 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41e 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [41f 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [420 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org1.example.com | [421 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer0.org1.example.com | [422 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [423 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [424 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [425 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [426 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [427 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [428 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [429 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42a 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [42b 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16100A +peer0.org1.example.com | [42c 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE742A05D3C4372C09F173865C39323EDC160DEE37C3A1A6BEF83A7D540FC8A5 +peer0.org1.example.com | [42d 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [42e 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [42f 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [430 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [431 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [432 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [433 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66c As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66d As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 66e Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 66f Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 670 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 671 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:01:00.160 UTC [policies] Manager -> DEBU 672 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 673 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 674 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 675 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [common.channelconfig] LogSanityChecks -> DEBU 676 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [common.capabilities] Supported -> DEBU 677 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [common.capabilities] Supported -> DEBU 678 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [fsblkstorage] newBlockfileMgr -> DEBU 679 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [kvledger.util] CreateDirIfMissing -> DEBU 67a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2020-10-14 19:01:00.161 UTC [kvledger.util] logDirStatus -> DEBU 67b Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2020-10-14 19:01:00.162 UTC [kvledger.util] logDirStatus -> DEBU 67c After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2020-10-14 19:01:00.162 UTC [fsblkstorage] newBlockfileMgr -> INFO 67d Getting block information from block storage" +orderer0.example.com | "2020-10-14 19:01:00.162 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67e Retrieving checkpoint info from block files" +orderer0.example.com | "2020-10-14 19:01:00.162 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67f retrieveLastFileSuffix()" +orderer0.example.com | "2020-10-14 19:01:00.162 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 680 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2020-10-14 19:01:00.163 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 681 Last file number found = -1" +orderer0.example.com | "2020-10-14 19:01:00.163 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 682 No block file found" +orderer0.example.com | "2020-10-14 19:01:00.163 UTC [fsblkstorage] newBlockfileMgr -> DEBU 683 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000d68940)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2020-10-14 19:01:00.166 UTC [fsblkstorage] newBlockIndex -> DEBU 684 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2020-10-14 19:01:00.166 UTC [orderer.common.server] func1 -> DEBU 685 Executing callback to update root CAs" +orderer0.example.com | "2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 686 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 687 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 688 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 689 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-10-14 19:01:00.170 UTC [fsblkstorage] indexBlock -> DEBU 68a Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +orderer0.example.com | txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:00.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 68b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28474], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2020-10-14 19:01:00.175 UTC [fsblkstorage] Next -> DEBU 68c Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:01:00.175 UTC [fsblkstorage] newBlockfileStream -> DEBU 68d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:01:00.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68e Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:01:00.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68f Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:01:00.177 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 690 blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-10-14 19:01:00.177 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 691 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 692 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 693 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 694 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.184 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 695 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.185 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 696 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.185 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 697 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.185 UTC [fsblkstorage] Next -> DEBU 698 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:01:00.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 699 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69a Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69b Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org1.example.com | [553 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [554 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [555 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [556 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [557 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [558 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [559 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [55a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [55b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [55c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [55d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [55e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [55f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [560 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [561 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [562 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [563 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [564 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [565 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [566 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [567 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [568 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [569 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [56a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [56b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [56c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [56d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [5bc 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:117636673158108147 tag:EMPTY mem_req:\331\312\376\345\304 J7\357\332\301" > > > , Envelope: 281 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [5be 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [5bd 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5bf 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [5c0 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:117636673158108147 tag:EMPTY mem_req:\331\312\376\345\304 J7\357\332\301" > > > , Envelope: 281 bytes, Signature: 0 bytes +peer1.org2.example.com | [5c1 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5c3 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002681d60, CONNECTING +peer1.org2.example.com | [5c2 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [5c4 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [5c5 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5c6 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [5c7 10-14 19:01:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5c8 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002834e30, CONNECTING +peer1.org2.example.com | [5c9 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002681d60, READY +peer1.org2.example.com | [5ca 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5cb 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [5cd 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [5ce 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [5cc 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [5cf 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [5d0 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [5d1 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org2.example.com | [5d2 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5d3 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69c blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 69d [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [orderer.commmon.multichannel] newChain -> INFO 69e Created and starting new chain businesschannel" +orderer0.example.com | "2020-10-14 19:01:00.186 UTC [orderer.consensus.etcdraft] Start -> INFO 69f Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.187 UTC [orderer.common.cluster] Configure -> INFO 6a0 Entering, channel: businesschannel, nodes: [ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:00.187 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a1 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2020-10-14 19:01:00.188 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a2 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-10-14 19:01:00.189 UTC [orderer.common.cluster] func1 -> DEBU 6a3 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-10-14 19:01:00.189 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a4 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +peer0.org1.example.com | [434 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [435 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [436 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [437 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 74 2a 05 d3 c4 37 2c 09 f1 73 86 5c 39 32 3e |.t*...7,..s.\92>| +peer0.org1.example.com | 00000010 dc 16 0d ee 37 c3 a1 a6 be f8 3a 7d 54 0f c8 a5 |....7.....:}T...| +peer0.org1.example.com | [438 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 2c c4 84 d1 7f b6 e5 d2 82 84 |0E.!..,.........| +peer0.org1.example.com | 00000010 4a 37 27 2c ec ab f5 33 18 f0 1a b7 81 64 f7 84 |J7',...3.....d..| +peer0.org1.example.com | 00000020 e7 cb 38 da e8 02 20 4a c0 b6 b8 03 13 8e 43 93 |..8... J......C.| +peer0.org1.example.com | 00000030 f7 dc 4c 1d c1 be 94 e5 c9 08 47 4e 80 e5 8a d1 |..L.......GN....| +peer0.org1.example.com | 00000040 5d a6 7d 23 e3 0b cd |].}#...| +peer0.org1.example.com | [439 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [43a 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 8b bf 4f 88 1d 9a 5b 11 86 15 |0E.!....O...[...| +peer0.org1.example.com | 00000010 8e e2 06 b2 96 8f 46 dc 72 9d d7 b3 6d ca 87 df |......F.r...m...| +peer0.org1.example.com | 00000020 94 48 6b 78 63 02 20 12 cb 74 9d f3 cc 24 aa 65 |.Hkxc. ..t...$.e| +peer0.org1.example.com | 00000030 e8 35 a9 e2 f6 4b 66 98 7a 8d 6b 0c b5 c1 56 9f |.5...Kf.z.k...V.| +peer0.org1.example.com | 00000040 20 34 ff 3e 29 bc ff | 4.>)..| +peer0.org1.example.com | [43b 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [43c 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [43d 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43e 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43f 10-14 19:01:06.95 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +peer0.org1.example.com | [440 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [441 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4d 8f b1 a3 89 6b e2 82 b6 0c 88 63 2b 03 a7 |;M....k.....c+..| +peer0.org1.example.com | 00000010 1b 4b ae bc fe 6e 63 b0 d9 9c 4d 48 51 ed 93 1a |.K...nc...MHQ...| +peer0.org1.example.com | [442 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 77 28 d9 83 99 fc 0a 36 40 23 |0E.!..w(.....6@#| +peer0.org1.example.com | 00000010 66 00 6a 42 e7 03 30 92 cb 15 a0 43 cf 9b ab 43 |f.jB..0....C...C| +peer0.org1.example.com | 00000020 09 aa cd b6 43 02 20 12 60 06 35 64 41 b6 9e 84 |....C. .`.5dA...| +peer0.org1.example.com | 00000030 a5 c0 44 a2 c0 df 54 5f 14 aa ab 57 06 62 6d 4f |..D...T_...W.bmO| +peer0.org1.example.com | 00000040 c0 58 e3 0b 67 01 ad |.X..g..| +peer0.org1.example.com | [443 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [445 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [446 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [447 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Some peer is already a leader +peer0.org1.example.com | [448 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [449 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [44a 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [44b 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes +peer0.org1.example.com | [44c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [44f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [450 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [451 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [452 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer0.org1.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer0.org1.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org1.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [56e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [56f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [570 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [571 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [572 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [573 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [574 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [575 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [576 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [577 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [578 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [579 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [57a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [57b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [57c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [57d 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [57e 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [57f 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [580 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [581 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [582 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [583 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [584 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [585 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [586 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [587 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [588 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [589 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [58a 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [58b 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [58c 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [58d 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [58e 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [58f 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [590 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [591 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [592 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [593 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [594 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [595 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [596 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [597 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [598 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [599 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [59a 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [59b 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [59c 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [59d 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [59e 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [59f 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [5a0 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [5a1 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 gate 1602702068453387300 evaluation starts +peer1.org1.example.com | [5a2 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [5a3 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [5a4 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 principal matched by identity 0 +peer1.org1.example.com | [5a5 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [5a6 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +peer1.org1.example.com | 00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +peer1.org1.example.com | 00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +peer1.org1.example.com | 00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +peer1.org1.example.com | 00000040 05 90 52 6c a0 f6 |..Rl..| +peer0.org1.example.com | [453 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 gate 1602702068421362100 evaluation starts +peer0.org1.example.com | [454 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [455 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [456 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [457 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [458 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [459 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 principal matched by identity 0 +peer0.org1.example.com | [45a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff cb e9 0a dc dd 93 4b 3a c6 d4 40 fe b8 22 cb |.......K:..@..".| +peer0.org1.example.com | 00000010 cc 9a ca 35 fb e8 e7 51 b6 74 3d 19 c8 72 98 71 |...5...Q.t=..r.q| +peer0.org1.example.com | [45b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 09 11 d5 2a 27 eb 58 ea 8d dd af |0D. ....*'.X....| +peer0.org1.example.com | 00000010 cb f5 4b 6d a8 69 80 dd ae 0a bc 98 b8 e4 6a d0 |..Km.i........j.| +peer0.org1.example.com | 00000020 b4 1c 06 30 02 20 4c 8d 36 00 c8 70 00 d6 7e 55 |...0. L.6..p..~U| +peer0.org1.example.com | 00000030 5b 01 0a c8 f3 03 b6 26 b9 34 f3 61 fb b1 37 96 |[......&.4.a..7.| +peer0.org1.example.com | 00000040 de 4a 4a 2d c9 e7 |.JJ-..| +peer0.org1.example.com | [45c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 gate 1602702068421362100 evaluation succeeds +peer0.org1.example.com | [45e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [45f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [460 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [461 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [462 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [463 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org1.example.com | [464 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [465 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [466 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [467 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org1.example.com | [468 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org1.example.com | [469 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org1.example.com | [46a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org1.example.com | [46b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org1.example.com | [46c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [46d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0032e6580 env 0xc0031f7e00 txn 0 +peer0.org1.example.com | [46e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031f7e00 +peer0.org1.example.com | [46f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer0.org1.example.com | [470 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [471 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [472 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [473 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [474 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [475 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [476 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [477 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [478 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [479 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +peer0.org1.example.com | 00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..| +peer0.org1.example.com | [47a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +peer0.org1.example.com | 00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +peer0.org1.example.com | 00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +peer0.org1.example.com | 00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +peer0.org1.example.com | 00000040 69 60 4d b6 27 ea |i`M.'.| +peer0.org1.example.com | [47b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [47c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0033ab500, header channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +peer0.org1.example.com | [47d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [47e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [47f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [480 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [481 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [482 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [483 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [484 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [485 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [486 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [487 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [488 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [489 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [48a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [48b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [48d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [48e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [48f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [490 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [491 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [492 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [493 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [494 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [495 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | [496 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [497 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [498 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org1.example.com | [499 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [49a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 gate 1602702068430926900 evaluation starts +peer0.org1.example.com | [49b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [49d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [49e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [49f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4a0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4a1 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [4a2 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4a3 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 principal matched by identity 0 +peer0.org1.example.com | [4a4 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +peer0.org1.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...| +peer0.org1.example.com | [4a5 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +peer0.org1.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +peer0.org1.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +peer0.org1.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +peer0.org1.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...| +peer0.org1.example.com | [4a6 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a7 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 gate 1602702068430926900 evaluation succeeds +peer0.org1.example.com | [4a8 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4a9 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4aa 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [4ab 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ac 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ad 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ae 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4af 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b1 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b2 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [4b3 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [4b4 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [4b5 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b6 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b7 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b8 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4b9 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ba 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bb 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bc 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bd 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4be 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bf 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c1 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [4c6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [4c8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 gate 1602702068442446700 evaluation starts +peer0.org1.example.com | [4c9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ca 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4cb 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 principal matched by identity 0 +peer0.org1.example.com | [4cc 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 f9 c1 20 15 cf df 55 6d 9b a0 06 f0 99 6b 98 |x.. ...Um.....k.| +peer0.org1.example.com | 00000010 b6 83 2e 5e 9e 97 be fe 6e 72 f7 f6 67 73 da 4e |...^....nr..gs.N| +peer0.org1.example.com | [4cd 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb d0 f8 7c 65 7e 6d ba 5f 50 a4 |0E.!....|e~m._P.| +orderer0.example.com | "2020-10-14 19:01:00.189 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a5 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> DEBU 6a6 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> INFO 6a7 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> INFO 6a8 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.common.cluster] Configure -> INFO 6a9 Exiting" +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] start -> DEBU 6aa Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] start -> INFO 6ab Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ac 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] newRaft -> INFO 6ad newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ae 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] run -> INFO 6af This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.191 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 6b0 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2020-10-14 19:01:00.191 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b1 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.191 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b2 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:00.192 UTC [msp.identity] Sign -> DEBU 6b3 Sign: plaintext: 0A00120B0A090A03010203100418050A...B6EDFD5003BA52B3E34B5BA68F98CF2C " +orderer0.example.com | "2020-10-14 19:01:00.192 UTC [msp.identity] Sign -> DEBU 6b4 Sign: digest: BCDBF98787870E891D8E72FC1AB988DE19EE703CF5C320CDB488DD340AC377FF " +orderer0.example.com | "2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b5 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b6 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b7 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:00.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b8 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2020-10-14 19:01:00.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +orderer0.example.com | "2020-10-14 19:01:00.195 UTC [fsblkstorage] indexBlock -> DEBU 6ba Indexing block [blockNum=1, blockHash=[]byte{0x49, 0x5c, 0x4e, 0x7a, 0x80, 0x65, 0x31, 0xa5, 0xd3, 0x1c, 0x15, 0xdf, 0x29, 0xe4, 0x44, 0x7b, 0xe9, 0xdb, 0x86, 0x16, 0x63, 0xb0, 0xeb, 0x84, 0xc4, 0x31, 0xca, 0x89, 0xa6, 0xe0, 0x4, 0x2f} txOffsets= +peer1.org1.example.com | [5a7 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [5a8 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c54f30 gate 1602702068453387300 evaluation succeeds +peer1.org1.example.com | [5a9 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [5aa 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [5ab 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [5ac 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [5ad 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [5ae 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [5af 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [5b0 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5b1 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [5b2 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [5b3 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [5b4 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [5b5 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [5b6 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [5b7 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [5b8 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ce29b0, CONNECTING +peer1.org1.example.com | [5b9 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ce29b0, READY +peer1.org1.example.com | [5ba 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5bb 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [5bc 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [5bd 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [5be 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [5bf 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [5c0 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org1.example.com | [5c1 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [5c2 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [5c3 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [5c4 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d 02 f7 9d 56 65 cc 35 8a 60 77 e9 |0D. =...Ve.5.`w.| +peer1.org1.example.com | 00000010 74 7a 59 eb 43 bd db 37 fd 8d 42 39 6a 34 bd 6a |tzY.C..7..B9j4.j| +peer1.org1.example.com | 00000020 82 66 56 e5 02 20 40 ae 10 af 93 ce b9 60 21 a8 |.fV.. @......`!.| +peer1.org1.example.com | 00000030 5c 7c b8 18 bd b7 3e 3f c9 a0 01 da 12 0f 4e 8c |\|....>?......N.| +peer1.org1.example.com | 00000040 28 13 8d e8 04 a0 |(.....| +peer1.org1.example.com | [5c5 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [5c6 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [5c7 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00008bf00 env 0xc00260d810 txn 0 +peer1.org1.example.com | [5c8 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [5ca 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 85ms +peer1.org1.example.com | [5cc 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [5cb 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [5ce 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [5cd 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [5c9 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 ec 57 38 53 da de 25 9c b6 3d 35 53 5d 6e 35 5f |.W8S..%..=5S]n5_| +peer0.org1.example.com | 00000020 88 fa ad 23 85 02 20 36 31 a6 08 99 74 aa 1f f1 |...#.. 61...t...| +peer0.org1.example.com | 00000030 15 e0 c7 e6 aa 19 d4 db 07 58 1a 05 88 1b f9 96 |.........X......| +peer0.org2.example.com | [513 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | txId=e45fb23359e93f3a57c3cab122fe68b9899dfd3932b999a4c095cf270478888d locPointer=offset=71, bytesLength=29382 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:00.198 UTC [fsblkstorage] updateCheckpoint -> DEBU 6bb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53338], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-10-14 19:01:00.198 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6bc [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2020-10-14 19:01:00.313 UTC [common.deliver] deliverBlocks -> WARN 6bd [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39942 because of consenter error" +orderer0.example.com | "2020-10-14 19:01:00.314 UTC [orderer.common.server] func1 -> DEBU 6be Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:00.314 UTC [comm.grpc.server] 1 -> INFO 6bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39942 grpc.code=OK grpc.call_duration=198.1959ms +orderer0.example.com | "2020-10-14 19:01:00.343 UTC [orderer.common.server] Deliver -> DEBU 6c0 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:00.343 UTC [common.deliver] Handle -> DEBU 6c1 Starting new deliver loop for 172.18.0.9:39944" +orderer0.example.com | "2020-10-14 19:01:00.344 UTC [common.deliver] Handle -> DEBU 6c2 Attempting to read seek info message from 172.18.0.9:39944" +orderer0.example.com | "2020-10-14 19:01:00.548 UTC [common.deliver] deliverBlocks -> WARN 6c3 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39944 because of consenter error" +orderer0.example.com | "2020-10-14 19:01:00.549 UTC [orderer.common.server] func1 -> DEBU 6c4 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:00.549 UTC [comm.grpc.server] 1 -> INFO 6c5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39944 grpc.code=OK grpc.call_duration=206.3015ms +orderer0.example.com | "2020-10-14 19:01:00.572 UTC [orderer.common.server] Deliver -> DEBU 6c6 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:00.572 UTC [common.deliver] Handle -> DEBU 6c7 Starting new deliver loop for 172.18.0.9:39946" +orderer0.example.com | "2020-10-14 19:01:00.572 UTC [common.deliver] Handle -> DEBU 6c8 Attempting to read seek info message from 172.18.0.9:39946" +orderer0.example.com | "2020-10-14 19:01:00.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [5d4 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5d5 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [5d6 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc000096e00 env 0xc00028ecd0 txn 0 +peer1.org2.example.com | [5d7 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [5d8 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 106ms +peer1.org2.example.com | [5d9 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [5da 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [5db 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [5dc 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org2.example.com | [5dd 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [5de 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [5df 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [5e0 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [5e1 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org2.example.com | [5e2 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [5e4 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [5e5 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [5e6 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [5e7 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5e8 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [5e9 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | 00000040 d9 ad 45 4e 69 e5 27 |..ENi.'| +peer0.org1.example.com | [4ce 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4cf 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 gate 1602702068442446700 evaluation succeeds +peer0.org1.example.com | [4d0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [4d1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [4d2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [4d3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [4d5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [4d6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [4d4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [4d7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org1.example.com | [4d8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [4d9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4da 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [4db 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [4dc 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [4dd 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4de 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [4df 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [4e1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [4e0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [4e2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [4e3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [4e4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [4e5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [4e6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4e7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [4e8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [4e9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4ea 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4eb 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [4ec 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4ed 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4ee 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [4ef 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [514 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [515 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [516 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [517 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026739c0)} +peer0.org2.example.com | [518 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [519 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [51a 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [51b 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer0.org2.example.com | [51c 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer0.org2.example.com | [51d 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer0.org2.example.com | [51e 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer0.org2.example.com | [51f 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [520 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [521 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [522 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [531 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [532 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [533 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +orderer0.example.com | "2020-10-14 19:01:00.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2020-10-14 19:01:00.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.1µs " +orderer0.example.com | "2020-10-14 19:01:00.777 UTC [common.deliver] deliverBlocks -> WARN 6cc [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39946 because of consenter error" +orderer0.example.com | "2020-10-14 19:01:00.777 UTC [orderer.common.server] func1 -> DEBU 6cd Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:00.778 UTC [comm.grpc.server] 1 -> INFO 6ce streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39946 grpc.code=OK grpc.call_duration=206.3126ms +orderer0.example.com | "2020-10-14 19:01:00.795 UTC [orderer.common.server] Deliver -> DEBU 6cf Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:00.795 UTC [common.deliver] Handle -> DEBU 6d0 Starting new deliver loop for 172.18.0.9:39948" +orderer0.example.com | "2020-10-14 19:01:00.796 UTC [common.deliver] Handle -> DEBU 6d1 Attempting to read seek info message from 172.18.0.9:39948" +orderer0.example.com | "2020-10-14 19:01:01.004 UTC [common.deliver] deliverBlocks -> WARN 6d2 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39948 because of consenter error" +orderer0.example.com | "2020-10-14 19:01:01.005 UTC [orderer.common.server] func1 -> DEBU 6d3 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:01.005 UTC [comm.grpc.server] 1 -> INFO 6d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39948 grpc.code=OK grpc.call_duration=209.9811ms +orderer0.example.com | "2020-10-14 19:01:01.034 UTC [orderer.common.server] Deliver -> DEBU 6d5 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:01.034 UTC [common.deliver] Handle -> DEBU 6d6 Starting new deliver loop for 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.035 UTC [common.deliver] Handle -> DEBU 6d7 Attempting to read seek info message from 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d9 Sending msg of 28 bytes to 3 on channel testchainid took 344.5µs" +orderer0.example.com | "2020-10-14 19:01:01.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 560.6µs " +orderer0.example.com | "2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] Step -> INFO 6db 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6dc 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] poll -> INFO 6dd 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] campaign -> INFO 6de 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] campaign -> INFO 6df 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.194 UTC [orderer.common.cluster] NewStream -> DEBU 6e0 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-10-14 19:01:01.195 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e1 Sending msg of 28 bytes to 2 on channel businesschannel took 845.3µs" +orderer0.example.com | "2020-10-14 19:01:01.195 UTC [orderer.common.cluster] NewStream -> DEBU 6e2 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-10-14 19:01:01.195 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e3 Sending msg of 28 bytes to 3 on channel businesschannel took 73.3µs" +orderer0.example.com | "2020-10-14 19:01:01.195 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " +orderer0.example.com | "2020-10-14 19:01:01.195 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +orderer0.example.com | "2020-10-14 19:01:01.197 UTC [orderer.common.cluster] Step -> DEBU 6e6 Connection from orderer1.example.com(172.18.0.2:53736)" +orderer0.example.com | "2020-10-14 19:01:01.198 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.198 UTC [orderer.common.cluster] Step -> DEBU 6e8 Connection from orderer2.example.com(172.18.0.4:35132)" +orderer0.example.com | "2020-10-14 19:01:01.198 UTC [orderer.consensus.etcdraft] poll -> INFO 6e9 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6ea 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6eb 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.199 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] poll -> INFO 6ed 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.201 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ee 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.201 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ef 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.202 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2020-10-14 19:01:01.202 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +orderer0.example.com | "2020-10-14 19:01:01.203 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.5µs " +orderer0.example.com | "2020-10-14 19:01:01.203 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +orderer0.example.com | "2020-10-14 19:01:01.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] poll -> INFO 6f5 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +peer0.org2.example.com | [535 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer0.org2.example.com | [536 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [537 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer0.org2.example.com | [538 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer0.org2.example.com | [534 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [539 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org2.example.com | [53a 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [53b 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org2.example.com | [53c 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [53d 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [53e 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [53f 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [541 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [540 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer0.org2.example.com | [542 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 27ms (state_validation=2ms block_and_pvtdata_commit=14ms state_commit=5ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer0.org2.example.com | [543 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org2.example.com | [544 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org2.example.com | [545 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org2.example.com | [546 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer0.org2.example.com | [547 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer0.org2.example.com | [548 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [549 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002977c80 env 0xc00253b900 txn 0 +peer0.org2.example.com | [54a 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00253b900 +peer0.org2.example.com | [54b 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer0.org2.example.com | [54c 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [54d 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [54e 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [54f 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [550 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [552 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [553 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [554 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [555 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [556 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +peer0.org2.example.com | 00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2| +peer0.org2.example.com | [557 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +peer0.org2.example.com | 00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +peer0.org2.example.com | 00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +peer0.org2.example.com | 00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +peer0.org2.example.com | 00000040 7f 4b 57 be 84 c8 e9 |.KW....| +peer0.org2.example.com | [558 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [559 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0026f2a80, header channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer0.org2.example.com | [55a 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [551 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [55c 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4f0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [4f1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [4f2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4f3 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4f4 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4f5 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4f6 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4f7 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [4f8 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [4f9 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4fa 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4fb 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [4fc 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4fd 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4fe 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4ff 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [55d 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [55e 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [55b 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [55f 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [561 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [562 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 gate 1602702068909805500 evaluation starts +peer0.org2.example.com | [563 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [564 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [560 10-14 19:01:08.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [565 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [567 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [568 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [569 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 principal matched by identity 0 +peer0.org2.example.com | [566 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [56a 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [56c 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 8e 4a 07 1f 8e 1a c6 71 4e 7d 0c |0D. \.J.....qN}.| +peer0.org2.example.com | 00000010 20 98 89 a9 4e 7d d3 82 c6 4c ff 76 2e 60 c2 22 | ...N}...L.v.`."| +peer0.org2.example.com | 00000020 02 8f 8d 5b 02 20 26 e0 27 b7 83 5b 34 82 19 ab |...[. &.'..[4...| +peer0.org2.example.com | 00000030 20 9b 29 c0 e5 26 a2 c9 9b 54 e5 38 72 27 2e fa | .)..&...T.8r'..| +peer0.org2.example.com | 00000040 5e 17 0a f1 96 78 |^....x| +peer0.org2.example.com | [56d 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [56e 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264f600 gate 1602702068909805500 evaluation succeeds +peer0.org2.example.com | [56b 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [570 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [571 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [572 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [573 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [574 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [575 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [576 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [577 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [578 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [579 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [57a 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [57b 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [57c 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org2.example.com | [57d 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [57e 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [57f 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [580 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [581 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [582 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [583 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer0.org2.example.com | [584 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [585 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [586 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org2.example.com | [587 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [588 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [589 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [58a 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 gate 1602702068915118400 evaluation starts +peer0.org2.example.com | [58b 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [58c 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [58d 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [58e 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [58f 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [590 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [591 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [592 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [593 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 principal matched by identity 0 +peer0.org2.example.com | [594 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +peer0.org2.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.| +peer0.org2.example.com | [595 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +peer0.org2.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +peer0.org2.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +peer0.org2.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +peer0.org2.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...| +peer0.org2.example.com | [596 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [597 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685ae0 gate 1602702068915118400 evaluation succeeds +peer0.org2.example.com | [598 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [599 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [59a 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [59b 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [59c 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [59d 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [59e 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [59f 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a0 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a1 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a2 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a3 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a4 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a5 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [5a6 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [5a7 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [5a8 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5a9 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5aa 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ab 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ac 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ad 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ae 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6f6 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6f7 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] run -> INFO 6f8 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] run -> INFO 6fa Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fb Sending msg of 36 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6fc Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fd Sending msg of 36 bytes to 2 on channel businesschannel took 16.4µs" +orderer0.example.com | "2020-10-14 19:01:01.209 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6fe There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 191.7µs " +orderer0.example.com | "2020-10-14 19:01:01.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 700 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2020-10-14 19:01:01.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2020-10-14 19:01:01.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.1µs " +orderer0.example.com | "2020-10-14 19:01:01.212 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 704 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 705 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 706 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 707 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +orderer0.example.com | "2020-10-14 19:01:01.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2020-10-14 19:01:01.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU 709 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:01:01.241 UTC [msp] DeserializeIdentity -> DEBU 70f Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:01.241 UTC [msp.identity] newIdentity -> DEBU 710 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:01.242 UTC [cauthdsl] func1 -> DEBU 711 0xc0009c9ef0 gate 1602702061242161200 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 712 0xc0009c9ef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 713 0xc0009c9ef0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 714 0xc0009c9ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:01.243 UTC [cauthdsl] func2 -> DEBU 715 0xc0009c9ef0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:01.243 UTC [cauthdsl] func1 -> DEBU 716 0xc0009c9ef0 gate 1602702061242161200 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:01.243 UTC [policies] Evaluate -> DEBU 717 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:01.243 UTC [policies] Evaluate -> DEBU 718 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:01.244 UTC [policies] func1 -> DEBU 719 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71a Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:01.245 UTC [policies] Evaluate -> DEBU 71e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:01:01.245 UTC [cauthdsl] func1 -> DEBU 71f 0xc000d0d7a0 gate 1602702061245372000 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:01.245 UTC [cauthdsl] func2 -> DEBU 720 0xc000d0d7a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:01.246 UTC [cauthdsl] func2 -> DEBU 721 0xc000d0d7a0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:01.246 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 722 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:01.246 UTC [msp] Validate -> DEBU 723 MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:01.247 UTC [msp] getCertificationChain -> DEBU 724 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:01.247 UTC [cauthdsl] func2 -> DEBU 725 0xc000d0d7a0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:01.248 UTC [msp.identity] Verify -> DEBU 726 Verify: digest = 00000000 ab 3d 82 5c c0 99 3c 53 b5 85 2f 18 e2 91 33 9b |.=.\.. DEBU 727 Verify: sig = 00000000 30 44 02 20 4f 7c 32 90 af d1 4d 64 81 4d bc 69 |0D. O|2...Md.M.i| +orderer0.example.com | 00000010 83 4e c7 20 48 eb 43 b2 f1 09 aa 96 7e f4 28 be |.N. H.C.....~.(.| +orderer0.example.com | 00000020 45 d2 43 81 02 20 45 cf 9e 7c 50 43 b2 3d 55 b0 |E.C.. E..|PC.=U.| +orderer0.example.com | 00000030 0d dc ec e7 b3 b3 6c b6 00 41 bd 4c 78 54 f5 2e |......l..A.LxT..| +orderer0.example.com | 00000040 c1 16 58 66 89 ab |..Xf..|" +orderer0.example.com | "2020-10-14 19:01:01.249 UTC [cauthdsl] func2 -> DEBU 728 0xc000d0d7a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:01.250 UTC [cauthdsl] func1 -> DEBU 729 0xc000d0d7a0 gate 1602702061245372000 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72c Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:01.251 UTC [common.deliver] deliverBlocks -> DEBU 730 [channel: businesschannel] Received seekInfo (0xc000d2a7c0) start: > stop: > from 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.251 UTC [fsblkstorage] Next -> DEBU 731 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-10-14 19:01:01.252 UTC [fsblkstorage] newBlockfileStream -> DEBU 732 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:01:01.252 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 733 Remaining bytes=[28474], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:01:01.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 734 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:01:01.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 735 blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-10-14 19:01:01.253 UTC [common.deliver] deliverBlocks -> DEBU 736 [channel: businesschannel] Delivering block [0] for (0xc000d2a7c0) for 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.254 UTC [common.deliver] deliverBlocks -> DEBU 737 [channel: businesschannel] Done delivering to 172.18.0.9:39950 for (0xc000d2a7c0)" +orderer0.example.com | "2020-10-14 19:01:01.255 UTC [common.deliver] Handle -> DEBU 738 Waiting for new SeekInfo from 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.257 UTC [common.deliver] Handle -> DEBU 739 Attempting to read seek info message from 172.18.0.9:39950" +orderer0.example.com | "2020-10-14 19:01:01.258 UTC [common.deliver] Handle -> DEBU 73a Received EOF from 172.18.0.9:39950, hangup" +orderer0.example.com | "2020-10-14 19:01:01.258 UTC [orderer.common.server] func1 -> DEBU 73b Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:01.258 UTC [comm.grpc.server] 1 -> INFO 73c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39950 grpc.code=OK grpc.call_duration=224.1848ms +orderer0.example.com | "2020-10-14 19:01:01.262 UTC [grpc] warningf -> DEBU 73d transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:39950: read: connection reset by peer" +orderer0.example.com | "2020-10-14 19:01:01.262 UTC [grpc] infof -> DEBU 73e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.263 UTC [grpc] infof -> DEBU 73f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 740 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 741 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 742 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.265 UTC [grpc] infof -> DEBU 743 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.265 UTC [grpc] infof -> DEBU 744 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:01.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 746 Sending msg of 28 bytes to 3 on channel testchainid took 304.4µs" +orderer0.example.com | "2020-10-14 19:01:01.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 297.4µs " +orderer0.example.com | "2020-10-14 19:01:01.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 2 on channel businesschannel took 74.9µs" +orderer0.example.com | "2020-10-14 19:01:01.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 749 Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +orderer0.example.com | "2020-10-14 19:01:01.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +orderer0.example.com | "2020-10-14 19:01:01.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.6µs " +orderer0.example.com | "2020-10-14 19:01:01.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:01.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +orderer0.example.com | "2020-10-14 19:01:02.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2020-10-14 19:01:02.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 751 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +orderer0.example.com | "2020-10-14 19:01:02.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 753 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-10-14 19:01:02.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +orderer0.example.com | "2020-10-14 19:01:02.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 752 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.5µs " +orderer0.example.com | "2020-10-14 19:01:02.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 755 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 756 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 757 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:02.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.7µs " +orderer0.example.com | "2020-10-14 19:01:02.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2020-10-14 19:01:02.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-10-14 19:01:02.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +orderer0.example.com | "2020-10-14 19:01:02.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:02.697 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.6µs " +peer0.org1.example.com | [500 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [501 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [502 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [503 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [504 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [505 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [506 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [507 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [508 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [509 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [50a 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [50b 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [50c 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [50d 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [50e 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [50f 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [510 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [511 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [512 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [514 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [515 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [513 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.463Z grpc.peer_address=172.18.0.8:52172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=226.4µs +peer0.org1.example.com | [516 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [517 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [518 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [519 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [51a 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [51b 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [51c 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [51d 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [51e 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [51f 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [520 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [521 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [522 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [523 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [524 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [525 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [526 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [527 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [528 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [529 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [52a 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [52b 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [52c 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [52d 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [52e 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:52172 +peer0.org1.example.com | [52f 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52172 +peer0.org1.example.com | [530 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [531 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 3c 6e c8 06 0a c8 90 4b d4 c2 |0E.!.. DEBU Authenticated 172.18.0.8:52172 +peer0.org1.example.com | [533 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52172 +peer0.org1.example.com | [534 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52122 disconnected +peer0.org1.example.com | [535 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:52122 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.0238402s +peer0.org1.example.com | [536 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [537 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [538 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52172 disconnected +peer0.org1.example.com | [539 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.473Z grpc.peer_address=172.18.0.8:52172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.1156ms +peer0.org1.example.com | [53a 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [53b 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [53c 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [53d 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [53e 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [53f 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [540 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [541 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [542 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [5ea 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [5eb 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [5ec 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [5e3 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5ed 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [5ee 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00282fc80)} +peer1.org2.example.com | [5ef 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5f0 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [5f1 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [5f2 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [5f3 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org2.example.com | [5f4 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer1.org2.example.com | [5f5 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer1.org2.example.com | [5f6 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [5f7 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002834e30, READY +peer1.org2.example.com | [5f8 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [5f9 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer1.org2.example.com | [5fa 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [5fb 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5fc 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5fe 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5ff 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [600 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [601 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [602 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [603 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [604 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [605 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 gate 1602702069302575100 evaluation starts +peer1.org2.example.com | [606 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [607 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [608 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [609 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 principal evaluation fails +peer1.org2.example.com | [60a 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec8350 gate 1602702069302575100 evaluation fails +peer1.org2.example.com | [60b 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [60c 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [60d 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [60e 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 gate 1602702069304440800 evaluation starts +peer1.org2.example.com | [60f 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [610 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [611 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [612 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [613 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [614 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 principal matched by identity 0 +peer1.org2.example.com | [615 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [616 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 9e 45 fc b3 68 f1 f4 c4 80 48 |0E.!...E..h....H| +orderer0.example.com | "2020-10-14 19:01:02.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 760 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 761 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2020-10-14 19:01:03.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 477.7µs " +orderer0.example.com | "2020-10-14 19:01:03.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 763 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2020-10-14 19:01:03.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 764 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-10-14 19:01:03.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 765 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.8µs " +orderer0.example.com | "2020-10-14 19:01:03.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-10-14 19:01:03.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 767 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 768 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 769 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76a Sending msg of 28 bytes to 3 on channel testchainid took 556.2µs" +orderer0.example.com | "2020-10-14 19:01:03.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " +orderer0.example.com | "2020-10-14 19:01:03.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2020-10-14 19:01:03.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76d Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-10-14 19:01:03.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.9µs " +orderer0.example.com | "2020-10-14 19:01:03.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.6µs " +orderer0.example.com | "2020-10-14 19:01:03.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 770 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:03.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 771 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 772 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-10-14 19:01:04.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.8µs " +orderer0.example.com | "2020-10-14 19:01:04.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 775 Sending msg of 28 bytes to 3 on channel businesschannel took 50.8µs" +orderer0.example.com | "2020-10-14 19:01:04.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 776 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +orderer0.example.com | "2020-10-14 19:01:04.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 777 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.3µs " +orderer0.example.com | "2020-10-14 19:01:04.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 778 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 779 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.7µs " +orderer0.example.com | "2020-10-14 19:01:04.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77c Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-10-14 19:01:04.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.8398ms " +orderer0.example.com | "2020-10-14 19:01:04.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77e Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +orderer0.example.com | "2020-10-14 19:01:04.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-10-14 19:01:04.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 780 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0045ms " +orderer0.example.com | "2020-10-14 19:01:04.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 781 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 660.5µs " +orderer0.example.com | "2020-10-14 19:01:04.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 782 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:04.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 783 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 784 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 785 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +orderer0.example.com | "2020-10-14 19:01:05.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 786 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-10-14 19:01:05.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 787 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-10-14 19:01:05.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 788 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +orderer0.example.com | "2020-10-14 19:01:05.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 789 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.4µs " +orderer0.example.com | "2020-10-14 19:01:05.198 UTC [orderer.common.cluster.step] handleMessage -> DEBU 78a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 78b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9764ms " +orderer0.example.com | "2020-10-14 19:01:05.376 UTC [orderer.common.server] Deliver -> DEBU 78d Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:05.377 UTC [common.deliver] Handle -> DEBU 78e Starting new deliver loop for 172.18.0.9:39976" +orderer0.example.com | "2020-10-14 19:01:05.377 UTC [common.deliver] Handle -> DEBU 78f Attempting to read seek info message from 172.18.0.9:39976" +orderer0.example.com | "2020-10-14 19:01:05.397 UTC [orderer.common.server] Broadcast -> DEBU 790 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:01:05.398 UTC [orderer.common.broadcast] Handle -> DEBU 791 Starting new broadcast loop for 172.18.0.9:39978" +orderer0.example.com | "2020-10-14 19:01:05.398 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 792 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39978" +orderer0.example.com | "2020-10-14 19:01:05.399 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 793 Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 794 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 795 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 796 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.401 UTC [policies] Evaluate -> DEBU 797 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:05.401 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.401 UTC [cauthdsl] func1 -> DEBU 799 0xc0001b52c0 gate 1602702065401941500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:05.402 UTC [cauthdsl] func2 -> DEBU 79a 0xc0001b52c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:05.402 UTC [cauthdsl] func2 -> DEBU 79b 0xc0001b52c0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:05.403 UTC [cauthdsl] func2 -> DEBU 79c 0xc0001b52c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:05.403 UTC [cauthdsl] func2 -> DEBU 79d 0xc0001b52c0 principal evaluation fails" +peer0.org2.example.com | [5af 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5b0 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [5b1 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [5b2 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [5b3 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [5b4 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [5b5 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [5b6 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [5b7 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [5b8 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [5b9 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [5ba 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [5bb 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [5bc 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [5bd 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [5be 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [5bf 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [5c0 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [5c1 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [56f 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 a1 8f 48 b3 cd 99 61 48 ca 69 89 88 87 ea d1 b2 |..H...aH.i......| +peer1.org2.example.com | 00000020 cd f2 82 71 b5 02 20 1b 53 25 ce 0a e5 d3 98 31 |...q.. .S%.....1| +peer1.org2.example.com | 00000030 c5 37 4b 04 30 ea 40 1e 95 3a 99 2e 41 1f f7 49 |.7K.0.@..:..A..I| +peer1.org2.example.com | 00000040 1f 1b ab 81 5a 9d 2d |....Z.-| +peer1.org2.example.com | [617 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +peer1.org2.example.com | txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +peer1.org2.example.com | ] +peer1.org2.example.com | [618 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [61a 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ec88e0 gate 1602702069304440800 evaluation succeeds +peer1.org2.example.com | [61b 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [61c 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [61d 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [61e 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [61f 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org2.example.com | [620 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [619 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to txid-index +peer1.org2.example.com | [5fd 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [621 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [625 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16100C +peer1.org2.example.com | [626 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D70B3FA8EFB8C824A42AB1B4B366B28607D466762AFE0E3B46D82787DDEE11AC +peer1.org2.example.com | [627 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [628 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [629 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [62a 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [623 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx number:[0] ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to blockNumTranNum index +peer1.org2.example.com | [624 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [62b 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [622 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [62c 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [62d 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [62e 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [62f 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +peer1.org2.example.com | [632 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org2.example.com | [630 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org2.example.com | [631 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer1.org2.example.com | [633 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [634 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 73 3a 25 0b 60 b1 8f 3b 31 39 6b |0D. .s:%.`..;19k| +peer1.org2.example.com | 00000010 c0 68 3b 5f 84 ab 0e 31 bd 03 49 fa 7f 57 3a 2c |.h;_...1..I..W:,| +peer1.org2.example.com | 00000020 f6 e0 11 7c 02 20 11 16 0e 45 69 a8 30 25 2c 88 |...|. ...Ei.0%,.| +peer1.org2.example.com | 00000030 ed c6 38 62 b4 42 5f a7 e4 2e 27 45 a2 7f 84 e4 |..8b.B_...'E....| +peer1.org2.example.com | 00000040 0d 02 90 68 a7 3f |...h.?| +peer1.org2.example.com | [635 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer1.org2.example.com | [636 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [637 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [638 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org2.example.com | [63a 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [63c 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [63d 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [63b 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [63e 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [639 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org2.example.com | [63f 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org2.example.com | [640 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [641 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [642 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [643 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [644 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [645 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 117636673158108147, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes +peer1.org2.example.com | [646 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 117636673158108147, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes +peer1.org2.example.com | [647 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [648 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 117636673158108147, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes +peer1.org2.example.com | [64a 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [649 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [64b 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer1.org2.example.com | [64c 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer1.org2.example.com | [64d 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer1.org2.example.com | [64e 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [64f 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org2.example.com | [650 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org2.example.com | [651 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [652 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 82 d4 d0 0a fd e5 db 4e 2f 73 cf ec 63 dd 5c |a.......N/s..c.\| +peer1.org2.example.com | 00000010 f9 db 2b 74 78 f4 93 73 b9 6f b9 31 a3 27 e2 98 |..+tx..s.o.1.'..| +peer1.org2.example.com | [653 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb bc 13 e6 52 2d 84 52 f9 ec 4b |0E.!.....R-.R..K| +peer1.org2.example.com | 00000010 4d 25 1b 6c dd 85 60 84 df 31 71 95 d6 ad ed 92 |M%.l..`..1q.....| +peer1.org2.example.com | 00000020 00 60 ec 12 1e 02 20 65 4b 6a cb 33 5a 90 85 39 |.`.... eKj.3Z..9| +peer1.org2.example.com | 00000030 e4 0b 12 8b 6c 4d f7 64 fd b4 2f 17 89 c1 c2 f3 |....lM.d../.....| +peer1.org2.example.com | 00000040 dc 6c dd 53 3a de 37 |.l.S:.7| +peer1.org2.example.com | [654 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org2.example.com | [655 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 43ms (state_validation=3ms block_and_pvtdata_commit=33ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer1.org2.example.com | [656 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer1.org2.example.com | [657 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [658 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 72 55 df ae d9 6a 2c 58 c9 55 e4 |0D. KrU...j,X.U.| +peer1.org1.example.com | [5cf 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [5d1 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org1.example.com | [5d2 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [5d3 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [5d4 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [5d5 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer1.org1.example.com | [5d6 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [5d0 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16100D +peer1.org1.example.com | [5d7 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F652C1E7B5A1DCAB708CC6E03DF9E7B1E2388CEFEA9B19EBA10B547D5B25B0D9 +peer1.org1.example.com | [5d8 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [5d9 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [5db 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [5da 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5dd 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [5de 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [5dc 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [5df 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [5e1 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [5e0 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [5e2 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [5e3 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5e4 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer1.org1.example.com | [5e5 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer1.org1.example.com | [5e6 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org1.example.com | [5e7 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [5e8 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [5e9 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +orderer0.example.com | "2020-10-14 19:01:05.404 UTC [cauthdsl] func1 -> DEBU 79e 0xc0001b52c0 gate 1602702065401941500 evaluation fails" +peer0.org1.example.com | [543 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [544 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [545 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [546 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [547 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [548 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [549 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [54a 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [54b 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [54c 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [54d 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [54e 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [54f 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [550 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [551 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [552 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [553 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [554 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [555 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [556 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [557 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [558 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [559 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [5c2 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5c3 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5c4 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5c5 10-14 19:01:08.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5c6 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [5c7 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5c8 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [5c9 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5ca 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5cb 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5cc 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5cd 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5ce 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [5cf 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 d5 7e 86 78 cd 4b eb 80 d5 68 10 92 99 09 65 |..~.x.K...h....e| +peer0.org2.example.com | 00000010 93 f1 5e 1e af 40 ab 24 c1 42 26 52 a3 2b b0 f9 |..^..@.$.B&R.+..| +peer0.org2.example.com | [5d0 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 60 20 e1 90 42 97 7e 78 b5 e5 b2 |0D. N` ..B.~x...| +peer0.org2.example.com | 00000010 17 52 0b 48 5e ea 8f 88 78 38 be 34 20 ae d4 da |.R.H^...x8.4 ...| +peer0.org2.example.com | 00000020 0f 65 5f 99 02 20 68 54 55 b8 f5 d0 52 0b cc c1 |.e_.. hTU...R...| +peer0.org2.example.com | 00000030 35 13 d0 5b b6 7f 9c bf 91 60 87 c7 84 59 5c dd |5..[.....`...Y\.| +peer0.org2.example.com | 00000040 6c ab 52 18 ef 92 |l.R...| +peer0.org2.example.com | [5d1 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5d2 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [5d3 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5d4 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000010 32 1e b3 a6 13 a8 07 cd 9d 5a 35 d7 ae 81 2a 43 |2........Z5...*C| +peer1.org2.example.com | 00000020 da b5 64 27 02 20 7a ce 5c 67 ca f9 14 f9 43 ec |..d'. z.\g....C.| +peer1.org2.example.com | 00000030 86 49 36 b9 0e 3d 02 7d 31 ba 3e d9 ca fe e5 c4 |.I6..=.}1.>.....| +peer1.org2.example.com | 00000040 20 4a 37 ef da c1 | J7...| +peer1.org2.example.com | [659 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [65a 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [65b 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:05.404 UTC [policies] Evaluate -> DEBU 79f Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.405 UTC [policies] Evaluate -> DEBU 7a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.405 UTC [policies] func1 -> DEBU 7a1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-10-14 19:01:05.405 UTC [policies] Evaluate -> DEBU 7a2 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:05.407 UTC [policies] Evaluate -> DEBU 7a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.407 UTC [cauthdsl] func1 -> DEBU 7a7 0xc0000aee50 gate 1602702065407519600 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:05.407 UTC [cauthdsl] func2 -> DEBU 7a8 0xc0000aee50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:05.408 UTC [cauthdsl] func2 -> DEBU 7a9 0xc0000aee50 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:05.408 UTC [cauthdsl] func2 -> DEBU 7aa 0xc0000aee50 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:05.408 UTC [msp.identity] Verify -> DEBU 7ab Verify: digest = 00000000 77 e9 fa 5d 1e 1f bc cb 1d 51 c3 a8 4b 89 f3 cb |w..].....Q..K...| +orderer0.example.com | 00000010 d8 1b 00 79 bd 4c 6e 1b dd c4 1e 89 a7 7c 8a 13 |...y.Ln......|..|" +orderer0.example.com | "2020-10-14 19:01:05.409 UTC [msp.identity] Verify -> DEBU 7ac Verify: sig = 00000000 30 44 02 20 2b ec 95 c5 67 c7 cf 7d c5 d3 eb 84 |0D. +...g..}....| +orderer0.example.com | 00000010 00 10 20 db 72 11 e0 63 56 66 94 c0 e6 3b ba 11 |.. .r..cVf...;..| +orderer0.example.com | 00000020 53 54 44 11 02 20 66 77 39 31 06 bd 76 c3 2a 40 |STD.. fw91..v.*@| +orderer0.example.com | 00000030 47 ea be f7 f6 df 80 43 b4 b4 1b 91 a0 9c 99 62 |G......C.......b| +orderer0.example.com | 00000040 2c 9a e4 55 08 24 |,..U.$|" +orderer0.example.com | "2020-10-14 19:01:05.409 UTC [cauthdsl] func2 -> DEBU 7ad 0xc0000aee50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:05.410 UTC [cauthdsl] func1 -> DEBU 7ae 0xc0000aee50 gate 1602702065407519600 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:05.410 UTC [policies] Evaluate -> DEBU 7af Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.410 UTC [policies] Evaluate -> DEBU 7b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b1 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b3 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.412 UTC [policies] Evaluate -> DEBU 7b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.412 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bc Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bd Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7be Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7bf Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c0 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [common.configtx] addToMap -> DEBU 7c3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [common.configtx] verifyDeltaSet -> DEBU 7c4 Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | [5d5 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5d6 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5d7 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5d8 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5d9 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [5da 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5db 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5dc 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5dd 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5de 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5df 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5e0 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c0790 gate 1602702068929854700 evaluation starts +peer0.org2.example.com | [5e1 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c0790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5e2 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c0790 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [5e3 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [5e4 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5e5 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [5e6 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c0790 principal matched by identity 0 +peer0.org2.example.com | [5e7 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 63 d2 70 fd b9 b4 07 72 54 43 81 39 e7 1c cf |.c.p....rTC.9...| +peer0.org2.example.com | 00000010 66 35 af f7 bf 8b fa 5f c5 2f 7b 10 a8 5e 9f c9 |f5....._./{..^..| +peer0.org2.example.com | [5e8 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 68 02 fe a3 8f 18 16 6e 63 35 |0E.!..h......nc5| +peer0.org2.example.com | 00000010 eb 59 92 99 f4 4d ac fa 1c f4 ae 43 16 84 fb f0 |.Y...M.....C....| +peer0.org2.example.com | 00000020 66 0f b4 ed fb 02 20 3b f0 af fc 75 d9 2c b0 d4 |f..... ;...u.,..| +peer0.org2.example.com | 00000030 73 3b 58 a7 1f 07 88 f4 ef fd 3c 65 54 fe 33 7e |s;X....... DEBU 0xc0028c0790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5ea 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c0790 gate 1602702068929854700 evaluation succeeds +peer0.org2.example.com | [5eb 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5ec 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5ed 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5ee 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [55a 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [55b 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [55c 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [55d 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [55e 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [55f 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [560 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [561 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [562 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [563 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [564 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [565 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [566 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [567 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [568 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [569 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [56a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [56b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [56c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [56d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [56e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [56f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [570 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [571 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [572 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [573 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [574 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [575 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [576 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [577 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [578 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [579 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [57a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [57b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [57c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [57d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [57e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [57f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [580 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 gate 1602702068501315500 evaluation starts +peer0.org1.example.com | [581 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [582 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [583 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [584 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 principal evaluation fails +peer0.org1.example.com | [585 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 gate 1602702068501315500 evaluation fails +peer0.org1.example.com | [586 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [587 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [588 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [589 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 gate 1602702068503512100 evaluation starts +peer0.org1.example.com | [58a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [58b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [58c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 principal matched by identity 0 +peer0.org1.example.com | [58d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [58e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [58f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [590 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 gate 1602702068503512100 evaluation succeeds +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [common.configtx] policyForItem -> DEBU 7c5 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c6 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c7 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c8 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c9 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7ca Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cb Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cc Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cd Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7ce Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cf Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.417 UTC [policies] Evaluate -> DEBU 7d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:05.418 UTC [cauthdsl] func1 -> DEBU 7d1 0xc0002dece0 gate 1602702065417995900 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:05.418 UTC [cauthdsl] func2 -> DEBU 7d2 0xc0002dece0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:05.418 UTC [cauthdsl] func2 -> DEBU 7d3 0xc0002dece0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:05.418 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7d4 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.419 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7d5 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.419 UTC [msp] Validate -> DEBU 7d6 MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:05.419 UTC [msp] getCertificationChain -> DEBU 7d7 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:05.420 UTC [msp] hasOURole -> DEBU 7d8 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-10-14 19:01:05.420 UTC [msp] getCertificationChain -> DEBU 7d9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:05.421 UTC [cauthdsl] func2 -> DEBU 7da 0xc0002dece0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:05.421 UTC [msp.identity] Verify -> DEBU 7db Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +orderer0.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...|" +orderer0.example.com | "2020-10-14 19:01:05.421 UTC [msp.identity] Verify -> DEBU 7dc Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +orderer0.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +orderer0.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +orderer0.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +orderer0.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...|" +orderer0.example.com | "2020-10-14 19:01:05.421 UTC [cauthdsl] func2 -> DEBU 7dd 0xc0002dece0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:05.421 UTC [cauthdsl] func1 -> DEBU 7de 0xc0002dece0 gate 1602702065417995900 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:05.422 UTC [policies] Evaluate -> DEBU 7df Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.425 UTC [policies] Evaluate -> DEBU 7e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.425 UTC [common.configtx] verifyDeltaSet -> DEBU 7e1 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.425 UTC [common.configtx] recurseConfigMap -> DEBU 7e2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e3 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.427 UTC [common.configtx] recurseConfigMap -> DEBU 7e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.428 UTC [common.configtx] recurseConfigMap -> DEBU 7e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7e9 Setting policy for key Admins to " +orderer0.example.com | "2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7ea Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7eb Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ec Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ed Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ee Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ef Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7f0 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7f1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f3 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.channelconfig] NewStandardValues -> DEBU 7f8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:05.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f9 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fa Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fb Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fc Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fd Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] NewStandardValues -> DEBU 7fe Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ff Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 800 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] NewStandardValues -> DEBU 801 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [65c 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [65d 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ed c8 3e 54 d3 05 16 97 e7 b2 b3 98 86 d5 f6 87 |..>T............| +peer1.org2.example.com | 00000010 ac 7f 13 ee 73 06 91 f9 5c 0f 08 24 ea e1 c7 b8 |....s...\..$....| +peer1.org2.example.com | [65e 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 2d be a1 2c dd cd 4c df a9 e1 |0E.!..-..,..L...| +peer1.org2.example.com | 00000010 d1 c3 fb aa 29 d5 e1 56 65 da a8 d0 d2 cf 08 7a |....)..Ve......z| +peer1.org2.example.com | 00000020 75 dd 7a 7c 45 02 20 2d 7a 54 c8 1e e0 66 14 1c |u.z|E. -zT...f..| +peer1.org2.example.com | 00000030 0a ee 1c 05 5f 91 e7 37 1e cb 06 ca 80 99 de 32 |...._..7.......2| +peer1.org2.example.com | 00000040 3f 11 60 17 0f ad 0f |?.`....| +peer1.org2.example.com | [65f 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [660 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 ed aa 23 9c 82 35 17 4d a2 e1 d1 |0D. (..#..5.M...| +peer1.org2.example.com | 00000010 40 9b 6e b0 63 e5 f2 93 2d 0a 84 c9 6b f6 38 01 |@.n.c...-...k.8.| +peer1.org2.example.com | 00000020 41 fa a4 29 02 20 5b b2 2e f5 9a 39 d2 6b 82 d2 |A..). [....9.k..| +peer1.org2.example.com | 00000030 ef 27 a4 36 cc 6e 14 f6 2b a9 59 19 65 f4 da fd |.'.6.n..+.Y.e...| +peer1.org2.example.com | 00000040 ee 1d 35 e0 8b 98 |..5...| +peer1.org2.example.com | [661 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [662 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [663 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [664 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [665 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [666 10-14 19:01:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [667 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.97Z grpc.peer_address=172.18.0.5:45620 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=106.2µs +peer1.org2.example.com | [668 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [669 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [66a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [66b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:45620 +peer1.org2.example.com | [66c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:45620 +peer1.org2.example.com | [66d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [66e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [66f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [670 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [671 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [672 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [673 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [674 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [675 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [676 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [677 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [678 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 gate 1602702069984821000 evaluation starts +peer1.org2.example.com | [679 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [67a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [67b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [67c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 principal evaluation fails +peer1.org2.example.com | [67d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f55e30 gate 1602702069984821000 evaluation fails +peer1.org2.example.com | [67e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [67f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [680 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [681 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 gate 1602702069986223000 evaluation starts +peer1.org2.example.com | [682 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [683 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [684 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 principal matched by identity 0 +peer1.org2.example.com | [685 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [686 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 25 28 58 3c 79 b9 3b 9a e3 8f |0E.!..%(X DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [5f0 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [5f1 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [5f2 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [5f3 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [5f4 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5f5 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5f6 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [5f7 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5f8 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5f9 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5fa 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5fb 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5fc 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5fd 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5fe 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 gate 1602702068931957800 evaluation starts +peer0.org2.example.com | [5ff 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [600 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [601 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 principal matched by identity 0 +peer0.org2.example.com | [602 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 ce 9d c7 43 65 26 31 8c ed 2d 2b c5 c9 a2 ea |....Ce&1..-+....| +peer0.org2.example.com | 00000010 d8 d5 14 56 b7 d5 2b 4b 04 b1 b6 18 42 a5 85 e9 |...V..+K....B...| +peer0.org2.example.com | [603 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ad da c1 ae 86 08 bb be 74 6a fe |0E.!.........tj.| +peer0.org2.example.com | 00000010 1c fa bf 5b 27 de e4 a6 f9 46 42 bb ec bb 89 34 |...['....FB....4| +peer0.org2.example.com | 00000020 15 bb 74 fd af 02 20 50 68 a8 0c 3c 09 8e fc 67 |..t... Ph..<...g| +peer0.org2.example.com | 00000030 13 06 1d 2f 92 9b 65 9c e6 c6 56 2e dc 77 82 4e |.../..e...V..w.N| +peer0.org2.example.com | 00000040 06 92 b0 a2 aa 70 d3 |.....p.| +peer0.org2.example.com | [604 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [605 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293a260 gate 1602702068931957800 evaluation succeeds +peer0.org2.example.com | [606 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [607 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [608 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [609 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [60a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [60b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1602702050573832200, 16 but got ts: inc_num:1602702050573832200 seq_num:9 +peer0.org2.example.com | [60c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [60d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [60e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [60f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [610 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [611 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [612 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [613 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [614 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [615 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [616 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [617 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [618 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [619 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [61a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [61b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [61c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [61d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [61e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [61f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [620 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [621 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [622 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 802 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [common.channelconfig] NewStandardValues -> DEBU 803 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 804 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [common.channelconfig] Validate -> DEBU 805 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [common.channelconfig] validateMSP -> DEBU 806 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [msp] newBccspMsp -> DEBU 807 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [msp] New -> DEBU 808 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.436 UTC [msp] Setup -> DEBU 809 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [msp.identity] newIdentity -> DEBU 80a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [common.channelconfig] NewStandardValues -> DEBU 80b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80c Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [common.channelconfig] NewStandardValues -> DEBU 80d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80e Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.437 UTC [common.channelconfig] Validate -> DEBU 80f Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:05.438 UTC [common.channelconfig] validateMSP -> DEBU 810 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.438 UTC [msp] newBccspMsp -> DEBU 811 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.438 UTC [msp] New -> DEBU 812 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.438 UTC [msp] Setup -> DEBU 813 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.438 UTC [msp.identity] newIdentity -> DEBU 814 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.439 UTC [common.channelconfig] NewStandardValues -> DEBU 815 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:05.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 816 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 817 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 818 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 819 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81a Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81b Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] NewStandardValues -> DEBU 81c Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81d Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] NewStandardValues -> DEBU 81e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81f Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [common.channelconfig] validateMSP -> DEBU 820 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [msp] newBccspMsp -> DEBU 821 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [msp] New -> DEBU 822 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.440 UTC [msp] Setup -> DEBU 823 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:05.441 UTC [msp.identity] newIdentity -> DEBU 824 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [msp] Setup -> DEBU 825 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [msp] Setup -> DEBU 826 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 827 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 828 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 829 Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org2.example.com | 00000040 cb 21 85 ea 08 f7 81 |.!.....| +peer1.org2.example.com | [687 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [688 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa63a0 gate 1602702069986223000 evaluation succeeds +peer1.org2.example.com | [689 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [68a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [68b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [68c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [68d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:45620 +peer1.org2.example.com | [68e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:45620 +peer1.org2.example.com | [68f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [690 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [691 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [692 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [693 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [694 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [695 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [696 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [697 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [698 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 gate 1602702069991456700 evaluation starts +peer1.org2.example.com | [699 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [69a 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [69b 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [69c 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 principal evaluation fails +peer0.org1.example.com | [591 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [592 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [593 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [594 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [595 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [596 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [597 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [598 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [599 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [59a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org1.example.com | [59b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [59c 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [59d 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [59e 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [59f 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [5a0 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [5a1 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0032e6580 env 0xc0031f7e00 txn 0 +peer0.org1.example.com | [5a2 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [5a3 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 96ms +peer0.org1.example.com | [5a4 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [5a5 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [5a6 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [5a7 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org1.example.com | [5a8 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [5a9 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [5aa 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [5ab 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org1.example.com | [5ac 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [5ad 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [5ae 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [5af 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [5b0 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [5b1 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [5b2 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [69d 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b270 gate 1602702069991456700 evaluation fails +peer1.org2.example.com | [69e 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [69f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6a0 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6a1 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 gate 1602702069997183800 evaluation starts +peer1.org2.example.com | [6a2 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6a3 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [6a4 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 principal matched by identity 0 +peer1.org2.example.com | [6a5 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [6a6 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [6a7 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6a8 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0b930 gate 1602702069997183800 evaluation succeeds +peer1.org2.example.com | [6a9 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6aa 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6ab 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6ac 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6ad 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6ae 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6af 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6b0 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [6b1 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6b2 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6b3 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 gate 1602702069998388800 evaluation starts +peer1.org2.example.com | [6b4 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6b5 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [6b6 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6b7 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 principal evaluation fails +peer1.org2.example.com | [6b8 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbe4c0 gate 1602702069998388800 evaluation fails +peer1.org2.example.com | [6b9 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6ba 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6bb 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6bc 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 gate 1602702069998767700 evaluation starts +peer1.org2.example.com | [6bd 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6be 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [6bf 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 principal matched by identity 0 +peer1.org2.example.com | [6c0 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | [623 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [624 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [625 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [626 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [627 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [628 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [629 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [62a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [62b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [62c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [62d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [62e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [62f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [630 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [631 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [632 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [633 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [634 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [635 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [636 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [637 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [638 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [639 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [63a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [63b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [63c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [63d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [63e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [63f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [640 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [641 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [642 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [643 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [644 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [645 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [646 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [647 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [648 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [649 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [64a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [64b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [64c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [64d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [64e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [64f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [650 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [651 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [652 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [653 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [654 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82a Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82b Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82c Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82d Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82e Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] GetPolicy -> DEBU 82f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 830 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] GetPolicy -> DEBU 831 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 832 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 833 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 834 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 835 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 836 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 837 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 838 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 839 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83c Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83d Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83e Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 83f Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84f Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 868 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 869 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 86b As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 86c As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.448 UTC [policies] Manager -> DEBU 86d Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 86e Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 86f Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 870 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 871 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 872 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 873 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 874 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 875 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 876 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 877 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 878 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 879 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 87a Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87c As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87d As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87e As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.capabilities] Supported -> DEBU 87f Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:05.450 UTC [common.capabilities] Supported -> DEBU 880 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:05.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 881 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:05.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 882 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:05.451 UTC [msp.identity] Sign -> DEBU 883 Sign: plaintext: 0AEA060A1B08011A0608F1959DFC0522...8043B4B41B91A09C99622C9AE4550824 " +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [msp.identity] Sign -> DEBU 884 Sign: digest: 95CC8808DB2345AC6DF1CF9675C26B838FF16A38164387492D22CAEBE12C91BA " +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 887 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 888 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 889 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:05.452 UTC [msp] DeserializeIdentity -> DEBU 88a Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [msp.identity] newIdentity -> DEBU 88b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [6c1 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [6c2 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6c3 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fbea30 gate 1602702069998767700 evaluation succeeds +peer1.org2.example.com | [6c4 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6c5 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6c6 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6c7 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6c8 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6c9 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ca 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6cb 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6cc 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6cd 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [6ce 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6cf 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [6d0 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6d1 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6d2 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [6d3 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6d4 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6d5 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 gate 1602702070025851600 evaluation starts +peer1.org2.example.com | [6d6 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6d7 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [6d8 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6d9 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 principal evaluation fails +peer1.org2.example.com | [6da 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa7ac0 gate 1602702070025851600 evaluation fails +peer1.org2.example.com | [6db 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6dc 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6dd 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6de 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 gate 1602702070027694900 evaluation starts +peer1.org2.example.com | [6df 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6e0 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [6e1 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 principal matched by identity 0 +peer1.org2.example.com | [6e2 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [6e3 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [6e4 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6e5 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fda030 gate 1602702070027694900 evaluation succeeds +peer1.org2.example.com | [6e6 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6e7 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6e8 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6e9 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6ea 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [cauthdsl] func1 -> DEBU 88c 0xc0004b6bf0 gate 1602702065453339500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [cauthdsl] func2 -> DEBU 88d 0xc0004b6bf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [cauthdsl] func2 -> DEBU 88e 0xc0004b6bf0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:05.453 UTC [msp] Validate -> DEBU 890 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:01:05.454 UTC [msp] getCertificationChain -> DEBU 891 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:05.454 UTC [cauthdsl] func2 -> DEBU 892 0xc0004b6bf0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:05.454 UTC [msp.identity] Verify -> DEBU 893 Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +orderer0.example.com | 00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..|" +orderer0.example.com | "2020-10-14 19:01:05.454 UTC [msp.identity] Verify -> DEBU 894 Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +orderer0.example.com | 00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +orderer0.example.com | 00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +orderer0.example.com | 00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +orderer0.example.com | 00000040 69 60 4d b6 27 ea |i`M.'.|" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [cauthdsl] func2 -> DEBU 895 0xc0004b6bf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [cauthdsl] func1 -> DEBU 896 0xc0004b6bf0 gate 1602702065453339500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 897 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 898 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 899 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89b Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [orderer.common.msgprocessor] Apply -> DEBU 89d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] NewStandardValues -> DEBU 89e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.456 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a6 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.456 UTC [common.channelconfig] NewStandardValues -> DEBU 8a7 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a8 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [common.channelconfig] NewStandardValues -> DEBU 8a9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8aa Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [common.channelconfig] Validate -> DEBU 8ab Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [common.channelconfig] validateMSP -> DEBU 8ac Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [msp] newBccspMsp -> DEBU 8ad Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [msp] New -> DEBU 8ae Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.457 UTC [msp] Setup -> DEBU 8af Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.458 UTC [msp.identity] newIdentity -> DEBU 8b0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | [655 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [656 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [657 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [658 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [659 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [65a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [65b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [65c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [65d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [65e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [65f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [660 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [661 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [662 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [663 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [664 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [665 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [666 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [667 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [668 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [669 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [66a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [66b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [66c 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [66d 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [66e 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [66f 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [670 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [671 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [672 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [673 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [674 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [675 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [676 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [677 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [6eb 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6ec 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ed 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ee 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [36m[6ef 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [6f0 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6f1 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f2 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f3 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6f4 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f5 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [6f6 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 06 10 b1 79 62 84 0d 61 60 04 91 da 78 03 4b |S...yb..a`...x.K| +peer1.org2.example.com | 00000010 84 05 0e 39 40 ad c9 28 f2 c1 b1 52 8a 90 82 b9 |...9@..(...R....| +peer1.org2.example.com | [6f7 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 21 cf 75 a9 a5 a2 db 2f f9 a2 |0E.!..!.u..../..| +peer1.org2.example.com | 00000010 ce 34 4b 9d 79 9c e2 30 54 f4 98 65 db 48 0e ce |.4K.y..0T..e.H..| +peer1.org2.example.com | 00000020 fc 44 3c 51 b1 02 20 5e 1b 7f c5 e3 89 05 fa 0d |.D..........s.| +peer1.org2.example.com | 00000040 06 1e 9a 70 a6 01 7b |...p..{| +peer1.org2.example.com | [6f8 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [6f9 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 ff da ce 0e 73 44 e0 ff 8c dc 34 |0D. 0....sD....4| +peer1.org2.example.com | 00000010 ab cf cc 50 89 fa b0 ef fa be 92 6a 04 6a d1 54 |...P.......j.j.T| +peer1.org2.example.com | 00000020 ab 93 8a dd 02 20 40 bd 9d 63 a9 aa 90 91 03 74 |..... @..c.....t| +peer1.org2.example.com | 00000030 b7 d1 fb 56 14 8a 62 6b e9 25 38 4d e1 81 47 07 |...V..bk.%8M..G.| +peer1.org2.example.com | 00000040 da 36 7b 54 7a 1d |.6{Tz.| +peer1.org2.example.com | [6fa 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6fb 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [6fc 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [6fd 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [6fe 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [6ff 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [700 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [701 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [702 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [703 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [704 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16100D +peer1.org2.example.com | [705 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A342A55D98DA91DC81CAAF2813D252ABA4CDEFBA607B8D58D04951DE9FB963BD +peer1.org2.example.com | [706 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [707 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [708 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [709 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [70a 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [70b 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [70c 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [70d 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > alive: > +peer1.org2.example.com | [70e 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [70f 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] NewStandardValues -> DEBU 8b3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] Validate -> DEBU 8b5 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [common.channelconfig] validateMSP -> DEBU 8b6 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [msp] newBccspMsp -> DEBU 8b7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [msp] New -> DEBU 8b8 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.459 UTC [msp] Setup -> DEBU 8b9 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.460 UTC [msp.identity] newIdentity -> DEBU 8ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] NewStandardValues -> DEBU 8bb Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8be Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bf Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c0 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [common.channelconfig] NewStandardValues -> DEBU 8c2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c3 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [common.channelconfig] NewStandardValues -> DEBU 8c4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c5 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [common.channelconfig] validateMSP -> DEBU 8c6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [msp] newBccspMsp -> DEBU 8c7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [msp] New -> DEBU 8c8 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.462 UTC [msp] Setup -> DEBU 8c9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:05.463 UTC [msp.identity] newIdentity -> DEBU 8ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.463 UTC [msp] Setup -> DEBU 8cb Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [msp] Setup -> DEBU 8cc MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8cd Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8ce Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8cf Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d1 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] GetPolicy -> DEBU 8d4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] GetPolicy -> DEBU 8d9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8dd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8de Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8df Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [678 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [679 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [67a 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [67b 10-14 19:01:08.93 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [67c 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [67d 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [67e 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [67f 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [680 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [681 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [682 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [683 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [684 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [685 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [686 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [687 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [688 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [689 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [68a 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [68b 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [68c 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [68d 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [68e 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [68f 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org2.example.com | [690 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [691 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [710 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [711 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [712 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [713 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 c9 b3 da 44 38 4e b4 ee af 71 ff 4c 4c b8 d8 |....D8N...q.LL..| +peer1.org2.example.com | 00000010 37 a7 e8 68 5f e1 72 84 93 c8 04 de ad a2 db 58 |7..h_.r........X| +peer1.org2.example.com | [714 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 ae 83 c0 d8 ed f5 66 84 c6 23 |0E.!........f..#| +peer1.org2.example.com | 00000010 70 7c 5d 2c d0 ad 92 9e 5b 99 84 92 19 d3 81 9f |p|],....[.......| +peer1.org2.example.com | 00000020 c6 66 cc 6b ea 02 20 1c f1 d8 bc 34 6f 12 b9 a2 |.f.k.. ....4o...| +peer1.org2.example.com | 00000030 38 2c 86 ef b4 53 86 93 b2 a1 aa 9a 4f b7 11 e7 |8,...S......O...| +peer1.org2.example.com | 00000040 16 5b 19 fb bf 5d 8e |.[...].| +peer1.org2.example.com | [715 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [716 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [717 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [718 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [719 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [71a 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71b 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71c 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71d 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.472 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 911 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39978" +orderer0.example.com | "2020-10-14 19:01:05.472 UTC [orderer.consensus.etcdraft] propose -> INFO 912 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:05.473 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 913 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:05.474 UTC [orderer.consensus.etcdraft] 2 -> DEBU 914 Proposed block [1] to raft consensus" channel=businesschannel node=1 +peer0.org2.example.com | [692 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [693 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [694 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [695 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [696 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [697 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [698 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [699 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [69a 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ee0450, CONNECTING +peer0.org2.example.com | [69b 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ee0450, READY +peer0.org2.example.com | [69c 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [69d 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [69e 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [69f 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [720 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [721 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [722 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16100E +peer1.org2.example.com | [723 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B979039FF62206EE9991B26DCE099A780948C81C691E0F2A04FADC14E9257DF +peer1.org2.example.com | [724 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [725 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [726 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [727 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [728 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [72a 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16100F +peer1.org2.example.com | [72c 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C2EF0130292F7688B224EDB86D3441213A0AE1C4CD7A30D443AF82FB648A13B +peer1.org2.example.com | [72d 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [729 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [72e 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [72f 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [72b 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [731 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [732 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [733 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [730 10-14 19:01:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [734 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [735 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [736 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [737 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [738 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [739 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [73a 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [73b 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [73c 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [73d 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [73e 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [73f 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [740 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [741 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 2e f0 13 02 92 f7 68 8b 22 4e db 86 d3 44 12 |\......h."N...D.| +peer1.org2.example.com | 00000010 13 a0 ae 1c 4c d7 a3 0d 44 3a f8 2f b6 48 a1 3b |....L...D:./.H.;| +peer1.org2.example.com | [742 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 4f 27 bd 80 22 e5 cb 79 e7 16 e8 |0D. .O'.."..y...| +peer1.org2.example.com | 00000010 40 c1 41 b8 51 76 cc 89 71 1d 73 76 16 aa 20 d3 |@.A.Qv..q.sv.. .| +peer1.org2.example.com | 00000020 eb cf f5 3b 02 20 79 37 9f 10 b8 2e 6b 81 0a 22 |...;. y7....k.."| +peer1.org2.example.com | 00000030 4d b7 6a ca b3 52 f4 6e e2 41 d5 bf a7 0a e0 30 |M.j..R.n.A.....0| +peer1.org2.example.com | 00000040 c5 b5 6c 81 17 72 |..l..r| +peer1.org2.example.com | [743 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [744 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 18 a5 08 9a 11 1a 14 8f ab 0d |0E.!............| +peer1.org2.example.com | 00000010 b0 7b d6 07 63 74 f9 64 76 d2 04 db aa 0c 3f 85 |.{..ct.dv.....?.| +peer1.org2.example.com | 00000020 64 6c f1 e0 12 02 20 6a e3 45 89 8e f8 56 f6 61 |dl.... j.E...V.a| +peer1.org2.example.com | 00000030 f4 b5 f4 49 cd 45 79 0b 32 64 e4 d9 5a 21 65 d6 |...I.Ey.2d..Z!e.| +peer1.org2.example.com | 00000040 a0 11 64 b5 fc 03 5f |..d..._| +peer1.org2.example.com | [745 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [746 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [747 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [748 10-14 19:01:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [749 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [74a 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found +peer0.org1.example.com | [5b3 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [5b4 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [5b5 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [5b6 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [5b7 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00357b100)} +peer0.org1.example.com | [5b8 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [5b9 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [5ba 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [5bb 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer0.org1.example.com | [5bc 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer0.org1.example.com | [5bd 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer0.org1.example.com | [5be 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer0.org1.example.com | [5bf 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +peer0.org1.example.com | txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +peer0.org1.example.com | ] +peer0.org1.example.com | [5c0 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to txid-index +peer0.org1.example.com | [5c1 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx number:[0] ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to blockNumTranNum index +peer0.org1.example.com | [5c2 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56677], isChainEmpty=[false], lastBlockNumber=[1] +peer0.org1.example.com | [5c3 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer0.org1.example.com | [5c4 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer0.org1.example.com | [5c5 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer0.org1.example.com | [5c6 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [5c7 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [5c8 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [5c9 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [5ca 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [5cb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [5cc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer0.org1.example.com | [5cd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer0.org1.example.com | [5ce 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer0.org1.example.com | [5cf 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [5d0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org1.example.com | [5d1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org1.example.com | [5d2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [5d3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer0.org1.example.com | [5d4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 19ms (state_validation=5ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer0.org1.example.com | [5d5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org1.example.com | [5d6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org1.example.com | [5d7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org1.example.com | [5d8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer0.org1.example.com | [5d9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer0.org1.example.com | [5da 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [5db 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00357b440 env 0xc0036a00f0 txn 0 +peer0.org1.example.com | [5dc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0036a00f0 +peer0.org1.example.com | [5dd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer0.org1.example.com | [5de 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [5df 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [6a0 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer0.org2.example.com | [6a1 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6a2 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6a3 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6a4 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6a5 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6a6 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [5e0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [5e1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5e2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [5e3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [5e4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [5e5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [5e6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [5e7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +peer0.org1.example.com | 00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2| +peer0.org1.example.com | [5e8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +peer0.org1.example.com | 00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +peer0.org1.example.com | 00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +peer0.org1.example.com | 00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +peer0.org1.example.com | 00000040 7f 4b 57 be 84 c8 e9 |.KW....| +peer0.org1.example.com | [5e9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [5ea 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0036b3500, header channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer0.org1.example.com | [5eb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [5ec 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [5ed 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [5ee 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5ef 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [5f0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5f1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5f2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5f3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [5f4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [5f5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5f6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [5f7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [5f8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5f9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5fa 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5fb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5fc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org1.example.com | [5fd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [5fe 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [5ff 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [600 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [601 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [602 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [603 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer0.org1.example.com | [604 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [605 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [606 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org1.example.com | [607 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [608 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [609 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [74b 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid +peer1.org2.example.com | [74c 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [74d 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [74e 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [74f 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found +peer1.org2.example.com | [750 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid +peer1.org2.example.com | [751 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [752 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [753 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [754 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [755 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [756 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5ea 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [5eb 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [5ec 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [5ed 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [5ee 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002b8dbc0)} +peer1.org1.example.com | [5ef 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [5f0 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [5f1 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [5f2 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org1.example.com | [5f3 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org1.example.com | [5f4 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org1.example.com | [5f5 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org1.example.com | [5f6 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +peer1.org1.example.com | txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +peer1.org1.example.com | ] +peer1.org1.example.com | [5f7 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to txid-index +peer1.org1.example.com | [5f8 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx number:[0] ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to blockNumTranNum index +peer1.org1.example.com | [5f9 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56677], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org1.example.com | [5fa 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org1.example.com | [5fb 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org1.example.com | [5fc 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org1.example.com | [5fd 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [5fe 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [5ff 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [600 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [601 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [602 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [603 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org1.example.com | [604 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org1.example.com | [605 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org1.example.com | [606 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [607 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org1.example.com | [608 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org1.example.com | [609 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [60a 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org1.example.com | [60b 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 28ms (state_validation=6ms block_and_pvtdata_commit=14ms state_commit=4ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org1.example.com | [60c 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org1.example.com | [60d 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org1.example.com | [60e 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org1.example.com | [60f 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org1.example.com | [610 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org1.example.com | [611 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [612 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002b8df00 env 0xc002c08aa0 txn 0 +peer1.org1.example.com | [613 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002c08aa0 +peer1.org1.example.com | [614 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer1.org1.example.com | [615 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [616 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [617 10-14 19:01:08.51 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [618 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [619 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [61a 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [61b 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [61c 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [61d 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [61e 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [grpc] warningf -> DEBU 915 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:39978: read: connection reset by peer" +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [orderer.common.broadcast] Handle -> WARN 916 Error reading from 172.18.0.9:39978: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [orderer.common.server] func1 -> DEBU 917 Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [comm.grpc.server] 1 -> INFO 918 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.0929ms +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [grpc] infof -> DEBU 919 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:05.479 UTC [common.deliver] Handle -> WARN 91a Error reading from 172.18.0.9:39976: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:05.480 UTC [orderer.common.server] func1 -> DEBU 91b Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:05.480 UTC [comm.grpc.server] 1 -> INFO 91c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39976 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.3878ms +orderer0.example.com | "2020-10-14 19:01:05.480 UTC [grpc] infof -> DEBU 91d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:05.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 91e Sending msg of 27266 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2020-10-14 19:01:05.482 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 91f Sending msg of 27266 bytes to 3 on channel businesschannel took 720.9µs" +orderer0.example.com | "2020-10-14 19:01:05.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 920 Send of ConsensusRequest for channel businesschannel with payload of size 27266 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +orderer0.example.com | "2020-10-14 19:01:05.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 921 Send of ConsensusRequest for channel businesschannel with payload of size 27266 to orderer1.example.com(orderer1.example.com:7050) took 85µs " +orderer0.example.com | "2020-10-14 19:01:05.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 922 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 923 Sending msg of 28 bytes to 2 on channel businesschannel took 13µs" +orderer0.example.com | "2020-10-14 19:01:05.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 924 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2020-10-14 19:01:05.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 925 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 572.8µs " +orderer0.example.com | "2020-10-14 19:01:05.490 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 926 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.493 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.493 UTC [common.configtx] addToMap -> DEBU 932 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 933 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 934 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 935 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [common.configtx] verifyDeltaSet -> DEBU 936 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [common.configtx] policyForItem -> DEBU 937 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 938 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 939 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93a Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93b Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 93e Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 93f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 940 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 941 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [policies] Evaluate -> DEBU 942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU 943 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 945 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " +orderer0.example.com | "2020-10-14 19:01:05.496 UTC [cauthdsl] func1 -> DEBU 944 0xc000cf1a90 gate 1602702065496254900 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 946 0xc000cf1a90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 947 0xc000cf1a90 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 948 0xc000cf1a90 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [msp.identity] Verify -> DEBU 949 Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +orderer0.example.com | 00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...|" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [msp.identity] Verify -> DEBU 94a Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +orderer0.example.com | 00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +orderer0.example.com | 00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +orderer0.example.com | 00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +orderer0.example.com | 00000040 4b 9a 28 c2 f7 c3 |K.(...|" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [cauthdsl] func2 -> DEBU 94b 0xc000cf1a90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [cauthdsl] func1 -> DEBU 94c 0xc000cf1a90 gate 1602702065496254900 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [policies] Evaluate -> DEBU 94d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [policies] Evaluate -> DEBU 94e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.498 UTC [common.configtx] verifyDeltaSet -> DEBU 94f Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 950 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.503 UTC [common.configtx] recurseConfigMap -> DEBU 951 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 952 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 953 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 954 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 955 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.505 UTC [common.configtx] recurseConfigMap -> DEBU 956 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.506 UTC [common.configtx] recurseConfigMap -> DEBU 957 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.506 UTC [common.configtx] recurseConfigMap -> DEBU 958 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.507 UTC [common.configtx] recurseConfigMap -> DEBU 959 Setting policy for key Admins to " +orderer0.example.com | "2020-10-14 19:01:05.508 UTC [common.configtx] recurseConfigMap -> DEBU 95a Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:01:05.508 UTC [common.configtx] recurseConfigMap -> DEBU 95b Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 960 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 961 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 962 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 963 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 964 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 965 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 966 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 967 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 968 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96c Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 96e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96f Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 970 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 971 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 972 Processing field: AnchorPeers" +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [60a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 gate 1602702068547646400 evaluation starts +peer0.org1.example.com | [60b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [60c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [60d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [60e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [60f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [610 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [611 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [612 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [613 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 principal matched by identity 0 +peer0.org1.example.com | [614 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +peer0.org1.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.| +peer0.org1.example.com | [615 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +peer0.org1.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +peer0.org1.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +peer0.org1.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +peer0.org1.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...| +peer0.org1.example.com | [616 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [617 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 gate 1602702068547646400 evaluation succeeds +peer0.org1.example.com | [618 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [619 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [61a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [61b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [61c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [61d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [61e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [61f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [620 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [621 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [622 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [623 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [624 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [625 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [626 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [627 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [628 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [629 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [62a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [62b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [62c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [62d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [62e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [62f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [630 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [631 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [632 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [633 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [634 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [635 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [636 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [637 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [638 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [639 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [63a 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [63b 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [63c 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [63d 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [63e 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [63f 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [640 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [641 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [642 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [643 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [644 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [645 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [646 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [647 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [648 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [649 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [64a 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [64b 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [64c 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [64d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [64e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [64f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [650 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [651 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [652 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [653 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [654 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [655 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [656 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [657 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [658 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [659 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [65a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [65b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [65c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | [757 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [758 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [759 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [75a 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [75b 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [75c 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [75d 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [75e 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [75f 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [760 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [761 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [762 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [763 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [764 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [765 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [766 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [767 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 973 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 974 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [common.channelconfig] Validate -> DEBU 975 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [common.channelconfig] validateMSP -> DEBU 976 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [msp] newBccspMsp -> DEBU 977 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [msp] New -> DEBU 978 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [msp] Setup -> DEBU 979 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.512 UTC [msp.identity] newIdentity -> DEBU 97a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.513 UTC [common.channelconfig] NewStandardValues -> DEBU 97b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97c Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.513 UTC [common.channelconfig] NewStandardValues -> DEBU 97d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97e Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [common.channelconfig] Validate -> DEBU 97f Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [common.channelconfig] validateMSP -> DEBU 980 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [msp] newBccspMsp -> DEBU 981 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [msp] New -> DEBU 982 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.514 UTC [msp] Setup -> DEBU 983 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.515 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] NewStandardValues -> DEBU 985 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 986 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 987 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 988 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 989 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98a Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98b Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.516 UTC [common.channelconfig] NewStandardValues -> DEBU 98c Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98d Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [common.channelconfig] NewStandardValues -> DEBU 98e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98f Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [common.channelconfig] validateMSP -> DEBU 990 Setting up MSP for org OrdererOrg" +peer0.org2.example.com | [6a7 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6a8 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [6a9 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [6aa 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [6ab 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [6ac 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [6ad 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 gate 1602702068968010600 evaluation starts +peer0.org2.example.com | [6ae 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [6af 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [6b0 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 principal matched by identity 0 +peer0.org2.example.com | [6b1 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [6b2 10-14 19:01:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 eb 2e cf 84 d3 28 a3 05 ec fb |0E.!.......(....| +peer0.org2.example.com | 00000010 ec 42 93 3b 78 15 25 a7 ff ba 50 67 5a b2 35 81 |.B.;x.%...PgZ.5.| +peer0.org2.example.com | 00000020 28 6f 92 b9 5f 02 20 44 52 92 f4 ef 42 d3 d1 8f |(o.._. DR...B...| +peer0.org2.example.com | 00000030 b5 1a 19 36 af 5f 1f 99 92 e1 5b 40 af 3e 86 03 |...6._....[@.>..| +peer0.org2.example.com | 00000040 a8 6c c3 d4 ed 90 d5 |.l.....| +peer0.org2.example.com | [6b3 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [6b4 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0ae50 gate 1602702068968010600 evaluation succeeds +peer0.org2.example.com | [6b5 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6b6 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6b7 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [6b8 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [6b9 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [6ba 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6bb 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [6bc 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16100C +peer0.org2.example.com | [6bd 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [6be 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92DFB8A8682CE015943263FDE53AACC3483DABDD760BBDD77DF5959731FE71E3 +peer0.org2.example.com | [6bf 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [6c0 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [6c1 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [6c2 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [6c3 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [6c4 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [6c5 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6c6 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [6c7 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [6c8 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [6c9 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer0.org2.example.com | [6ca 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [6cb 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002977c80 env 0xc00253b900 txn 0 +peer0.org2.example.com | [6cc 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [6cd 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [768 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [769 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [76a 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [76b 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [76c 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [76d 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 gate 1602702070604865500 evaluation starts +peer1.org2.example.com | [76e 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [76f 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [770 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [771 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 principal evaluation fails +peer1.org2.example.com | [772 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193310 gate 1602702070604865500 evaluation fails +peer1.org2.example.com | [773 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [774 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [775 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [776 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 gate 1602702070605556100 evaluation starts +peer1.org2.example.com | [777 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [778 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [779 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 principal matched by identity 0 +peer1.org2.example.com | [77a 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer1.org2.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer1.org2.example.com | [77b 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +peer1.org2.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer1.org2.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer1.org2.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer1.org2.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer1.org2.example.com | [77c 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [77d 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003193890 gate 1602702070605556100 evaluation succeeds +peer1.org2.example.com | [77e 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [77f 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [780 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [781 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [782 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [783 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1602702050573832200 17 {} [] 0} +peer1.org2.example.com | [784 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [785 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [786 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [787 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [788 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [789 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [78a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [78b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org2.example.com | [78d 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [78c 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > alive: alive: +peer1.org1.example.com | 00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2| +peer1.org1.example.com | [61f 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +peer1.org1.example.com | 00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +peer1.org1.example.com | 00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +peer1.org1.example.com | 00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +peer1.org1.example.com | 00000040 7f 4b 57 be 84 c8 e9 |.KW....| +peer1.org1.example.com | [620 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [621 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003177500, header channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +peer1.org1.example.com | [622 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [623 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [624 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [625 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [626 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [627 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [628 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [629 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [62a 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [62b 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [62c 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [62d 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [62e 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [62f 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [630 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [631 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [632 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [633 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org1.example.com | [634 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [635 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [636 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [637 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [638 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [msp] newBccspMsp -> DEBU 991 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [msp] New -> DEBU 992 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:05.517 UTC [msp] Setup -> DEBU 993 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:05.518 UTC [msp.identity] newIdentity -> DEBU 994 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:05.519 UTC [msp] Setup -> DEBU 995 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:05.519 UTC [msp] Setup -> DEBU 996 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:05.519 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.519 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] GetPolicy -> DEBU 9a0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] GetPolicy -> DEBU 9a2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a3 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a4 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a8 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a9 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9aa Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ab Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ac Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ad Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ae Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [65d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [65e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [65f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [660 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [661 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [662 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [663 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [664 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [665 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [666 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [667 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [668 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [669 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [66a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [66b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [66c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [66d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [66e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [66f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [670 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [671 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [672 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [673 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [674 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [675 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [676 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [677 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [678 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [679 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [67a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [67b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [67c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [67d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [67e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [67f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [680 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [681 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [682 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [683 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [684 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [685 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [686 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [687 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [688 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [689 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [68a 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [68b 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [68c 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [78e 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [78f 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [790 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [791 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [792 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [793 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [794 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [795 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [796 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [797 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [798 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [799 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 gate 1602702070640269200 evaluation starts +peer1.org2.example.com | [79a 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [79b 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [79c 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [79d 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 principal evaluation fails +peer1.org2.example.com | [79e 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3490 gate 1602702070640269200 evaluation fails +peer1.org2.example.com | [79f 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7a0 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7a1 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7a2 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 gate 1602702070641855300 evaluation starts +peer1.org2.example.com | [7a3 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7a4 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [7a5 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 principal matched by identity 0 +peer1.org2.example.com | [7a6 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 5b 43 b3 98 c3 2b 83 3e 57 3d 0f 4a a5 a9 2a |.[C...+.>W=.J..*| +peer1.org2.example.com | 00000010 9e 2f 3d a1 98 2d f9 3f 49 4a 69 87 cf 3f c8 b2 |./=..-.?IJi..?..| +peer1.org2.example.com | [7a7 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 9b 46 40 42 a6 42 c5 8c 46 dc |0E.!...F@B.B..F.| +peer1.org2.example.com | 00000010 e6 9f 86 17 2f 23 b5 78 25 7b 8b fd f8 e7 05 0e |..../#.x%{......| +peer1.org2.example.com | 00000020 d2 1c 09 3d 58 02 20 5e 61 79 5f 39 e7 89 6e 7c |...=X. ^ay_9..n|| +peer1.org2.example.com | 00000030 75 c6 a9 be a9 c6 d4 52 d6 e9 46 2b 37 f8 65 08 |u......R..F+7.e.| +peer1.org2.example.com | 00000040 73 20 96 5d 58 33 30 |s .]X30| +peer1.org2.example.com | [7a8 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7a9 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b3a00 gate 1602702070641855300 evaluation succeeds +peer1.org2.example.com | [7aa 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7ab 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7ac 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7ad 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7ae 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [6ce 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 69ms +peer0.org2.example.com | [6cf 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer0.org2.example.com | [6d0 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org2.example.com | [6d1 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [6d2 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [6d3 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [6d4 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [6d5 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [6d6 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [6d7 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org2.example.com | [6d8 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [6d9 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [6da 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [6db 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org2.example.com | [6dc 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [6dd 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [6de 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [6df 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [6e0 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [6e1 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [6e2 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [68d 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [68e 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [68f 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [690 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [691 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [692 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [693 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [694 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [695 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [696 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [697 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [698 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [699 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [69a 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [69b 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [69c 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [69d 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [69e 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [69f 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [6a0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [6a1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [6a2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [6a3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [6a4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [6a5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [6a6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [6a7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [6a8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [6a9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [6aa 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [6ab 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [6ac 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [6ad 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [6ae 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [6af 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [6b0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [6b1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [6b2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [6b3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [6b4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [6b5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [6b6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [6b7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [6b8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [6b9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [6ba 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [6bb 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [6bc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [6bd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [6be 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [6bf 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6c0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6c1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6c2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [639 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [63a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org1.example.com | [63b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [63c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [63d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org1.example.com | [63e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [63f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [640 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [641 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 gate 1602702068540955200 evaluation starts +peer1.org1.example.com | [642 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [643 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [644 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [645 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [646 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [647 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [648 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [649 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [64a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 principal matched by identity 0 +peer1.org1.example.com | [64b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +peer1.org1.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.| +peer1.org1.example.com | [64c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +peer1.org1.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +peer1.org1.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +peer1.org1.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +peer1.org1.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...| +peer1.org1.example.com | [64d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [64e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002aa4d40 gate 1602702068540955200 evaluation succeeds +peer1.org1.example.com | [64f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [650 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [651 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [652 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [653 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [654 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [655 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [656 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [657 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:05.527 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:05.527 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:05.528 UTC [common.configtx] addToMap -> DEBU 9d0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:05.528 UTC [common.configtx] addToMap -> DEBU 9d1 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d3 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d5 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d7 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d8 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:05.531 UTC [common.configtx] addToMap -> DEBU 9d9 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:05.531 UTC [common.configtx] addToMap -> DEBU 9da Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:05.532 UTC [common.channelconfig] LogSanityChecks -> DEBU 9db As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [common.channelconfig] LogSanityChecks -> DEBU 9dc As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9dd Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9de Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9df Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e0 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e1 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e2 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e4 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e5 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:01:05.534 UTC [policies] Manager -> DEBU 9e6 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e7 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e8 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e9 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9ea Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [common.channelconfig] LogSanityChecks -> DEBU 9eb As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:01:05.535 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ec As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:01:05.536 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ed As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:01:05.536 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ee As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:01:05.536 UTC [common.capabilities] Supported -> DEBU 9ef Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:05.536 UTC [common.capabilities] Supported -> DEBU 9f0 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:05.536 UTC [orderer.common.server] func1 -> DEBU 9f1 Executing callback to update root CAs" +orderer0.example.com | "2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f2 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f3 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f4 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f5 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-10-14 19:01:05.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9f6 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2020-10-14 19:01:05.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9f7 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2020-10-14 19:01:05.538 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f8 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:05.539 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f9 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:05.539 UTC [msp.identity] Sign -> DEBU 9fa Sign: plaintext: 0A020801120B0A090A03010203100418...9F8A9CB867850C906CF84D92ED5192DD " +orderer0.example.com | "2020-10-14 19:01:05.539 UTC [msp.identity] Sign -> DEBU 9fb Sign: digest: 48A3FB2223D005174A2AC804628224A55755498C9936ECFCA12DA0565AFF0CD7 " +orderer0.example.com | "2020-10-14 19:01:05.542 UTC [fsblkstorage] indexBlock -> DEBU 9fc Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +orderer0.example.com | txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:05.544 UTC [fsblkstorage] updateCheckpoint -> DEBU 9fd Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56641], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-10-14 19:01:05.544 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9fe [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2020-10-14 19:01:05.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ff Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +orderer0.example.com | "2020-10-14 19:01:05.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.9µs " +orderer0.example.com | "2020-10-14 19:01:05.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a02 Sending msg of 28 bytes to 3 on channel businesschannel took 44µs" +orderer0.example.com | "2020-10-14 19:01:05.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a03 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-10-14 19:01:05.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU a04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 243.5µs " +orderer0.example.com | "2020-10-14 19:01:05.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 794µs " +orderer0.example.com | "2020-10-14 19:01:05.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:05.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [658 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [659 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [7af 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [7b0 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [7b1 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [7b2 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [7b3 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7b4 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7b5 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7b6 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7b7 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7b8 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7b9 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7ba 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [7bb 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [7bc 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7bd 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [7be 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [7bf 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7c0 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [7c1 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7c2 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7c3 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7c4 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7c5 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7c6 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7c7 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7c8 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [7c9 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [7ca 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7cb 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7cc 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [7cd 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [7ce 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [7cf 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7d0 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [7d1 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 gate 1602702070704030700 evaluation starts +peer1.org2.example.com | [7d2 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7d3 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [7d4 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +orderer0.example.com | "2020-10-14 19:01:06.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:06.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 3 on channel testchainid took 716.8µs" +orderer0.example.com | "2020-10-14 19:01:06.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.4µs " +orderer0.example.com | "2020-10-14 19:01:06.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0b Sending msg of 28 bytes to 2 on channel businesschannel took 48.2µs" +orderer0.example.com | "2020-10-14 19:01:06.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0c Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:01:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 568.3µs " +orderer0.example.com | "2020-10-14 19:01:06.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:06.196 UTC [orderer.common.cluster.step] handleMessage -> DEBU a10 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 604.1µs " +orderer0.example.com | "2020-10-14 19:01:06.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU a11 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:06.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel testchainid took 180.2µs" +orderer0.example.com | "2020-10-14 19:01:06.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.8µs " +orderer0.example.com | "2020-10-14 19:01:06.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a14 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2020-10-14 19:01:06.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a15 Sending msg of 28 bytes to 3 on channel businesschannel took 35.2µs" +orderer0.example.com | "2020-10-14 19:01:06.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0952ms " +orderer0.example.com | "2020-10-14 19:01:06.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +orderer0.example.com | "2020-10-14 19:01:06.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU a18 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:06.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU a19 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU a1a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1b Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2020-10-14 19:01:07.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU a1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +orderer0.example.com | "2020-10-14 19:01:07.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1d Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +orderer0.example.com | "2020-10-14 19:01:07.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1e Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2020-10-14 19:01:07.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU a1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 548.9µs " +orderer0.example.com | "2020-10-14 19:01:07.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 734.3µs " +peer0.org1.example.com | [6c3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [6c4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6c5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [6c6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 gate 1602702068573307900 evaluation starts +peer0.org1.example.com | [6c7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6c8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [6c9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [6ca 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [6cb 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [6cc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 principal matched by identity 0 +peer0.org1.example.com | [6cd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [6ce 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [6cf 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [6d0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 gate 1602702068573307900 evaluation succeeds +peer1.org1.example.com | [65a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [65b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [65c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [65d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [65e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [65f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [660 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [661 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [662 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [663 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [664 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [665 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [666 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [667 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [668 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [669 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [66a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [66b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [66c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [66d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [66e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [66f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [670 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [671 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [672 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [673 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [674 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [675 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [676 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [677 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [678 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [679 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [67a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [67b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [67c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [67d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [67e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [67f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [680 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [681 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [682 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [683 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [684 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [685 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [686 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [6d1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6d2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6d3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [6d4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [6d5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [6d6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [6d7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [6d8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [6d9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [6da 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [6dc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [6dd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [6de 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [6df 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [6e0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003802830, CONNECTING +peer0.org1.example.com | [6db 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [6e1 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org1.example.com | [6e2 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [6e3 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003802830, READY +peer0.org1.example.com | [6e4 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [6e5 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [6e6 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [6e7 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [6e8 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [6e9 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [6ea 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [6eb 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [6ec 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [6ed 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00357b440 env 0xc0036a00f0 txn 0 +peer0.org1.example.com | [6ee 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [6ef 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 78ms +peer0.org1.example.com | [6f0 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [6f1 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [6f2 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [6f3 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org1.example.com | [6f4 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [6f5 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [6f6 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [6f7 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org1.example.com | [6f8 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [6f9 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [6fa 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [6fb 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +orderer0.example.com | "2020-10-14 19:01:07.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU a21 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU a22 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU a23 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a24 Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +orderer0.example.com | "2020-10-14 19:01:07.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU a25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 488µs " +orderer0.example.com | "2020-10-14 19:01:07.652 UTC [orderer.common.server] Deliver -> DEBU a26 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:01:07.652 UTC [common.deliver] Handle -> DEBU a27 Starting new deliver loop for 172.18.0.9:39980" +orderer0.example.com | "2020-10-14 19:01:07.652 UTC [common.deliver] Handle -> DEBU a28 Attempting to read seek info message from 172.18.0.9:39980" +orderer0.example.com | "2020-10-14 19:01:07.670 UTC [orderer.common.server] Broadcast -> DEBU a29 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:01:07.670 UTC [orderer.common.broadcast] Handle -> DEBU a2a Starting new broadcast loop for 172.18.0.9:39982" +orderer0.example.com | "2020-10-14 19:01:07.670 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a2b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39982" +orderer0.example.com | "2020-10-14 19:01:07.670 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a2c Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.671 UTC [msp] DeserializeIdentity -> DEBU a32 Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:07.672 UTC [msp.identity] newIdentity -> DEBU a33 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func1 -> DEBU a34 0xc00112a200 gate 1602702067673376800 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a35 0xc00112a200 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a36 0xc00112a200 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a37 0xc00112a200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a38 0xc00112a200 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [cauthdsl] func1 -> DEBU a39 0xc00112a200 gate 1602702067673376800 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [policies] Evaluate -> DEBU a3a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.673 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.674 UTC [policies] Evaluate -> DEBU a3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.674 UTC [cauthdsl] func1 -> DEBU a3d 0xc00112b3c0 gate 1602702067674249400 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.674 UTC [cauthdsl] func2 -> DEBU a3e 0xc00112b3c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.674 UTC [cauthdsl] func2 -> DEBU a3f 0xc00112b3c0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.674 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a40 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.675 UTC [msp] Validate -> DEBU a41 MSP Org2MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:07.675 UTC [msp] getCertificationChain -> DEBU a42 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:07.675 UTC [cauthdsl] func2 -> DEBU a43 0xc00112b3c0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:07.675 UTC [msp.identity] Verify -> DEBU a44 Verify: digest = 00000000 3b 3e a7 70 ea 7c 96 2d 8c b0 f9 fa c1 23 86 f2 |;>.p.|.-.....#..| +orderer0.example.com | 00000010 65 c6 64 30 19 7d 89 3b fd 91 5c b3 b3 8e 34 a3 |e.d0.}.;..\...4.|" +orderer0.example.com | "2020-10-14 19:01:07.675 UTC [msp.identity] Verify -> DEBU a45 Verify: sig = 00000000 30 45 02 21 00 91 7a 88 c9 0c 27 ca 81 41 a5 be |0E.!..z...'..A..| +orderer0.example.com | 00000010 67 55 12 e7 3f e5 c0 16 d2 3b e9 56 b0 11 55 86 |gU..?....;.V..U.| +orderer0.example.com | 00000020 d6 2d c0 7a 9e 02 20 76 58 f7 2b da f6 bf e2 e8 |.-.z.. vX.+.....| +orderer0.example.com | 00000030 d5 fd 62 f1 e6 57 84 d4 d9 b6 24 b7 06 dd 0d 1c |..b..W....$.....| +orderer0.example.com | 00000040 59 da 19 97 ef d9 74 |Y.....t|" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [cauthdsl] func2 -> DEBU a46 0xc00112b3c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [cauthdsl] func1 -> DEBU a47 0xc00112b3c0 gate 1602702067674249400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4a Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer1.org1.example.com | [687 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [688 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [689 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [68a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [68b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [68c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [68d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [68e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [68f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [690 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [691 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [692 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [693 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [694 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [695 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [696 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [697 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [698 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [699 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [69a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [69b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [69c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [69d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [69e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [69f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [6a0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [6a1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [6a2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [6a3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [6fc 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer0.org1.example.com | [6fe 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6fd 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [6ff 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [701 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [700 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [702 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [703 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [704 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [705 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [707 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [708 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [709 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [70a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6a4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [6a5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6a6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6a7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6a8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [6a9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [6aa 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [6ab 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [6ac 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [6ad 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [6ae 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [6af 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [6b0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [6b1 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [6b2 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [6b3 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [6b4 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [6b5 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6b6 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [6b7 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [6b8 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [6b9 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [6ba 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [6bb 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [6bc 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6bd 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [6be 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [6bf 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [6c0 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [6c1 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [6c2 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [6c3 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [6c4 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [6c5 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6c6 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [6c7 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [6c8 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [6c9 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [6ca 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [6cb 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [6cc 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [6cd 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [6ce 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [6cf 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [6d0 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [6d1 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [6d2 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [6d3 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [6d4 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [6d5 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [6d6 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [6d7 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [6d8 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [6d9 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [6da 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [6db 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [6dc 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [6dd 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [6de 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6df 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6e0 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [6e1 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [6e2 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [6e3 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [6e4 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [6e5 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [6e6 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [6e7 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6e8 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6e9 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [6ea 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [6eb 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [6ec 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [6ed 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [6ee 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [6ef 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [6f0 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [6f1 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [6f2 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [6f3 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [6f4 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [6f5 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [6f6 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6f7 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6f8 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [6f9 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [6fa 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [6fb 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6fc 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [6fd 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 gate 1602702068558654000 evaluation starts +peer1.org1.example.com | [6fe 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6ff 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [700 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [701 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [702 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [703 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 principal matched by identity 0 +peer1.org1.example.com | [704 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer1.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer1.org1.example.com | [705 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +peer1.org1.example.com | 00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +peer1.org1.example.com | 00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +peer1.org1.example.com | 00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +peer1.org1.example.com | 00000040 05 90 52 6c a0 f6 |..Rl..| +peer1.org1.example.com | [706 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [707 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1ca0 gate 1602702068558654000 evaluation succeeds +peer1.org1.example.com | [708 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [709 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [70a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [70b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [70c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [70d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [70e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [70f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [710 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [711 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [712 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [713 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [714 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [715 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [716 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [717 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [718 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [719 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031b7130, CONNECTING +peer1.org1.example.com | [71a 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [71b 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [71c 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [71d 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [71e 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031e8910, CONNECTING +peer1.org1.example.com | [71f 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031b7130, READY +peer1.org1.example.com | [720 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [721 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [722 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [723 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [724 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org1.example.com | [725 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [726 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [727 10-14 19:01:08.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +orderer0.example.com | "2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4c Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [policies] Evaluate -> DEBU a4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [common.configtx] verifyDeltaSet -> DEBU a5d Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [common.configtx] policyForItem -> DEBU a5e Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a5f Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a60 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a61 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a62 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a63 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a64 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a65 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a66 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [policies] Manager -> DEBU a67 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [policies] Manager -> DEBU a68 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [policies] Evaluate -> DEBU a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [cauthdsl] func1 -> DEBU a6a 0xc00115a120 gate 1602702067680644200 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [cauthdsl] func2 -> DEBU a6b 0xc00115a120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.680 UTC [cauthdsl] func2 -> DEBU a6c 0xc00115a120 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.681 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6d Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.681 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6e Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.681 UTC [msp] Validate -> DEBU a6f MSP Org2MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:07.682 UTC [msp] getCertificationChain -> DEBU a70 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:07.682 UTC [msp] hasOURole -> DEBU a71 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2020-10-14 19:01:07.682 UTC [msp] getCertificationChain -> DEBU a72 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [cauthdsl] func2 -> DEBU a73 0xc00115a120 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [msp.identity] Verify -> DEBU a74 Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +orderer0.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.|" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [msp.identity] Verify -> DEBU a75 Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +orderer0.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +orderer0.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +orderer0.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +orderer0.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...|" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [cauthdsl] func2 -> DEBU a76 0xc00115a120 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [cauthdsl] func1 -> DEBU a77 0xc00115a120 gate 1602702067680644200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [policies] Evaluate -> DEBU a78 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [policies] Evaluate -> DEBU a79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.683 UTC [common.configtx] verifyDeltaSet -> DEBU a7a Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to " +peer1.org2.example.com | [7d5 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [7d6 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [7d7 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 principal matched by identity 0 +peer1.org2.example.com | [7d8 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [7d9 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [7da 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7db 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c7c50 gate 1602702070704030700 evaluation succeeds +peer1.org2.example.com | [7dc 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7dd 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7de 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7df 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7e0 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7e1 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7e2 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [7e3 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7e4 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7e5 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7e6 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7e7 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [7e8 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [7e9 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7ea 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7eb 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [7ed 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4F3E4C58EA1FC9E16...A55D1049CA35F5343DC503CE2A020803 +peer1.org2.example.com | [7ec 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7ee 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org2.example.com | [7ef 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2EEB10A2A1A374127832EBD4CA4F68274C043DB995B9CA51006999D0D28AAA1D +peer1.org2.example.com | [7f0 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7f2 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f1 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7f3 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7f5 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [7f6 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7f7 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [7f8 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [7f9 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f4 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7fa 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [7fb 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fc 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fd 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fe 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [7ff 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [800 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [801 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [803 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [804 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [805 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [806 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [802 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [807 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [808 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [809 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 gate 1602702070990092500 evaluation starts +peer1.org2.example.com | [80a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [80b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [80c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [80d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 principal evaluation fails +peer1.org2.example.com | [80e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226060 gate 1602702070990092500 evaluation fails +peer1.org2.example.com | [80f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [810 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [811 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [812 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 gate 1602702070991015800 evaluation starts +peer1.org2.example.com | [813 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [814 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [815 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 principal matched by identity 0 +peer1.org2.example.com | [816 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [817 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [818 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [819 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032265d0 gate 1602702070991015800 evaluation succeeds +peer1.org2.example.com | [81a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [81b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [81c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [81d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [6e3 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [6e4 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [6e5 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [6e6 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [6e7 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00278eac0)} +peer0.org2.example.com | [6e8 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [6e9 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [6ea 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [6eb 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org2.example.com | [6ec 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org2.example.com | [6ed 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org2.example.com | [6ee 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org2.example.com | [6ef 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +peer0.org2.example.com | txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +peer0.org2.example.com | ] +peer0.org2.example.com | [6f0 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to txid-index +peer0.org2.example.com | [6f1 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx number:[0] ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to blockNumTranNum index +peer0.org2.example.com | [6f2 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org2.example.com | [6f3 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org2.example.com | [6f4 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org2.example.com | [6f5 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org2.example.com | [6f6 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [6f7 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [6f8 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [6f9 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [6fa 10-14 19:01:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [6fb 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [6fc 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org2.example.com | [6fd 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org2.example.com | [6ff 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [6fe 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org2.example.com | [700 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org2.example.com | [701 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org2.example.com | [702 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [703 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org2.example.com | [704 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 19ms (state_validation=5ms block_and_pvtdata_commit=9ms state_commit=2ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org2.example.com | [705 10-14 19:01:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org2.example.com | [706 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.242Z grpc.peer_address=172.18.0.6:39144 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=185.9µs +peer0.org2.example.com | [707 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [708 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [709 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [70a 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [70d 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [70e 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [70f 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [710 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer1.org2.example.com | [81e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer1.org2.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer1.org2.example.com | [81f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [820 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer1.org2.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer1.org2.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer1.org2.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer1.org2.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer1.org2.example.com | [821 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [822 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org2.example.com | [823 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [824 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [825 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [826 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes +peer1.org2.example.com | [827 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [828 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [829 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [82a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [82b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [82c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [82d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [82e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [82f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 gate 1602702070994909000 evaluation starts +peer1.org2.example.com | [830 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [831 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [832 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [833 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 principal evaluation fails +peer1.org2.example.com | [834 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003262140 gate 1602702070994909000 evaluation fails +peer1.org2.example.com | [835 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [836 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [837 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [838 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 gate 1602702070995185500 evaluation starts +peer1.org2.example.com | [839 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [83a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [83b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 principal matched by identity 0 +peer1.org2.example.com | [83c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [83d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [83e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [83f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032626b0 gate 1602702070995185500 evaluation succeeds +peer1.org2.example.com | [840 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [841 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [842 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [843 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [844 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ����)�����H�5���K��q���2���( +peer1.org2.example.com | [845 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [846 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [847 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [848 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [849 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [84a 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [84b 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [84c 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [84d 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [84e 10-14 19:01:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org2.example.com | [84f 10-14 19:01:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [850 10-14 19:01:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [851 10-14 19:01:11.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [852 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13825783162752861548, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [853 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13825783162752861548, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [854 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org2.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org2.example.com | [855 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f3 fb 62 7f 87 11 4b 34 63 d3 |0E.!....b...K4c.| +peer1.org2.example.com | 00000010 01 62 92 3f c2 b1 6a 9e d0 4f f1 b0 1a 5d 14 4e |.b.?..j..O...].N| +peer1.org2.example.com | 00000020 a8 c9 af 1f 14 02 20 65 85 bd 39 de 1a e7 83 71 |...... e..9....q| +peer1.org2.example.com | 00000030 d2 6a 00 2f 3f f8 77 35 68 a3 6d de c2 70 81 18 |.j./?.w5h.m..p..| +peer1.org2.example.com | 00000040 37 2e ac 89 e0 37 6b |7....7k| +peer1.org2.example.com | [856 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13825783162752861548, Envelope: 962 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a81 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a82 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a83 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a84 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a85 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a86 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a87 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a88 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a89 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a8a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a8b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a92 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a93 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a94 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a95 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] NewStandardValues -> DEBU a96 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a97 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a98 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.689 UTC [common.channelconfig] NewStandardValues -> DEBU a99 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.689 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.689 UTC [common.channelconfig] NewStandardValues -> DEBU a9b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.689 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.689 UTC [common.channelconfig] Validate -> DEBU a9d Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.690 UTC [common.channelconfig] validateMSP -> DEBU a9e Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.690 UTC [msp] newBccspMsp -> DEBU a9f Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.690 UTC [msp] New -> DEBU aa0 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.690 UTC [msp] Setup -> DEBU aa1 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +orderer0.example.com | "2020-10-14 19:01:07.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa3 Sending msg of 28 bytes to 3 on channel businesschannel took 41.5µs" +orderer0.example.com | "2020-10-14 19:01:07.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 861.2µs " +orderer0.example.com | "2020-10-14 19:01:07.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " +orderer0.example.com | "2020-10-14 19:01:07.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.695 UTC [msp.identity] newIdentity -> DEBU aa7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.697 UTC [common.channelconfig] NewStandardValues -> DEBU aa9 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.697 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaa Processing field: AnchorPeers" +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [728 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [729 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [72a 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [72b 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [711 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c bd 39 80 02 50 35 0d 60 3e dd ef |0D. l.9..P5.`>..| +peer0.org2.example.com | 00000010 5d 95 51 1b 4c 30 cf 1f 00 79 af c8 3d 98 10 c5 |].Q.L0...y..=...| +peer0.org2.example.com | 00000020 d6 f4 87 69 02 20 75 8d 0f 20 46 7c 22 63 20 77 |...i. u.. F|"c w| +peer0.org2.example.com | 00000030 3f 5f f8 25 97 ba 73 e3 65 0f c1 02 4c 64 05 7b |?_.%..s.e...Ld.{| +peer0.org2.example.com | 00000040 19 78 6d ec 63 c3 |.xm.c.| +peer0.org2.example.com | [712 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:39144 +peer0.org2.example.com | [713 10-14 19:01:09.24 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:39144 +peer0.org2.example.com | [714 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [715 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:39144 disconnected +peer0.org2.example.com | [716 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [717 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:19.243Z grpc.peer_address=172.18.0.6:39144 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.674ms +peer0.org2.example.com | [718 10-14 19:01:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [719 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.295Z grpc.peer_address=172.18.0.6:39148 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=93.7µs +peer0.org2.example.com | [71a 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [71b 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [71c 10-14 19:01:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [71d 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [720 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 8e 59 d4 28 3b 17 d3 66 de 73 fb |0D. H.Y.(;..f.s.| +peer0.org2.example.com | 00000010 d9 f3 29 1a 73 34 f2 50 56 f7 2a 1d db b7 8a c1 |..).s4.PV.*.....| +peer0.org2.example.com | 00000020 73 44 3b d6 02 20 6b f8 f8 fc 0f 1c fb a7 27 07 |sD;.. k.......'.| +peer0.org2.example.com | 00000030 49 8e 15 32 eb ae ce b8 8f ea be c6 70 a1 cc 91 |I..2........p...| +peer0.org2.example.com | 00000040 b8 c1 6e e4 b6 d9 |..n...| +peer0.org2.example.com | [721 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:39148 +peer0.org2.example.com | [722 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:39148 +peer0.org2.example.com | [723 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:117636673158108147 tag:EMPTY mem_req:\331\312\376\345\304 J7\357\332\301" > > > , Envelope: 281 bytes, Signature: 0 bytes +peer0.org2.example.com | [724 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [725 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:117636673158108147 tag:EMPTY mem_req:\331\312\376\345\304 J7\357\332\301" > > > , Envelope: 281 bytes, Signature: 0 bytes +peer0.org2.example.com | [726 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [727 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 82 d4 d0 0a fd e5 db 4e 2f 73 cf ec 63 dd 5c |a.......N/s..c.\| +peer0.org2.example.com | 00000010 f9 db 2b 74 78 f4 93 73 b9 6f b9 31 a3 27 e2 98 |..+tx..s.o.1.'..| +peer0.org2.example.com | [728 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb bc 13 e6 52 2d 84 52 f9 ec 4b |0E.!.....R-.R..K| +peer0.org2.example.com | 00000010 4d 25 1b 6c dd 85 60 84 df 31 71 95 d6 ad ed 92 |M%.l..`..1q.....| +peer0.org2.example.com | 00000020 00 60 ec 12 1e 02 20 65 4b 6a cb 33 5a 90 85 39 |.`.... eKj.3Z..9| +peer0.org2.example.com | 00000030 e4 0b 12 8b 6c 4d f7 64 fd b4 2f 17 89 c1 c2 f3 |....lM.d../.....| +peer0.org2.example.com | 00000040 dc 6c dd 53 3a de 37 |.l.S:.7| +peer0.org2.example.com | [729 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [72a 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 72 55 df ae d9 6a 2c 58 c9 55 e4 |0D. KrU...j,X.U.| +peer0.org2.example.com | 00000010 32 1e b3 a6 13 a8 07 cd 9d 5a 35 d7 ae 81 2a 43 |2........Z5...*C| +peer0.org2.example.com | 00000020 da b5 64 27 02 20 7a ce 5c 67 ca f9 14 f9 43 ec |..d'. z.\g....C.| +peer0.org2.example.com | 00000030 86 49 36 b9 0e 3d 02 7d 31 ba 3e d9 ca fe e5 c4 |.I6..=.}1.>.....| +peer0.org2.example.com | 00000040 20 4a 37 ef da c1 | J7...| +peer0.org2.example.com | [72b 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [72c 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +peer0.org2.example.com | [72d 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [72e 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [72f 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [730 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [731 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [732 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [733 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16100D +peer0.org2.example.com | [734 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EDC83E54D3051697E7B2B39886D5F687AC7F13EE730691F95C0F0824EAE1C7B8 +peer0.org2.example.com | [735 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [736 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [737 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [738 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [739 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [73a 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | [706 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [common.channelconfig] NewStandardValues -> DEBU aab Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [857 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [72c 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [70c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: MSP" +peer1.org2.example.com | [858 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 2 +peer1.org1.example.com | [72d 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [73b 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [70d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [70e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [70f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0037a2f40)} +peer1.org1.example.com | [72e 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [73c 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [710 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [70b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [711 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [712 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [714 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [715 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [73d 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [73e 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 117636673158108147, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [73f 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\331\312\376\345\304 J7\357\332\301" > > alive: > +peer0.org2.example.com | [740 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 117636673158108147, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 547 bytes, Signature: 0 bytes +peer0.org2.example.com | [741 10-14 19:01:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [742 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.964Z grpc.peer_address=172.18.0.5:59204 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=103.5µs +peer0.org2.example.com | [743 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [744 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [745 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [746 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [749 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [74a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [74b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [74c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [716 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [717 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [718 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 gate 1602702068658154900 evaluation starts +peer0.org1.example.com | [719 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [71a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [71b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [71c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [72f 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [730 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [731 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [732 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [733 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [734 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [735 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 gate 1602702068625034200 evaluation starts +peer1.org1.example.com | [736 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [737 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [738 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [739 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 principal evaluation fails +peer1.org1.example.com | [73a 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003248ea0 gate 1602702068625034200 evaluation fails +peer1.org1.example.com | [73b 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [73c 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [73d 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [73e 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 gate 1602702068625437000 evaluation starts +peer1.org1.example.com | [73f 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [740 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [741 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [742 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [743 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [744 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 principal matched by identity 0 +peer1.org1.example.com | [745 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [746 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 a1 3b 31 d4 56 00 47 c3 f3 f6 59 |0D. ..;1.V.G...Y| +peer1.org1.example.com | 00000010 a2 5b b5 fa 3d 8d a7 68 96 6b ee 9f 2e a1 6b 09 |.[..=..h.k....k.| +peer1.org1.example.com | 00000020 30 ea 4f 11 02 20 12 f7 33 6c c9 d6 09 7f 2f e6 |0.O.. ..3l..../.| +peer1.org1.example.com | 00000030 a0 52 b2 40 28 82 c8 4c 4d 14 d3 27 21 30 bb 1c |.R.@(..LM..'!0..| +peer1.org1.example.com | 00000040 c4 41 c3 de 65 7c |.A..e|| +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [common.channelconfig] Validate -> DEBU aad Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [common.channelconfig] validateMSP -> DEBU aae Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [msp] newBccspMsp -> DEBU aaf Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [msp] New -> DEBU ab0 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.698 UTC [msp] Setup -> DEBU ab1 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.699 UTC [msp.identity] newIdentity -> DEBU ab2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab5 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab6 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab7 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab8 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab9 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.701 UTC [common.channelconfig] NewStandardValues -> DEBU aba Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU abb Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:07.701 UTC [common.channelconfig] NewStandardValues -> DEBU abc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU abd Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.702 UTC [common.channelconfig] validateMSP -> DEBU abe Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.702 UTC [msp] newBccspMsp -> DEBU abf Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.702 UTC [msp] New -> DEBU ac0 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.702 UTC [msp] Setup -> DEBU ac1 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:07.702 UTC [msp.identity] newIdentity -> DEBU ac2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [msp] Setup -> DEBU ac3 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [msp] Setup -> DEBU ac4 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.705 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU acb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU acc Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.705 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU ace Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.706 UTC [policies] GetPolicy -> DEBU acf Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.706 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.706 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad7 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad8 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad9 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU ada Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU adb Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU adc Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU add Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b03 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b04 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b05 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b06 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b07 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.channelconfig] LogSanityChecks -> DEBU b0a As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.715 UTC [policies] Manager -> DEBU b0c Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0d Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0e Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0f Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.717 UTC [policies] Manager -> DEBU b10 Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | [74d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [74e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [74f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [750 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [751 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [752 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [753 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [754 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [755 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 gate 1602702069974887400 evaluation starts +peer0.org2.example.com | [756 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [757 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [758 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [759 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [75a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [75b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 principal matched by identity 0 +peer0.org2.example.com | [75c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [75d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 11 b8 36 2e 30 e6 fa 50 bf 27 a3 |0D. J..6.0..P.'.| +peer0.org2.example.com | 00000010 6c 32 fe 53 5d d4 c9 a7 96 63 f5 89 e4 25 d3 c8 |l2.S]....c...%..| +peer0.org2.example.com | 00000020 2b e2 a0 d1 02 20 17 43 a9 bb 99 d1 13 17 5a 3a |+.... .C......Z:| +peer0.org2.example.com | 00000030 e4 99 a2 f1 40 36 71 53 6e a3 65 6f 31 fe 48 4f |....@6qSn.eo1.HO| +peer0.org2.example.com | 00000040 20 b8 d0 ad e0 6d | ....m| +peer0.org2.example.com | [75e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [75f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311ea70 gate 1602702069974887400 evaluation succeeds +peer0.org2.example.com | [760 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [761 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [762 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [763 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [764 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:59204 +peer0.org2.example.com | [765 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:59204 +peer0.org2.example.com | [766 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [767 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [768 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [769 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [76a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [76b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [76c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [76d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [76e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [76f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [770 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [771 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 gate 1602702069984567800 evaluation starts +peer0.org2.example.com | [772 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [773 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [774 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 principal matched by identity 0 +peer0.org2.example.com | [775 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [776 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [777 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [778 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312e3c0 gate 1602702069984567800 evaluation succeeds +peer0.org2.example.com | [779 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [77a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [77b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [77c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [77d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [77e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [77f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [780 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [781 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [782 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [783 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [784 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 gate 1602702069985642800 evaluation starts +peer0.org2.example.com | [785 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [786 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [787 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 principal matched by identity 0 +peer0.org2.example.com | [788 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [789 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [78a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [78b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312efb0 gate 1602702069985642800 evaluation succeeds +peer0.org2.example.com | [78c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [78d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [78e 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [78f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [790 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [791 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [792 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [793 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [794 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [795 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [796 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [797 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [798 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [799 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [79a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [71d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [71e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 principal matched by identity 0 +peer0.org1.example.com | [71f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [720 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 d0 1e e5 a9 dc 91 40 0d 64 63 21 |0D.!.......@.dc!| +peer0.org1.example.com | 00000010 81 9a 71 3f 37 f9 2c 8b 62 5e 9c a0 b3 9f 12 9c |..q?7.,.b^......| +peer0.org1.example.com | 00000020 10 0e 8f cd 89 02 1f 2b 56 9e 63 f4 3c 1b 27 6e |.......+V.c.<.'n| +peer0.org1.example.com | 00000030 10 00 4c dd 45 84 82 c4 76 99 d2 14 84 d4 6e 48 |..L.E...v.....nH| +peer0.org1.example.com | 00000040 23 db b9 b9 48 cb |#...H.| +peer0.org1.example.com | [721 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [722 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 gate 1602702068658154900 evaluation succeeds +peer0.org1.example.com | [723 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [724 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [725 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [726 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [727 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [728 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [729 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [72a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161010 +peer0.org1.example.com | [72b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B7AA8CD36B0199C6AFB8DE04027CC74DDD6348856745F69EFA42E5356BA3B11C +peer0.org1.example.com | [72c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [72d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [72e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [72f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [730 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [731 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [732 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [733 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [734 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [735 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [736 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [737 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039b9b50, CONNECTING +peer0.org1.example.com | [713 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [738 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [739 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org1.example.com | [73a 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org1.example.com | [73b 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [73c 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org1.example.com | [73d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.652Z grpc.peer_address=172.18.0.8:52178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=23.4363ms +peer0.org1.example.com | [73e 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +peer0.org1.example.com | txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +peer0.org1.example.com | ] +peer0.org1.example.com | [73f 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to txid-index +peer0.org1.example.com | [740 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx number:[0] ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to blockNumTranNum index +peer0.org1.example.com | [741 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org1.example.com | [742 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039b9b50, READY +peer0.org1.example.com | [743 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [744 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [745 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [746 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [747 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org1.example.com | [748 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [749 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [74b 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org1.example.com | [74c 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org1.example.com | [74d 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [74e 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [74f 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [750 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [751 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [747 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [748 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249430 gate 1602702068625437000 evaluation succeeds +peer1.org1.example.com | [749 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [74a 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [74b 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [74c 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [74d 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [74e 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [74f 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [750 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161013 +peer1.org1.example.com | [751 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA2E8D0C45776733B95F9F11B80EFCC9F3A8085B838B98D33B20DAA650796EDB +peer1.org1.example.com | [752 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [753 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [754 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [755 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [756 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9819258719419633674 tag:EMPTY mem_req:OL\215\353\3048@\\r\031Nm\335\016F.\333'\235\276N\363\326\234\300&\014\177" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [757 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:9819258719419633674 tag:EMPTY mem_req:OL\215\353\3048@\\r\031Nm\335\016F.\333'\235\276N\363\326\234\300&\014\177" > > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [758 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [759 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [75a 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031e8910, READY +peer1.org1.example.com | [75b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [75c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [75d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [75e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [75f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003231830, CONNECTING +peer1.org1.example.com | [760 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [761 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [762 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [763 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [764 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [765 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002b8df00 env 0xc002c08aa0 txn 0 +peer1.org1.example.com | [766 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [767 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 149ms +peer1.org1.example.com | [768 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [769 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [76a 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [76b 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org1.example.com | [76c 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [76d 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [76e 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [76f 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org1.example.com | [770 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [771 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [772 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [773 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [774 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [859 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [85a 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [85b 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [85c 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [85d 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [85e 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [85f 10-14 19:01:12.98 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] +peer1.org2.example.com | [860 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47228 +peer1.org2.example.com | [861 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002fad400 +peer1.org2.example.com | [862 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [863 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [864 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [865 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [866 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 bf 1e c9 07 5a 8f 56 e8 f8 5b 32 36 2c f3 c3 |.....Z.V..[26,..| +peer1.org2.example.com | 00000010 c4 71 2f de cb 99 d4 63 13 03 00 52 a4 47 00 dd |.q/....c...R.G..| +peer1.org2.example.com | [867 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 55 3a 23 e2 5e d3 f6 00 be d9 46 |0D. .U:#.^.....F| +peer1.org2.example.com | 00000010 3c 18 5f 0b ca 16 1c c3 ff 6f b1 5a 3b b6 ff 1f |<._......o.Z;...| +peer1.org2.example.com | 00000020 d1 27 ca 18 02 20 10 d9 f5 a5 c7 44 7f e7 ee 47 |.'... .....D...G| +peer1.org2.example.com | 00000030 72 b6 61 9a b8 48 6a 61 0c 3a fe 2c e7 fe 9e a8 |r.a..Hja.:.,....| +peer1.org2.example.com | 00000040 c5 63 49 b9 4b 51 |.cI.KQ| +peer1.org2.example.com | [868 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [869 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003221a40, header 0xc002fad9f0 +peer1.org2.example.com | [86a 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | [86b 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][618907fa] processing txid: 618907fad4e915c27f2ccfa3559c5dc074039f14e9eb0632f7380893807de5c6 +peer1.org2.example.com | [86c 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][618907fa] Entry chaincode: name:"lscc" +peer1.org2.example.com | [86d 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> INFO [][618907fa] Entry chaincode: name:"lscc" +peer1.org2.example.com | [86e 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [86f 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 bf 1e c9 07 5a 8f 56 e8 f8 5b 32 36 2c f3 c3 |.....Z.V..[26,..| +peer1.org2.example.com | 00000010 c4 71 2f de cb 99 d4 63 13 03 00 52 a4 47 00 dd |.q/....c...R.G..| +peer1.org2.example.com | [870 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 55 3a 23 e2 5e d3 f6 00 be d9 46 |0D. .U:#.^.....F| +peer1.org2.example.com | 00000010 3c 18 5f 0b ca 16 1c c3 ff 6f b1 5a 3b b6 ff 1f |<._......o.Z;...| +peer1.org2.example.com | 00000020 d1 27 ca 18 02 20 10 d9 f5 a5 c7 44 7f e7 ee 47 |.'... .....D...G| +peer1.org2.example.com | 00000030 72 b6 61 9a b8 48 6a 61 0c 3a fe 2c e7 fe 9e a8 |r.a..Hja.:.,....| +peer1.org2.example.com | 00000040 c5 63 49 b9 4b 51 |.cI.KQ| +peer1.org2.example.com | [871 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org2.example.com | [872 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org2.example.com | [873 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org2.example.com | [874 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [fa5ff1af-4bcf-4d1e-8c95-c15016e7742a] +peer1.org2.example.com | [875 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [876 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa5ff1af-4bcf-4d1e-8c95-c15016e7742a] +peer1.org2.example.com | [877 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org2.example.com | [878 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org2.example.com | [879 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU [618907fa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [87a 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU [618907fa] notifying Txid:618907fad4e915c27f2ccfa3559c5dc074039f14e9eb0632f7380893807de5c6, channelID: +peer1.org2.example.com | [87b 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [87c 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> INFO [][618907fa] Exit chaincode: name:"lscc" (3ms) +peer1.org2.example.com | [87d 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU [][618907fa] Exit +peer1.org2.example.com | [87e 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47228 +peer1.org2.example.com | [87f 10-14 19:01:13.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47228 grpc.code=OK grpc.call_duration=7.4346ms +peer1.org2.example.com | [880 10-14 19:01:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [881 10-14 19:01:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [882 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [883 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [884 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8f 71 b8 49 d2 68 85 8a 48 fe 30 b4 da b2 d9 ee |.q.I.h..H.0.....| +peer1.org2.example.com | 00000010 05 39 f2 79 8f 01 4f 09 6f 70 52 a0 4c 1f 07 fd |.9.y..O.opR.L...| +peer1.org2.example.com | [885 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c d8 61 fa 42 f1 c8 ea 28 03 2a ab |0D. <.a.B...(.*.| +peer1.org2.example.com | 00000010 b6 31 1e 4f a4 79 65 82 de bb 1a e6 d8 2e 34 a8 |.1.O.ye.......4.| +peer1.org2.example.com | 00000020 3a 92 90 24 02 20 1f c6 2b 09 2a 31 8e 03 fc 05 |:..$. ..+.*1....| +peer1.org2.example.com | 00000030 cb 1c cf ed c3 7c 4f 04 53 15 0f c4 5e b7 ea 2f |.....|O.S...^../| +peer1.org2.example.com | 00000040 4f 64 d4 81 ff c7 |Od....| +peer1.org2.example.com | [886 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [887 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [888 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us declaration +peer1.org2.example.com | [889 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [88a 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [88b 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [88c 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610031801 +peer1.org2.example.com | [88d 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D1D1BE1EE8C8DD5A0E51202C7FB82BFC91E34E561CBEEC31F16AB06337432DB +peer1.org2.example.com | [88e 10-14 19:01:13.71 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [88f 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [890 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [891 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [892 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [893 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [894 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [895 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [896 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [897 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [898 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [899 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [89a 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [89b 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [89c 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [89d 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [89e 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [89f 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8a0 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8a1 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8a2 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [8a3 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer1.org2.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer1.org2.example.com | [8a4 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer1.org2.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer1.org2.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer1.org2.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer1.org2.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer1.org2.example.com | [8a5 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [8a6 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 76 a9 65 f6 e5 c4 df 67 96 4c 31 |0D. bv.e....g.L1| +peer1.org2.example.com | 00000010 01 71 4f e1 2c ad 62 24 7f 49 14 8d 9b de 35 20 |.qO.,.b$.I....5 | +peer1.org2.example.com | 00000020 c9 e4 d3 b3 02 20 46 ec f3 84 28 f6 e6 da f1 b1 |..... F...(.....| +peer1.org2.example.com | 00000030 81 f8 d4 d8 d0 2a a5 35 d7 39 61 04 32 81 16 0d |.....*.5.9a.2...| +peer1.org2.example.com | 00000040 c1 ca 0c 8e 02 04 |......| +peer1.org2.example.com | [8a7 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [8a8 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [8a9 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [8aa 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [8ab 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [8ac 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ad 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ae 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8af 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [8b0 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8b1 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [79b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [79c 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [79d 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [79e 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [79f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 gate 1602702069990071600 evaluation starts +peer0.org2.example.com | [7a0 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a1 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7a2 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [7a3 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 principal matched by identity 0 +peer0.org2.example.com | [7a4 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [7a5 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [7a6 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [7a7 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314e190 gate 1602702069990071600 evaluation succeeds +peer0.org2.example.com | [7a8 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7a9 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7aa 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [7ab 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [7ac 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7ad 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ae 10-14 19:01:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [7af 10-14 19:01:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7b0 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [7b1 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [7b2 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7b3 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7b4 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [7b6 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16100E +peer0.org2.example.com | [7b7 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 530610B17962840D61600491DA78034B84050E3940ADC928F2C1B1528A9082B9 +peer0.org2.example.com | [7b8 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [7b9 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [7b5 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [7ba 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [7bd 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [7be 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7bb 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [7bf 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7c0 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7c1 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7c2 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [7c3 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7bc 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16100F +peer0.org2.example.com | [7c4 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B7C9B3DA44384EB4EEAF71FF4C4CB8D837A7E8685FE1728493C804DEADA2DB58 +peer0.org2.example.com | [7c5 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [7c6 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [7c7 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [7c8 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [7c9 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ca 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [775 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [776 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | "2020-10-14 19:01:07.717 UTC [policies] Manager -> DEBU b11 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b12 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b15 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b16 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b17 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b18 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b19 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [common.channelconfig] LogSanityChecks -> DEBU b1a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:01:07.718 UTC [common.channelconfig] LogSanityChecks -> DEBU b1b As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:01:07.719 UTC [common.channelconfig] LogSanityChecks -> DEBU b1c As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.719 UTC [common.channelconfig] LogSanityChecks -> DEBU b1d As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.719 UTC [common.capabilities] Supported -> DEBU b1e Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:07.719 UTC [common.capabilities] Supported -> DEBU b1f Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:07.719 UTC [msp] GetDefaultSigningIdentity -> DEBU b20 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:07.720 UTC [msp] GetDefaultSigningIdentity -> DEBU b21 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:07.720 UTC [msp.identity] Sign -> DEBU b22 Sign: plaintext: 0AEA060A1B08011A0608F3959DFC0522...D4D9B624B706DD0D1C59DA1997EFD974 " +orderer0.example.com | "2020-10-14 19:01:07.720 UTC [msp.identity] Sign -> DEBU b23 Sign: digest: 2E94F2EAE7A7611361D9FF507BFAEA1FB90687717E07A895BC3056F80BA84032 " +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.721 UTC [msp] DeserializeIdentity -> DEBU b29 Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:07.722 UTC [msp.identity] newIdentity -> DEBU b2a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.723 UTC [cauthdsl] func1 -> DEBU b2b 0xc00125cc50 gate 1602702067723128700 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2c 0xc00125cc50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2d 0xc00125cc50 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2e 0xc00125cc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2f 0xc00125cc50 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [cauthdsl] func1 -> DEBU b30 0xc00125cc50 gate 1602702067723128700 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b31 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [cauthdsl] func1 -> DEBU b34 0xc00125de10 gate 1602702067724857500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [cauthdsl] func2 -> DEBU b35 0xc00125de10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.724 UTC [cauthdsl] func2 -> DEBU b36 0xc00125de10 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [cauthdsl] func2 -> DEBU b37 0xc00125de10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [cauthdsl] func2 -> DEBU b38 0xc00125de10 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [cauthdsl] func1 -> DEBU b39 0xc00125de10 gate 1602702067724857500 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [policies] func1 -> DEBU b3c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3d Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [7cb 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7cc 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [7cd 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ce 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7cf 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [7d0 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [7d1 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7d2 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [7d3 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [7d4 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [7d5 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7d6 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [7d7 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7d8 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org2.example.com | [7d9 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7da 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org2.example.com | [7db 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [7dc 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 06 10 b1 79 62 84 0d 61 60 04 91 da 78 03 4b |S...yb..a`...x.K| +peer0.org2.example.com | 00000010 84 05 0e 39 40 ad c9 28 f2 c1 b1 52 8a 90 82 b9 |...9@..(...R....| +peer0.org2.example.com | [7dd 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 21 cf 75 a9 a5 a2 db 2f f9 a2 |0E.!..!.u..../..| +peer0.org2.example.com | 00000010 ce 34 4b 9d 79 9c e2 30 54 f4 98 65 db 48 0e ce |.4K.y..0T..e.H..| +peer0.org2.example.com | 00000020 fc 44 3c 51 b1 02 20 5e 1b 7f c5 e3 89 05 fa 0d |.D..........s.| +peer0.org2.example.com | 00000040 06 1e 9a 70 a6 01 7b |...p..{| +peer0.org2.example.com | [7de 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [7df 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 ff da ce 0e 73 44 e0 ff 8c dc 34 |0D. 0....sD....4| +peer0.org2.example.com | 00000010 ab cf cc 50 89 fa b0 ef fa be 92 6a 04 6a d1 54 |...P.......j.j.T| +peer0.org2.example.com | 00000020 ab 93 8a dd 02 20 40 bd 9d 63 a9 aa 90 91 03 74 |..... @..c.....t| +peer0.org2.example.com | 00000030 b7 d1 fb 56 14 8a 62 6b e9 25 38 4d e1 81 47 07 |...V..bk.%8M..G.| +peer0.org2.example.com | 00000040 da 36 7b 54 7a 1d |.6{Tz.| +peer0.org2.example.com | [7e0 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [7e1 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [7e2 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7e3 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [7e4 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 42 a5 5d 98 da 91 dc 81 ca af 28 13 d2 52 ab |.B.].......(..R.| +peer0.org2.example.com | 00000010 a4 cd ef ba 60 7b 8d 58 d0 49 51 de 9f b9 63 bd |....`{.X.IQ...c.| +peer0.org2.example.com | [7e5 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 c8 2a b3 38 71 7a 8c bd 87 28 8b |0D. ..*.8qz...(.| +peer0.org2.example.com | 00000010 9d 7c fc 3d f7 be 7d 17 b4 00 86 26 ac d0 dc 2b |.|.=..}....&...+| +peer0.org2.example.com | 00000020 7b 0d da e5 02 20 43 8a 50 57 30 36 c9 b0 6d 39 |{.... C.PW06..m9| +peer0.org2.example.com | 00000030 42 70 52 d8 b9 8c ef de a2 6c 81 53 a5 cd c6 f0 |BpR......l.S....| +peer0.org2.example.com | 00000040 26 34 6f c2 26 4c |&4o.&L| +peer0.org2.example.com | [7e6 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [7e7 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 4b 78 c2 63 26 1b 35 35 41 4d 01 |0D. MKx.c&.55AM.| +peer0.org2.example.com | 00000010 fe 53 44 6f 49 3c b9 9d 6a 9f e4 40 47 61 4b 60 |.SDoI<..j..@GaK`| +peer0.org2.example.com | 00000020 43 89 e7 30 02 20 38 da 6c d8 e4 7c d7 ba fb 1a |C..0. 8.l..|....| +peer0.org2.example.com | 00000030 67 1a 38 52 05 fc 2b 4d 1e 48 93 9d 27 9a 17 77 |g.8R..+M.H..'..w| +peer0.org2.example.com | 00000040 77 35 7c 17 42 3c |w5|.B<| +peer0.org2.example.com | [7e8 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [7e9 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [7ea 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [7eb 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [7ec 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [7ed 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ee 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ef 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7f0 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes +peer0.org2.example.com | [7f1 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7f2 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes +peer0.org2.example.com | [7f3 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [7f4 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7f5 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7f6 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7f7 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7f8 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7f9 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7fa 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7fb 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 gate 1602702070199471200 evaluation starts +peer0.org2.example.com | [7fc 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7fd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [7fe 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 principal matched by identity 0 +peer0.org2.example.com | [7ff 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +peer0.org2.example.com | 00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +peer0.org2.example.com | [800 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +peer0.org2.example.com | 00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +peer0.org2.example.com | 00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +peer0.org2.example.com | 00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +peer0.org2.example.com | 00000040 18 33 db 7a 92 d8 |.3.z..| +peer0.org2.example.com | [801 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [802 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d930 gate 1602702070199471200 evaluation succeeds +peer0.org2.example.com | [803 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [804 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [805 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [806 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [807 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [808 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [809 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [80a 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 06 10 b1 79 62 84 0d 61 60 04 91 da 78 03 4b |S...yb..a`...x.K| +peer0.org2.example.com | 00000010 84 05 0e 39 40 ad c9 28 f2 c1 b1 52 8a 90 82 b9 |...9@..(...R....| +peer0.org2.example.com | [80b 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 21 cf 75 a9 a5 a2 db 2f f9 a2 |0E.!..!.u..../..| +peer0.org2.example.com | 00000010 ce 34 4b 9d 79 9c e2 30 54 f4 98 65 db 48 0e ce |.4K.y..0T..e.H..| +peer0.org2.example.com | 00000020 fc 44 3c 51 b1 02 20 5e 1b 7f c5 e3 89 05 fa 0d |.D..........s.| +peer0.org2.example.com | 00000040 06 1e 9a 70 a6 01 7b |...p..{| +peer0.org2.example.com | [80c 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [80d 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [80e 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [80f 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [810 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [811 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [812 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [813 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [814 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [815 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [816 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [817 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [818 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [819 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [81a 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 gate 1602702070215030700 evaluation starts +peer0.org2.example.com | [81b 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [81c 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [81d 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [81e 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [81f 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [820 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 principal matched by identity 0 +peer0.org2.example.com | [821 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 56 8e 24 d1 48 8a 58 40 ad 5f 1e 75 73 06 1f |.V.$.H.X@._.us..| +peer0.org2.example.com | 00000010 4a ab 81 b2 c0 13 8b 35 c6 3d 74 d7 3e 6d c7 69 |J......5.=t.>m.i| +peer0.org2.example.com | [822 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 ca db be 91 c0 b5 c4 6e b5 39 04 |0D. ........n.9.| +peer0.org2.example.com | 00000010 0c c3 d2 12 d5 83 4a ba c4 1d 4a 32 cd cd d9 dc |......J...J2....| +peer0.org2.example.com | 00000020 7f 3b 9d 2b 02 20 1d ea 4b 0b 02 8b 04 bd 5e e0 |.;.+. ..K.....^.| +peer0.org2.example.com | 00000030 ee 37 82 ac b4 8e 3a 0f 75 8e 33 fd 82 dd 60 5a |.7....:.u.3...`Z| +peer0.org2.example.com | 00000040 5d 2b 13 ce 3f 9e |]+..?.| +peer0.org2.example.com | [823 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [824 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259840 gate 1602702070215030700 evaluation succeeds +peer0.org2.example.com | [825 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [826 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [827 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [828 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [829 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [82a 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1602702050415591200, 20 but got ts: inc_num:1602702050415591200 seq_num:9 +peer0.org2.example.com | [82b 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [82c 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [82d 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [82e 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [82f 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [830 10-14 19:01:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 c9 b3 da 44 38 4e b4 ee af 71 ff 4c 4c b8 d8 |....D8N...q.LL..| +peer0.org2.example.com | 00000010 37 a7 e8 68 5f e1 72 84 93 c8 04 de ad a2 db 58 |7..h_.r........X| +peer0.org2.example.com | [831 10-14 19:01:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 ae 83 c0 d8 ed f5 66 84 c6 23 |0E.!........f..#| +peer0.org2.example.com | 00000010 70 7c 5d 2c d0 ad 92 9e 5b 99 84 92 19 d3 81 9f |p|],....[.......| +peer0.org2.example.com | 00000020 c6 66 cc 6b ea 02 20 1c f1 d8 bc 34 6f 12 b9 a2 |.f.k.. ....4o...| +peer0.org2.example.com | 00000030 38 2c 86 ef b4 53 86 93 b2 a1 aa 9a 4f b7 11 e7 |8,...S......O...| +peer0.org2.example.com | 00000040 16 5b 19 fb bf 5d 8e |.[...].| +peer0.org2.example.com | [832 10-14 19:01:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [833 10-14 19:01:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [834 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [835 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [836 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [837 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [838 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [83a 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [83b 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 97 90 39 ff 62 20 6e e9 99 1b 26 dc e0 99 a7 |;..9.b n...&....| +peer0.org2.example.com | 00000010 80 94 8c 81 c6 91 e0 f2 a0 4f ad c1 4e 92 57 df |.........O..N.W.| +peer0.org2.example.com | [83c 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 cd 8f a0 a1 0b 26 2b 6d a5 45 |0E.!.......&+m.E| +peer0.org2.example.com | 00000010 f0 76 84 90 50 0b 25 66 b3 c2 71 85 c0 07 6c db |.v..P.%f..q...l.| +peer0.org2.example.com | 00000020 43 ad 33 e4 41 02 20 50 83 58 0d a0 77 a9 4f ac |C.3.A. P.X..w.O.| +peer0.org2.example.com | 00000030 89 9d fd a4 f7 9b 66 35 71 4c 46 ef e0 12 5b 19 |......f5qLF...[.| +peer0.org2.example.com | 00000040 ee a6 1d c6 e9 dd 5b |......[| +peer0.org2.example.com | [839 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [83d 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [83e 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [83f 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [840 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 18 17 a4 3c 5e 5d ee dd db 33 db |0D. >...<^]...3.| +peer0.org2.example.com | 00000010 03 a3 37 8b 13 e2 c7 fb 35 3b 28 7e 60 5d 70 42 |..7.....5;(~`]pB| +peer0.org2.example.com | 00000020 ad 26 08 5d 02 20 51 35 1f 6e 1c 88 9b 94 40 06 |.&.]. Q5.n....@.| +peer0.org2.example.com | 00000030 c7 f7 86 fa 9f aa 22 54 7c e1 4d 53 91 05 c5 b5 |......"T|.MS....| +peer0.org2.example.com | 00000040 fd 79 f3 de 2a 20 |.y..* | +peer0.org2.example.com | [841 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [842 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [843 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [844 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [845 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [846 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [847 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [848 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [849 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [84a 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [84b 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [84c 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 2e f0 13 02 92 f7 68 8b 22 4e db 86 d3 44 12 |\......h."N...D.| +peer0.org2.example.com | 00000010 13 a0 ae 1c 4c d7 a3 0d 44 3a f8 2f b6 48 a1 3b |....L...D:./.H.;| +peer0.org2.example.com | [84d 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 4f 27 bd 80 22 e5 cb 79 e7 16 e8 |0D. .O'.."..y...| +peer0.org2.example.com | 00000010 40 c1 41 b8 51 76 cc 89 71 1d 73 76 16 aa 20 d3 |@.A.Qv..q.sv.. .| +peer0.org2.example.com | 00000020 eb cf f5 3b 02 20 79 37 9f 10 b8 2e 6b 81 0a 22 |...;. y7....k.."| +peer0.org2.example.com | 00000030 4d b7 6a ca b3 52 f4 6e e2 41 d5 bf a7 0a e0 30 |M.j..R.n.A.....0| +peer0.org2.example.com | 00000040 c5 b5 6c 81 17 72 |..l..r| +peer0.org2.example.com | [84e 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [84f 10-14 19:01:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 18 a5 08 9a 11 1a 14 8f ab 0d |0E.!............| +peer0.org2.example.com | 00000010 b0 7b d6 07 63 74 f9 64 76 d2 04 db aa 0c 3f 85 |.{..ct.dv.....?.| +peer0.org2.example.com | 00000020 64 6c f1 e0 12 02 20 6a e3 45 89 8e f8 56 f6 61 |dl.... j.E...V.a| +peer0.org2.example.com | 00000030 f4 b5 f4 49 cd 45 79 0b 32 64 e4 d9 5a 21 65 d6 |...I.Ey.2d..Z!e.| +peer0.org2.example.com | 00000040 a0 11 64 b5 fc 03 5f |..d..._| +peer0.org2.example.com | [850 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [851 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [852 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [853 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [854 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [855 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [857 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [856 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [858 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [859 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [85a 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [85b 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [85c 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [85d 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [85e 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [85f 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [860 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [861 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [863 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [862 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [864 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [865 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [866 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [867 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [868 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [869 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b41 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [cauthdsl] func1 -> DEBU b42 0xc00126eb20 gate 1602702067726442200 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [cauthdsl] func2 -> DEBU b43 0xc00126eb20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [cauthdsl] func2 -> DEBU b44 0xc00126eb20 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.726 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b45 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:07.727 UTC [msp] Validate -> DEBU b46 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:01:07.727 UTC [msp] getCertificationChain -> DEBU b47 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:07.727 UTC [cauthdsl] func2 -> DEBU b48 0xc00126eb20 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [msp.identity] Verify -> DEBU b49 Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +orderer0.example.com | 00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2|" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [msp.identity] Verify -> DEBU b4a Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +orderer0.example.com | 00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +orderer0.example.com | 00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +orderer0.example.com | 00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +orderer0.example.com | 00000040 7f 4b 57 be 84 c8 e9 |.KW....|" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [cauthdsl] func2 -> DEBU b4b 0xc00126eb20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [cauthdsl] func1 -> DEBU b4c 0xc00126eb20 gate 1602702067726442200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [policies] Evaluate -> DEBU b4d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:07.728 UTC [policies] Evaluate -> DEBU b4e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b4f Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b51 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [orderer.common.msgprocessor] Apply -> DEBU b53 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] NewStandardValues -> DEBU b54 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b55 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b57 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b59 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] NewStandardValues -> DEBU b5a Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5b Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5c Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.731 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.731 UTC [common.channelconfig] NewStandardValues -> DEBU b5f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.732 UTC [common.channelconfig] Validate -> DEBU b61 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.732 UTC [common.channelconfig] validateMSP -> DEBU b62 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.732 UTC [msp] newBccspMsp -> DEBU b63 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.732 UTC [msp] New -> DEBU b64 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.732 UTC [msp] Setup -> DEBU b65 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.733 UTC [msp.identity] newIdentity -> DEBU b66 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.734 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.734 UTC [common.channelconfig] NewStandardValues -> DEBU b69 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU b6a Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.735 UTC [common.channelconfig] Validate -> DEBU b6b Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.735 UTC [common.channelconfig] validateMSP -> DEBU b6c Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.735 UTC [msp] newBccspMsp -> DEBU b6d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.735 UTC [msp] New -> DEBU b6e Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.735 UTC [msp] Setup -> DEBU b6f Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.736 UTC [msp.identity] newIdentity -> DEBU b70 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [8b2 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\030\027\244<^]\356\335\3333\333\003\2437\213\023\342\307\3735;(~`]pB\255&\010]\002 Q5\037n\034\210\233\224@\006\307\367\206\372\237\252\"T|\341MS\221\005\305\265\375y\363\336* " > > +peer1.org2.example.com | [8b3 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org2.example.com | [8b4 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8b5 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [8b6 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8b7 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [8b8 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8b9 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ba 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8bb 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8bc 10-14 19:01:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8bd 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8be 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8bf 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8c0 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8c1 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161010 +peer1.org2.example.com | [8c2 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 01DFE14E12726C67BA8272CF858734F7A85A88E10D8BD8BF27EEE67D253EE85B +peer1.org2.example.com | [8c3 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8c4 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [8c5 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [8c6 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8c7 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8c8 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8c9 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ca 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8cb 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cc 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8cd 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ce 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cf 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d0 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d1 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d2 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d3 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d4 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d5 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [8d6 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +peer1.org2.example.com | 00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +peer1.org2.example.com | [8d7 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +peer1.org2.example.com | 00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +peer1.org2.example.com | 00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +peer1.org2.example.com | 00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +peer1.org2.example.com | 00000040 a5 3c 20 be c1 72 dc |.< ..r.| +peer1.org2.example.com | [8d8 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [8d9 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 5b 18 a5 2f 85 63 a5 8e b5 81 e9 |0D. X[../.c.....| +peer1.org2.example.com | 00000010 9b 2b 59 89 59 26 eb c5 08 96 4d e1 6a ae 5b 55 |.+Y.Y&....M.j.[U| +peer1.org2.example.com | 00000020 36 4d ec ee 02 20 63 bd bd 96 eb 6d 82 7b 3a 08 |6M... c....m.{:.| +peer1.org2.example.com | 00000030 0b 40 2c f0 cb 3c 7f 02 e7 3b 7a 73 47 ba a6 a0 |.@,..<...;zsG...| +peer1.org2.example.com | 00000040 cb 68 36 5b 45 c9 |.h6[E.| +peer1.org2.example.com | [8da 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [8db 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [8dc 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8dd 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8de 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [8df 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8e0 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [8e1 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [8e2 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [8e3 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer1.org2.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer1.org2.example.com | [8e4 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer1.org2.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.737 UTC [common.channelconfig] NewStandardValues -> DEBU b71 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:07.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU b72 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU b73 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b74 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b75 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] NewStandardValues -> DEBU b78 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:07.739 UTC [common.channelconfig] NewStandardValues -> DEBU b7a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.740 UTC [common.channelconfig] validateMSP -> DEBU b7c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.740 UTC [msp] newBccspMsp -> DEBU b7d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.740 UTC [msp] New -> DEBU b7e Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.740 UTC [msp] Setup -> DEBU b7f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:07.741 UTC [msp.identity] newIdentity -> DEBU b80 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.742 UTC [msp] Setup -> DEBU b81 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:07.743 UTC [msp] Setup -> DEBU b82 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b83 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b84 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b85 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b86 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b87 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b88 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] GetPolicy -> DEBU b8e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | [777 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [86a 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [86b 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [86c 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [86d 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [86e 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [86f 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [870 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 gate 1602702070332981300 evaluation starts +peer0.org2.example.com | [871 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [872 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [873 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 principal matched by identity 0 +peer0.org2.example.com | [874 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [875 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [876 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [877 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c0910 gate 1602702070332981300 evaluation succeeds +peer0.org2.example.com | [878 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [879 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [87a 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [87b 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [87c 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [87d 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [87e 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [87f 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [880 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [881 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [882 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [883 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 gate 1602702070338479000 evaluation starts +peer0.org2.example.com | [884 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [885 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [886 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 principal matched by identity 0 +peer0.org2.example.com | [887 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [888 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [889 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [88a 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c1500 gate 1602702070338479000 evaluation succeeds +peer0.org2.example.com | [88b 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [88c 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [88d 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [88e 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [88f 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [890 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [891 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [892 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [893 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [894 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [895 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [896 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [897 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [898 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 gate 1602702070352213900 evaluation starts +peer0.org2.example.com | [899 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [89a 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [89b 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [89c 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [89d 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [89e 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [89f 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8a0 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 principal matched by identity 0 +peer1.org2.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer1.org2.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer1.org2.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer1.org2.example.com | [8e5 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [8e6 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8e7 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [8e8 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +peer1.org2.example.com | 00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +peer1.org2.example.com | [8e9 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +peer1.org2.example.com | 00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +peer1.org2.example.com | 00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +peer1.org2.example.com | 00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +peer1.org2.example.com | 00000040 a5 3c 20 be c1 72 dc |.< ..r.| +peer1.org2.example.com | [8ea 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [8eb 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [8ec 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ed 10-14 19:01:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ee 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ef 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f0 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8f1 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8f2 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [8f3 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f4 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f5 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f6 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f7 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [8f8 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8f9 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [8fa 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [8fb 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [8fc 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [8fd 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [8fe 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [8ff 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 gate 1602702074603660800 evaluation starts +peer1.org2.example.com | [900 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [901 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [902 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [903 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 principal evaluation fails +peer1.org2.example.com | [904 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fdea0 gate 1602702074603660800 evaluation fails +peer1.org2.example.com | [905 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [906 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [907 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [908 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 gate 1602702074603981600 evaluation starts +peer1.org2.example.com | [909 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [90a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [90b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 principal matched by identity 0 +peer1.org2.example.com | [90c 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer1.org2.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer1.org2.example.com | [90d 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer1.org2.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer1.org2.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer1.org2.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer1.org2.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer1.org2.example.com | [90e 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [90f 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f7a410 gate 1602702074603981600 evaluation succeeds +peer1.org2.example.com | [910 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [911 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [912 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [913 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [914 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [915 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [916 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [917 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [918 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [919 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [91a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [91b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [91c 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [91d 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [91e 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [91f 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [920 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:]=\243\\Mt\247\220d\007" > alive: +peer1.org1.example.com | [778 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [779 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [77a 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [77b 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00334c200)} +peer1.org1.example.com | [77c 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [77d 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [77e 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [77f 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org1.example.com | [780 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer1.org1.example.com | [781 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer1.org1.example.com | [782 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer1.org1.example.com | [783 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +peer1.org1.example.com | txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +peer1.org1.example.com | ] +peer1.org1.example.com | [784 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to txid-index +peer1.org1.example.com | [785 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx number:[0] ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to blockNumTranNum index +peer1.org1.example.com | [786 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +peer1.org1.example.com | [787 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org1.example.com | [788 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003231830, READY +peer1.org1.example.com | [789 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org1.example.com | [78a 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org1.example.com | [78b 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [78c 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [78d 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [78e 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [78f 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [790 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [791 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer1.org1.example.com | [792 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer1.org1.example.com | [793 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer1.org1.example.com | [794 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [795 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org1.example.com | [796 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org1.example.com | [797 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [798 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org1.example.com | [799 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 34ms (state_validation=2ms block_and_pvtdata_commit=17ms state_commit=4ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer1.org1.example.com | [79a 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer1.org1.example.com | [79b 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [79c 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [79d 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [79e 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [79f 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7a0 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer0.org1.example.com | [74a 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [752 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [753 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org1.example.com | [754 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org1.example.com | [755 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org1.example.com | [756 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [757 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org1.example.com | [758 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org1.example.com | [759 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [75a 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer0.org1.example.com | [75c 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [75d 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8a1 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [8a2 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [8a3 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8a4 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032487b0 gate 1602702070352213900 evaluation succeeds +peer0.org2.example.com | [8a5 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8a6 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8a7 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8a8 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8a9 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8aa 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ab 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [8ac 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [8ad 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8ae 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [8af 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [921 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org2.example.com | [922 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [923 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [924 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [925 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [926 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [927 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [928 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [929 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [92a 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [92b 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [92c 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [92d 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org2.example.com | [92e 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [92f 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [930 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [931 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [932 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [933 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [934 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [935 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [936 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [937 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [938 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [939 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [93a 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [93b 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [93c 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 gate 1602702074987875400 evaluation starts +peer1.org2.example.com | [93d 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [93e 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [7a1 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [7a2 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [7a3 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org1.example.com | [7a4 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a5 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7a6 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [7a7 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [7a8 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [7a9 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7aa 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [75e 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [75b 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:52178 +peer0.org1.example.com | [75f 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [760 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [761 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [762 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [765 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [763 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52178 +peer0.org2.example.com | [8b0 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8b1 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8b2 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8b3 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [8b4 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8b5 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8b6 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b7 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b8 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8b9 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8ba 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [8bb 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 gate 1602702070436557300 evaluation starts +peer0.org2.example.com | [8bc 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8bd 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [8be 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 principal matched by identity 0 +peer0.org2.example.com | [8bf 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 44 0e 34 11 6f 14 63 2d 67 64 de 92 bc 80 65 |zD.4.o.c-gd....e| +peer0.org2.example.com | 00000010 1f d9 5c bd ba 5f 8c d0 cf fb 54 8a f9 0c 86 92 |..\.._....T.....| +peer0.org2.example.com | [8c0 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 7c 3f ea 11 50 eb 95 8e 07 be 2c |0D. m|?..P.....,| +peer0.org2.example.com | 00000010 3b 16 87 3f 7d 7b e7 27 bf 17 74 e3 1c 94 18 99 |;..?}{.'..t.....| +peer0.org2.example.com | 00000020 57 b9 ad 44 02 20 70 10 eb 21 10 0d a9 c8 70 6e |W..D. p..!....pn| +peer0.org2.example.com | 00000030 05 ed 72 5c 66 67 ad db 7e 9a 67 3d 94 61 0d 2a |..r\fg..~.g=.a.*| +peer0.org2.example.com | 00000040 aa 06 97 eb a4 28 |.....(| +peer0.org2.example.com | [8c1 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8c2 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c8110 gate 1602702070436557300 evaluation succeeds +peer0.org2.example.com | [8c3 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8c4 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8c5 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8c6 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8c7 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8c8 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [8c9 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [8ca 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.754 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bc8 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39982" +orderer0.example.com | "2020-10-14 19:01:07.763 UTC [orderer.consensus.etcdraft] propose -> INFO bc9 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:07.764 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bcc Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:07.764 UTC [common.deliver] Handle -> WARN bcd Error reading from 172.18.0.9:39980: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:07.764 UTC [orderer.common.server] func1 -> DEBU bce Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:01:07.764 UTC [comm.grpc.server] 1 -> INFO bcf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39980 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=112.5368ms +orderer0.example.com | "2020-10-14 19:01:07.765 UTC [grpc] infof -> DEBU bd0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:07.763 UTC [grpc] infof -> DEBU bcb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:07.763 UTC [orderer.common.broadcast] Handle -> WARN bca Error reading from 172.18.0.9:39982: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:07.768 UTC [orderer.common.server] func1 -> DEBU bd1 Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:07.768 UTC [comm.grpc.server] 1 -> INFO bd2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39982 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.1622ms +peer1.org2.example.com | [93f 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [940 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 principal evaluation fails +peer1.org2.example.com | [941 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc4e30 gate 1602702074987875400 evaluation fails +peer1.org2.example.com | [942 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [943 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [944 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [945 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 gate 1602702074990696300 evaluation starts +peer1.org2.example.com | [946 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [947 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [948 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 principal matched by identity 0 +peer1.org2.example.com | [949 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [94a 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [94b 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [94c 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fc53a0 gate 1602702074990696300 evaluation succeeds +peer1.org2.example.com | [94d 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [94e 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [94f 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [950 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [951 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org2.example.com | [952 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [953 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [954 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [955 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [956 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [957 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [958 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [959 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [95a 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [95b 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [95c 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [95d 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 gate 1602702074997195100 evaluation starts +peer1.org2.example.com | [95e 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [95f 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [960 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [961 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 principal evaluation fails +orderer0.example.com | "2020-10-14 19:01:07.768 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd3 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:07.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd4 Sending msg of 27273 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-10-14 19:01:07.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd5 Sending msg of 27273 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:07.771 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd6 Send of ConsensusRequest for channel businesschannel with payload of size 27273 to orderer1.example.com(orderer1.example.com:7050) took 229.6µs " +orderer0.example.com | "2020-10-14 19:01:07.772 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd7 Send of ConsensusRequest for channel businesschannel with payload of size 27273 to orderer2.example.com(orderer2.example.com:7050) took 632.9µs " +orderer0.example.com | "2020-10-14 19:01:07.776 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.776 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-10-14 19:01:07.776 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 28 bytes to 3 on channel businesschannel took 65.2µs" +orderer0.example.com | "2020-10-14 19:01:07.777 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.1µs " +orderer0.example.com | "2020-10-14 19:01:07.777 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bdc Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:07.777 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU bde Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU bdf Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU be0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.779 UTC [common.configtx] verifyDeltaSet -> DEBU bec Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [common.configtx] policyForItem -> DEBU bed Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bee Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bef Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf0 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf1 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf2 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf3 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf4 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf5 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf6 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf7 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [policies] Evaluate -> DEBU bf8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [cauthdsl] func1 -> DEBU bf9 0xc0009fcea0 gate 1602702067781135500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfa 0xc0009fcea0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfb 0xc0009fcea0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfc 0xc0009fcea0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [msp.identity] Verify -> DEBU bfd Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +orderer0.example.com | 00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.|" +orderer0.example.com | "2020-10-14 19:01:07.781 UTC [msp.identity] Verify -> DEBU bfe Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +orderer0.example.com | 00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +orderer0.example.com | 00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +orderer0.example.com | 00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +orderer0.example.com | 00000040 a1 ce b7 6d c5 7f dd |...m...|" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [cauthdsl] func2 -> DEBU bff 0xc0009fcea0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [cauthdsl] func1 -> DEBU c00 0xc0009fcea0 gate 1602702067781135500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [policies] Evaluate -> DEBU c01 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [common.configtx] verifyDeltaSet -> DEBU c03 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [764 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org1.example.com | [766 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [767 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [768 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [769 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 gate 1602702068744865100 evaluation starts +peer0.org1.example.com | [76a 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [76b 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [76c 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 principal matched by identity 0 +peer0.org1.example.com | [76d 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [76e 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 116ms (state_validation=40ms block_and_pvtdata_commit=46ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org1.example.com | [770 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org1.example.com | [76f 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 9c 95 58 ea 6d 98 19 aa 1b fc e9 |0D. P..X.m......| +peer0.org1.example.com | 00000010 24 98 e0 d6 9c 40 4a 2c ba 01 97 db 10 ca 4e 14 |$....@J,......N.| +peer0.org1.example.com | 00000020 72 d9 31 b5 02 20 59 33 86 08 44 53 b3 ae a0 df |r.1.. Y3..DS....| +peer0.org1.example.com | 00000030 22 35 ad 75 53 81 f9 5c 18 5e b3 08 ec 44 8c fa |"5.uS..\.^...D..| +peer0.org1.example.com | 00000040 a2 dd d6 ee 31 d1 |....1.| +peer0.org1.example.com | [771 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [772 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 46 48 f2 b2 9a 7f df df a9 f1 79 |0D. HFH........y| +peer0.org1.example.com | 00000010 98 98 2c c9 e6 c6 a4 38 a6 d2 b0 48 82 64 5b 16 |..,....8...H.d[.| +peer0.org1.example.com | 00000020 a6 da 79 91 02 20 3b c8 85 93 d7 97 52 85 58 6c |..y.. ;.....R.Xl| +peer0.org1.example.com | 00000030 f1 df 38 46 43 ba 74 7d 1b 14 23 b1 a8 a5 48 66 |..8FC.t}..#...Hf| +peer0.org1.example.com | 00000040 32 9f 45 34 54 4d |2.E4TM| +peer0.org1.example.com | [773 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52178 +peer0.org1.example.com | [774 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52178 +peer0.org1.example.com | [775 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [776 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 gate 1602702068744865100 evaluation succeeds +peer0.org1.example.com | [777 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [778 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [779 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [77a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [77b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [77c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [77d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52178 disconnected +peer0.org1.example.com | [77e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [77f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.707Z grpc.peer_address=172.18.0.8:52178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=47.3305ms +peer0.org1.example.com | [780 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [781 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [782 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [783 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [784 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer0.org1.example.com | [785 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer0.org1.example.com | [786 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [787 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +peer0.org1.example.com | [788 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [789 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +peer0.org1.example.com | 00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +peer0.org1.example.com | [78a 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +peer0.org1.example.com | 00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +peer0.org1.example.com | 00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +peer0.org1.example.com | 00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +peer0.org1.example.com | 00000040 18 33 db 7a 92 d8 |.3.z..| +peer0.org1.example.com | [78b 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8cb 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [8cc 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8cd 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ce 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8cf 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [8d0 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8d1 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [8d2 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [8d3 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d4 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8d5 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8d6 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8d7 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8d8 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8d9 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8da 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8dc 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [8dd 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 gate 1602702070452130500 evaluation starts +peer0.org2.example.com | [8de 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8db 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8df 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [8e1 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 principal matched by identity 0 +peer0.org2.example.com | [8e2 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer0.org2.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer0.org2.example.com | [8e0 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8e3 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8e4 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [8e5 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8e6 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Admins to " +orderer0.example.com | "2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c0a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0c Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.785 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.785 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.787 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.789 UTC [orderer.common.cluster.step] sendMessage -> DEBU c14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.6µs " +orderer0.example.com | "2020-10-14 19:01:07.794 UTC [orderer.common.cluster.step] handleMessage -> DEBU c15 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.795 UTC [orderer.common.cluster.step] handleMessage -> DEBU c16 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:07.789 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.799 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.801 UTC [common.configtx] recurseConfigMap -> DEBU c19 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.801 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.802 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.803 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:01:07.804 UTC [common.channelconfig] NewStandardValues -> DEBU c1d Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1e Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1f Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c20 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.805 UTC [common.channelconfig] initializeProtosStruct -> DEBU c21 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:01:07.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU c22 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.807 UTC [common.channelconfig] NewStandardValues -> DEBU c23 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:01:07.808 UTC [common.channelconfig] initializeProtosStruct -> DEBU c24 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:01:07.808 UTC [common.channelconfig] initializeProtosStruct -> DEBU c25 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.809 UTC [common.channelconfig] NewStandardValues -> DEBU c26 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.810 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.811 UTC [common.channelconfig] Validate -> DEBU c2a Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.811 UTC [common.channelconfig] validateMSP -> DEBU c2b Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.811 UTC [msp] newBccspMsp -> DEBU c2c Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.812 UTC [msp] New -> DEBU c2d Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.812 UTC [msp] Setup -> DEBU c2e Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.813 UTC [msp.identity] newIdentity -> DEBU c2f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | [78c 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [78d 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [78e 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [78f 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [790 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [791 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [792 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [793 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [794 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [795 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [796 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 gate 1602702068774399300 evaluation starts +peer0.org1.example.com | [797 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [798 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [799 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 principal matched by identity 0 +peer0.org1.example.com | [79a 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 5c 5b a1 c5 d0 42 f3 10 98 4b f1 8d e3 43 fc |.\[...B...K...C.| +peer0.org1.example.com | 00000010 67 11 54 45 40 fd 8a 65 ab 61 da 15 f4 7e 48 13 |g.TE@..e.a...~H.| +peer0.org1.example.com | [79b 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 06 f7 ae a6 36 b3 63 21 97 3f |0E.!......6.c!.?| +peer0.org1.example.com | 00000010 c6 51 e5 6d 55 64 cc 8b 3d 95 83 05 41 ae c5 e4 |.Q.mUd..=...A...| +peer0.org1.example.com | 00000020 38 e7 9f 29 ad 02 20 00 d1 69 7d 61 4c c5 ad b4 |8..).. ..i}aL...| +peer0.org1.example.com | 00000030 4c f6 4f 44 15 1d 7a c5 f0 c6 24 90 74 ba d9 b9 |L.OD..z...$.t...| +peer0.org1.example.com | 00000040 6c 4d 5e a0 99 01 36 |lM^...6| +peer0.org1.example.com | [79c 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [79d 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 gate 1602702068774399300 evaluation succeeds +peer0.org1.example.com | [79e 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [79f 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7a0 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7a1 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7a2 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [7a3 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [7a4 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [7a5 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a6 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a7 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7a8 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.776Z grpc.peer_address=172.18.0.8:52186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=246.3µs +peer0.org1.example.com | [7a9 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7aa 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7ab 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7ac 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52186 +peer0.org1.example.com | [7ad 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52186 +peer0.org1.example.com | [7ae 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [7af 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 30 4f 97 1a 9c de 8b de 90 c7 |0E.!..0O........| +peer0.org1.example.com | 00000010 87 95 4a 60 f6 6a 8a ff 2e b6 6e 12 28 b7 9a 83 |..J`.j....n.(...| +peer0.org1.example.com | 00000020 ba 2d 8e b1 77 02 20 03 bf d4 7f d3 e8 20 d1 42 |.-..w. ...... .B| +peer0.org1.example.com | 00000030 8a 42 f4 01 6e 9b 45 73 31 4a 43 de 6f b7 e5 2d |.B..n.Es1JC.o..-| +peer0.org1.example.com | 00000040 48 74 9d 96 47 bc 34 |Ht..G.4| +peer0.org1.example.com | [7b0 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52186 +peer0.org1.example.com | [7b1 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52186 +peer0.org1.example.com | [7b2 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes +peer0.org1.example.com | [7b3 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7b4 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes +peer0.org1.example.com | [7b5 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [7b6 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 63 d2 70 fd b9 b4 07 72 54 43 81 39 e7 1c cf |.c.p....rTC.9...| +peer0.org1.example.com | 00000010 66 35 af f7 bf 8b fa 5f c5 2f 7b 10 a8 5e 9f c9 |f5....._./{..^..| +peer0.org1.example.com | [7b7 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 68 02 fe a3 8f 18 16 6e 63 35 |0E.!..h......nc5| +peer0.org1.example.com | 00000010 eb 59 92 99 f4 4d ac fa 1c f4 ae 43 16 84 fb f0 |.Y...M.....C....| +peer0.org1.example.com | 00000020 66 0f b4 ed fb 02 20 3b f0 af fc 75 d9 2c b0 d4 |f..... ;...u.,..| +peer0.org1.example.com | 00000030 73 3b 58 a7 1f 07 88 f4 ef fd 3c 65 54 fe 33 7e |s;X....... DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [7b9 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 8c 4f da db d1 c3 f5 b1 09 cd |0E.!...O........| +peer0.org1.example.com | 00000010 b4 42 0e fa d2 31 6c 3d c8 56 d7 b2 39 09 75 ab |.B...1l=.V..9.u.| +peer0.org1.example.com | 00000020 37 b4 35 e6 6c 02 20 1f 88 94 5f 1e a5 35 87 2b |7.5.l. ..._..5.+| +peer0.org1.example.com | 00000030 1c f7 c2 90 68 c8 e4 a8 c0 52 1d bd 05 1f 6d 13 |....h....R....m.| +peer0.org1.example.com | 00000040 61 09 7f 51 ba 9a 98 |a..Q...| +peer0.org1.example.com | [7ba 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [7bb 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [962 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010920 gate 1602702074997195100 evaluation fails +peer1.org2.example.com | [963 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [964 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [965 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [966 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 gate 1602702074998992200 evaluation starts +peer1.org2.example.com | [967 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [968 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [969 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [96a 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [96b 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [96c 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [96d 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [96e 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [96f 10-14 19:01:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 principal matched by identity 0 +peer1.org2.example.com | [970 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [971 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [972 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [973 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [974 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003010e90 gate 1602702074998992200 evaluation succeeds +peer1.org2.example.com | [975 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [976 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [977 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [978 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [979 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ����)�����H�5���K��q���2���( +peer1.org2.example.com | [97a 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [97b 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [97c 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [97d 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [97e 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [97f 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [980 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [981 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [982 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [983 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 09 0f b2 6b f0 90 6e 95 04 c2 3d 31 ed 64 80 |t...k..n...=1.d.| +peer1.org2.example.com | 00000010 15 be ae ba 14 0d d5 db f2 de 32 4d 1f 87 4f c1 |..........2M..O.| +peer1.org2.example.com | [984 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d fc 9e e0 54 0d 5d 78 c5 f5 12 d4 |0D. M...T.]x....| +peer1.org2.example.com | 00000010 e0 46 8b 24 2f 4f 32 03 06 53 ee 39 7e 39 8a 25 |.F.$/O2..S.9~9.%| +peer1.org2.example.com | 00000020 8a 65 89 45 02 20 28 a4 fe 61 55 7c 72 e6 2a 76 |.e.E. (..aU|r.*v| +peer1.org2.example.com | 00000030 94 43 04 53 64 b5 75 68 f1 96 d4 d0 f9 6d ee cc |.C.Sd.uh.....m..| +peer1.org2.example.com | 00000040 25 f5 a8 78 7c 24 |%..x|$| +peer1.org2.example.com | [985 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [986 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [987 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [988 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [989 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [98a 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [98b 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [98c 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [98d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [98e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [98f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [990 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [991 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [992 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [993 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [994 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [995 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [996 10-14 19:01:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [997 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [998 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161011 +peer1.org2.example.com | [999 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 12C57133782252E5C4D9DCBD25695DD62271DF0F19D7144D8F83162DFE7E57FC +peer1.org2.example.com | [99a 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [99b 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [99c 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [99d 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [99e 10-14 19:01:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org2.example.com:7051 +peer1.org2.example.com | [99f 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [9a0 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer0.org1.example.com:7051 +peer1.org2.example.com | [9a1 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a2 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9a3 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [9a5 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a7 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9a4 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a8 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a6 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13312233161659412571, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a9 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [9ab 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [9ac 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9ad 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9ae 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9af 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9aa 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9074720330768558081, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [9b0 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9b1 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9b2 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.814 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.814 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.815 UTC [common.channelconfig] NewStandardValues -> DEBU c32 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU c33 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.815 UTC [common.channelconfig] Validate -> DEBU c34 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:01:07.815 UTC [common.channelconfig] validateMSP -> DEBU c35 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.815 UTC [msp] newBccspMsp -> DEBU c36 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.816 UTC [msp] New -> DEBU c37 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.816 UTC [msp] Setup -> DEBU c38 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.816 UTC [msp.identity] newIdentity -> DEBU c39 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.817 UTC [common.channelconfig] NewStandardValues -> DEBU c3a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3b Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3c Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3d Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3e Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c40 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] NewStandardValues -> DEBU c41 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] NewStandardValues -> DEBU c43 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c44 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [common.channelconfig] validateMSP -> DEBU c45 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [msp] newBccspMsp -> DEBU c46 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.818 UTC [msp] New -> DEBU c47 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:01:07.819 UTC [msp] Setup -> DEBU c48 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:01:07.819 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [msp] Setup -> DEBU c4a Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [msp] Setup -> DEBU c4b MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | [7bc 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [7bd 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [7be 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [7bf 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7c0 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7c1 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7c2 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [7c3 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7c4 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [7c5 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org1.example.com | [7c6 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [7c7 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7c8 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.842Z grpc.peer_address=172.18.0.7:45778 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=233µs +peer0.org1.example.com | [7c9 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7ca 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7cb 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7cc 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45778 +peer0.org1.example.com | [7cd 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45778 +peer0.org1.example.com | [7ce 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7cf 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7d0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7d1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7d2 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7d3 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7d4 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7d5 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7d6 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7d7 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7d8 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7d9 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 gate 1602702068854722100 evaluation starts +peer0.org1.example.com | [7da 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7db 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [7dc 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 principal matched by identity 0 +peer0.org1.example.com | [7dd 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [7de 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 22 ec 4f 11 79 4d ad af 4d 76 ea |0D. .".O.yM..Mv.| +peer0.org1.example.com | 00000010 79 0e e5 a4 20 af 82 a8 a5 a5 42 c5 6c a1 df 21 |y... .....B.l..!| +peer0.org1.example.com | 00000020 56 2c 1b 6d 02 20 29 5e e5 fb 4b 0d 91 5a 83 97 |V,.m. )^..K..Z..| +peer0.org1.example.com | 00000030 1c 99 dd ac dc ce 1c 66 1e 97 cc 52 74 1f a7 3e |.......f...Rt..>| +peer0.org1.example.com | 00000040 a9 c1 31 46 30 90 |..1F0.| +peer0.org1.example.com | [7df 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [7e0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 gate 1602702068854722100 evaluation succeeds +peer0.org1.example.com | [7e1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7e2 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8e7 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer0.org2.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer0.org2.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer0.org2.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer0.org2.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer0.org2.example.com | [8e8 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8e9 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c99e0 gate 1602702070452130500 evaluation succeeds +peer0.org2.example.com | [8ea 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8eb 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8ec 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8ed 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8ee 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8ef 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [8f0 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [8f1 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [8f2 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [8f3 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8f4 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8f5 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8f6 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [8f7 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8f8 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8f9 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8fa 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [8fb 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: dead: +peer0.org2.example.com | [8fc 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [8fd 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8fe 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ff 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [900 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [901 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [902 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [903 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [904 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [905 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [906 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [907 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [908 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [909 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [90a 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [90b 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [90c 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [90d 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [90e 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [90f 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [910 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [911 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 gate 1602702070609341800 evaluation starts +peer0.org2.example.com | [912 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [913 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [914 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 principal matched by identity 0 +peer0.org2.example.com | [915 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer0.org2.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer0.org2.example.com | [916 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +peer0.org2.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer0.org2.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer0.org2.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer0.org2.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer0.org2.example.com | [917 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [918 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00333b650 gate 1602702070609341800 evaluation succeeds +peer0.org2.example.com | [919 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [91a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [91b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [91c 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [91d 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [91e 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1602702050573832200 17 {} [] 0} +peer0.org2.example.com | [91f 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [920 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [921 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [922 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +orderer0.example.com | "2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] GetPolicy -> DEBU c52 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] GetPolicy -> DEBU c53 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c54 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c55 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c56 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c57 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] GetPolicy -> DEBU c58 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] GetPolicy -> DEBU c59 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5a Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org1.example.com | [7ab 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7ac 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7ad 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7ae 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7af 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7b0 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7b1 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7b2 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [7b3 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 gate 1602702068731221100 evaluation starts +peer1.org1.example.com | [7b4 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7b5 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [7b6 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [7b7 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [7b8 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [7b9 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org1.example.com | [7ba 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [7bb 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 b9 47 f8 8d fe 9a 03 b7 28 ee ef |0D. 9.G......(..| +peer1.org1.example.com | 00000010 df 54 3f 18 0a 30 09 cc 23 fe 12 31 85 3a 7b d6 |.T?..0..#..1.:{.| +peer1.org1.example.com | 00000020 8f 02 29 2e 02 20 32 1e ac a7 9d 9a c7 bc 15 55 |..).. 2........U| +peer1.org1.example.com | 00000030 ca e8 d2 92 b3 09 32 27 a9 08 c8 03 b3 b0 10 0c |......2'........| +peer1.org1.example.com | 00000040 4e 02 0f b9 d2 a4 |N.....| +peer1.org1.example.com | [7bc 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [7be 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [7bd 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 principal matched by identity 0 +peer1.org1.example.com | [7bf 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [7c0 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 cb 8b f9 93 67 12 fb 8a 0e 54 16 |0D. .....g....T.| +peer1.org1.example.com | 00000010 56 73 17 f6 88 2d bd 2b 76 b4 85 87 c5 48 02 4b |Vs...-.+v....H.K| +peer1.org1.example.com | 00000020 ee f2 91 ac 02 20 24 4c 61 e4 41 f7 64 93 db 35 |..... $La.A.d..5| +peer0.org1.example.com | [7e3 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7e4 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7e5 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45778 +peer0.org1.example.com | [7e6 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45778 +peer0.org1.example.com | [7e7 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7e8 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7e9 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [7ea 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7eb 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45778 disconnected +peer0.org1.example.com | [7ec 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.845Z grpc.peer_address=172.18.0.7:45778 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.246ms +peer0.org1.example.com | [7ed 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7ee 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7ef 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.874Z grpc.peer_address=172.18.0.7:45780 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=781.8µs +peer0.org1.example.com | [7f0 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7f1 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7f2 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7f3 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45780 +peer0.org1.example.com | [7f4 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45780 +peer0.org1.example.com | [7f5 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [923 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [924 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [925 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [926 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [927 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > alive: alive: +peer0.org2.example.com | [928 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [929 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [92a 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [92b 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [92c 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [92d 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [92e 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [92f 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [930 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [931 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [932 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [933 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [934 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [935 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [936 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 gate 1602702070649568800 evaluation starts +peer0.org2.example.com | [937 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [938 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000030 84 3e 8e 84 50 ef 4a cf 0e 5a e7 ec 1b 94 0c fc |.>..P.J..Z......| +peer1.org1.example.com | 00000040 a5 60 9c 5c 2c e6 |.`.\,.| +peer1.org1.example.com | [7c1 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [7c3 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466ab0 gate 1602702068731221100 evaluation succeeds +peer1.org1.example.com | [7c2 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7c4 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7c6 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7c7 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [7c8 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7c5 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161014 +peer1.org1.example.com | [7c9 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B763D270FDB9B4077254438139E71CCF6635AFF7BF8BFA5FC52F7B10A85E9FC9 +peer1.org1.example.com | [7ca 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7cb 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7cc 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [7cd 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [7ce 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes +peer1.org1.example.com | [7cf 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [7d0 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [7d1 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [7d2 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [7d3 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [7d4 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034a4a80, CONNECTING +peer1.org1.example.com | [7d5 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [7d6 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7d7 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [7d8 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7d9 10-14 19:01:08.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0034a4a80, READY +peer1.org1.example.com | [7da 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7db 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [7dc 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [7dd 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [7de 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer0.org1.example.com | [7f6 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f7 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7f8 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f9 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7fa 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7fb 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7fc 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7fd 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7fe 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7ff 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [800 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 gate 1602702068888504100 evaluation starts +peer0.org1.example.com | [801 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [802 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [803 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 principal matched by identity 0 +peer0.org1.example.com | [804 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [805 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 96 ab e5 e9 db 84 dd b8 16 53 1b |0D. L.........S.| +peer0.org1.example.com | 00000010 62 50 40 08 b9 31 34 ee db 6e 40 06 cf 04 33 36 |bP@..14..n@...36| +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c5e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c5f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c60 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c61 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c62 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c63 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.824 UTC [policies] NewManagerImpl -> DEBU c64 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:01:07.824 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:01:07.824 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:01:07.825 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.833 UTC [policies] Manager -> DEBU c93 Manager Channel looking up path [Application]" +peer1.org1.example.com | [7df 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [7e0 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef ab 22 1a 0f 64 b7 35 77 26 5f |0E.!..."..d.5w&_| +peer1.org1.example.com | 00000010 6e 25 bc d5 81 f3 ca 59 93 24 72 e0 ed 40 f9 ad |n%.....Y.$r..@..| +peer1.org1.example.com | 00000020 06 27 bf 96 7d 02 20 00 e2 c2 f7 ca cd 08 5a a1 |.'..}. .......Z.| +peer1.org1.example.com | 00000030 62 bf 2e a5 43 7d 19 6c 91 ae c2 f7 1c c5 ec 3e |b...C}.l.......>| +peer1.org1.example.com | 00000040 e5 03 de 33 06 69 c2 |...3.i.| +peer1.org1.example.com | [7e1 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [7e2 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7e3 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [7e4 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7e5 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9819258719419633674, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer1.org1.example.com | [7e6 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 9819258719419633674, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer1.org1.example.com | [7e7 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7e8 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9819258719419633674, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes +peer1.org1.example.com | [7e9 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [7ea 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +peer1.org1.example.com | 00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +peer1.org1.example.com | [7eb 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +peer1.org1.example.com | 00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +peer1.org1.example.com | 00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +peer1.org1.example.com | 00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +peer1.org1.example.com | 00000040 18 33 db 7a 92 d8 |.3.z..| +peer1.org1.example.com | [7ec 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7ed 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [7ee 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [7ef 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1602702050573832200 16 {} [] 0} +peer1.org1.example.com | [7f0 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7f1 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7f2 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [7f3 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 2e 8d 0c 45 77 67 33 b9 5f 9f 11 b8 0e fc c9 |....Ewg3._......| +peer1.org1.example.com | 00000010 f3 a8 08 5b 83 8b 98 d3 3b 20 da a6 50 79 6e db |...[....; ..Pyn.| +peer1.org1.example.com | [7f4 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 45 17 9d cb 87 2e ea fd e6 d6 26 |0D. IE.........&| +peer1.org1.example.com | 00000010 23 76 2d ff d6 18 7e 1b 00 27 aa 23 2b f2 51 a6 |#v-...~..'.#+.Q.| +peer1.org1.example.com | 00000020 84 f5 97 97 02 20 27 a9 21 3e 4f 4c 8d eb c4 38 |..... '.!>OL...8| +peer1.org1.example.com | 00000030 40 5c 72 19 4e 6d dd 0e 46 2e db 27 9d be 4e f3 |@\r.Nm..F..'..N.| +peer1.org1.example.com | 00000040 d6 9c c0 26 0c 7f |...&..| +peer1.org1.example.com | [7f5 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7f6 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7f7 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7f8 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [7f9 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7fa 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7fb 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7fc 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7fd 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7fe 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7ff 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [800 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 gate 1602702068799779200 evaluation starts +peer1.org1.example.com | [801 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [802 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [803 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 principal matched by identity 0 +peer1.org1.example.com | [804 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 33 88 49 3d 13 dd aa 06 5a 86 00 0b 48 5a 75 |D3.I=....Z...HZu| +peer1.org1.example.com | 00000010 a0 5c 13 cd d8 b7 cd 5d 2e d0 a1 93 41 28 8a e2 |.\.....]....A(..| +peer1.org1.example.com | [805 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 8a 1d ca fa b9 85 4b 5b 62 45 37 |0D. .......K[bE7| +peer1.org1.example.com | 00000010 a2 c2 1f 99 7d 1a 79 0c dd bc b8 8b 71 e9 c1 d4 |....}.y.....q...| +peer1.org1.example.com | 00000020 f9 94 80 02 02 20 10 9b 55 84 bc ee 54 66 45 05 |..... ..U...TfE.| +peer1.org1.example.com | 00000030 0a 51 59 15 2d 81 fb 28 c1 6d 1d 87 2e c2 58 9e |.QY.-..(.m....X.| +peer1.org1.example.com | 00000040 e4 eb 39 79 a2 af |..9y..| +peer1.org1.example.com | [806 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [807 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ffbb0 gate 1602702068799779200 evaluation succeeds +peer1.org1.example.com | [808 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [809 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [80a 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [80b 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [80c 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [80d 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org1.example.com | [80e 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [80f 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [810 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [811 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [812 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [813 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [814 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [815 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 63 d2 70 fd b9 b4 07 72 54 43 81 39 e7 1c cf |.c.p....rTC.9...| +peer1.org1.example.com | 00000010 66 35 af f7 bf 8b fa 5f c5 2f 7b 10 a8 5e 9f c9 |f5....._./{..^..| +peer1.org1.example.com | [816 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 68 02 fe a3 8f 18 16 6e 63 35 |0E.!..h......nc5| +peer1.org1.example.com | 00000010 eb 59 92 99 f4 4d ac fa 1c f4 ae 43 16 84 fb f0 |.Y...M.....C....| +peer1.org1.example.com | 00000020 66 0f b4 ed fb 02 20 3b f0 af fc 75 d9 2c b0 d4 |f..... ;...u.,..| +peer1.org1.example.com | 00000030 73 3b 58 a7 1f 07 88 f4 ef fd 3c 65 54 fe 33 7e |s;X....... DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [818 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 8c 4f da db d1 c3 f5 b1 09 cd |0E.!...O........| +peer1.org1.example.com | 00000010 b4 42 0e fa d2 31 6c 3d c8 56 d7 b2 39 09 75 ab |.B...1l=.V..9.u.| +peer1.org1.example.com | 00000020 37 b4 35 e6 6c 02 20 1f 88 94 5f 1e a5 35 87 2b |7.5.l. ..._..5.+| +peer1.org1.example.com | 00000030 1c f7 c2 90 68 c8 e4 a8 c0 52 1d bd 05 1f 6d 13 |....h....R....m.| +peer1.org1.example.com | 00000040 61 09 7f 51 ba 9a 98 |a..Q...| +orderer0.example.com | "2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c94 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c95 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c96 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c97 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c98 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c99 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c9a As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c9b As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9c Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9d Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9e Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [policies] Manager -> DEBU c9f Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [policies] Manager -> DEBU ca0 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca1 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca2 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca3 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca4 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:01:07.836 UTC [common.capabilities] Supported -> DEBU ca5 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:07.837 UTC [common.capabilities] Supported -> DEBU ca6 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:01:07.837 UTC [orderer.common.server] func1 -> DEBU ca7 Executing callback to update root CAs" +orderer0.example.com | "2020-10-14 19:01:07.837 UTC [orderer.common.server] updateTrustedRoots -> DEBU ca8 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-10-14 19:01:07.837 UTC [orderer.common.server] updateTrustedRoots -> DEBU ca9 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-10-14 19:01:07.838 UTC [orderer.common.server] updateTrustedRoots -> DEBU caa adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-10-14 19:01:07.838 UTC [orderer.common.server] updateTrustedRoots -> DEBU cab adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cac [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cad [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [msp] GetDefaultSigningIdentity -> DEBU cae Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [msp] GetDefaultSigningIdentity -> DEBU caf Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [msp.identity] Sign -> DEBU cb0 Sign: plaintext: 0A020802120B0A090A03010203100418...CE8A38261AE4490D996766ECBE60BC31 " +orderer0.example.com | "2020-10-14 19:01:07.839 UTC [msp.identity] Sign -> DEBU cb1 Sign: digest: FDFF188FF052AE4DE51FF1E2F3D0AD887E08F7CDA536BD15DBEBD7BC10D7F107 " +orderer0.example.com | "2020-10-14 19:01:07.842 UTC [fsblkstorage] indexBlock -> DEBU cb2 Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +orderer0.example.com | txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:07.844 UTC [fsblkstorage] updateCheckpoint -> DEBU cb3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84816], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2020-10-14 19:01:07.844 UTC [orderer.commmon.multichannel] commitBlock -> DEBU cb4 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2020-10-14 19:01:08.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:08.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 143µs" +orderer0.example.com | "2020-10-14 19:01:08.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +orderer0.example.com | "2020-10-14 19:01:08.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 214.3µs" +orderer0.example.com | "2020-10-14 19:01:08.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +orderer0.example.com | "2020-10-14 19:01:08.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +orderer0.example.com | "2020-10-14 19:01:08.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:08.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +orderer0.example.com | "2020-10-14 19:01:08.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:08.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:08.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2020-10-14 19:01:08.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 505µs " +orderer0.example.com | "2020-10-14 19:01:08.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-10-14 19:01:08.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +peer0.org2.example.com | [939 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 principal matched by identity 0 +peer0.org2.example.com | [93a 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 5b 43 b3 98 c3 2b 83 3e 57 3d 0f 4a a5 a9 2a |.[C...+.>W=.J..*| +peer0.org2.example.com | 00000010 9e 2f 3d a1 98 2d f9 3f 49 4a 69 87 cf 3f c8 b2 |./=..-.?IJi..?..| +peer0.org2.example.com | [93b 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 9b 46 40 42 a6 42 c5 8c 46 dc |0E.!...F@B.B..F.| +peer0.org2.example.com | 00000010 e6 9f 86 17 2f 23 b5 78 25 7b 8b fd f8 e7 05 0e |..../#.x%{......| +peer0.org2.example.com | 00000020 d2 1c 09 3d 58 02 20 5e 61 79 5f 39 e7 89 6e 7c |...=X. ^ay_9..n|| +peer0.org2.example.com | 00000030 75 c6 a9 be a9 c6 d4 52 d6 e9 46 2b 37 f8 65 08 |u......R..F+7.e.| +peer0.org2.example.com | 00000040 73 20 96 5d 58 33 30 |s .]X30| +peer0.org2.example.com | [93c 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [93d 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379390 gate 1602702070649568800 evaluation succeeds +peer0.org2.example.com | [93e 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [93f 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [940 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [941 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [942 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [943 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [944 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [945 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [946 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [947 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [948 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [949 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [94a 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [94b 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [94c 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [94d 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [94e 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [94f 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [950 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [951 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [952 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [953 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [954 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [955 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [956 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [957 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [958 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [959 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [95a 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [95b 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [95c 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [95d 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [95e 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [960 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [95f 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [963 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [9b3 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [9b4 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [9b5 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9b6 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9b7 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9b8 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9b9 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9ba 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [9bb 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 gate 1602702075298842100 evaluation starts +peer1.org2.example.com | [9bc 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [9bd 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [9be 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [9bf 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 principal evaluation fails +peer1.org2.example.com | [9c0 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118600 gate 1602702075298842100 evaluation fails +peer1.org2.example.com | [9c1 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9c2 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9c3 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [9c4 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 gate 1602702075304371300 evaluation starts +peer1.org2.example.com | [9c5 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [9c6 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [9c7 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [9c8 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [9c9 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [9ca 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 principal matched by identity 0 +peer1.org1.example.com | [819 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [81a 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [81b 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [81c 10-14 19:01:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [81d 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [81e 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [81f 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [820 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [821 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [822 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [823 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [824 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [825 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [826 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [827 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [828 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [829 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [82a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [82b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [82c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [82d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [82e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [82f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [830 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 gate 1602702069972405300 evaluation starts +peer1.org1.example.com | [831 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [832 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [833 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [834 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 principal evaluation fails +peer1.org1.example.com | [835 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003538ca0 gate 1602702069972405300 evaluation fails +peer1.org1.example.com | [836 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [837 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [838 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [839 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 gate 1602702069975751800 evaluation starts +peer1.org1.example.com | [83a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [83b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [83c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | 00000020 12 fa aa 59 02 20 00 af 23 4b fe 51 a5 cc 68 83 |...Y. ..#K.Q..h.| +peer0.org1.example.com | 00000030 4c a8 7b 10 b8 71 8a 0c 38 ac 3c 70 2f d5 09 cb |L.{..q..8.

DEBU 0xc002969e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [807 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 gate 1602702068888504100 evaluation succeeds +peer0.org1.example.com | [808 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [809 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [80a 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [80b 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [80c 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45780 +peer0.org1.example.com | [80d 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45780 +peer0.org1.example.com | [80e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45780 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [80f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [810 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [811 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [812 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [813 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [814 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [815 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [816 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [817 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [818 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [819 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 gate 1602702068922018600 evaluation starts +peer0.org1.example.com | [81a 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [81b 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [81c 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 principal matched by identity 0 +peer0.org1.example.com | [81d 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 d5 7e 86 78 cd 4b eb 80 d5 68 10 92 99 09 65 |..~.x.K...h....e| +peer0.org1.example.com | 00000010 93 f1 5e 1e af 40 ab 24 c1 42 26 52 a3 2b b0 f9 |..^..@.$.B&R.+..| +peer0.org1.example.com | [81e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 60 20 e1 90 42 97 7e 78 b5 e5 b2 |0D. N` ..B.~x...| +peer0.org1.example.com | 00000010 17 52 0b 48 5e ea 8f 88 78 38 be 34 20 ae d4 da |.R.H^...x8.4 ...| +peer0.org1.example.com | 00000020 0f 65 5f 99 02 20 68 54 55 b8 f5 d0 52 0b cc c1 |.e_.. hTU...R...| +peer0.org1.example.com | 00000030 35 13 d0 5b b6 7f 9c bf 91 60 87 c7 84 59 5c dd |5..[.....`...Y\.| +peer0.org1.example.com | 00000040 6c ab 52 18 ef 92 |l.R...| +peer0.org1.example.com | [81f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [820 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 gate 1602702068922018600 evaluation succeeds +peer0.org2.example.com | [961 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [962 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [964 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [965 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [966 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [968 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [967 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408E0CCCDAC8DA1FC9E16...9C09DCBB6042B0C019B601802A020803 +peer0.org2.example.com | [969 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [96a 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [96b 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [96c 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org2.example.com | [96d 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4BC2BC58DF95F66CC6A83A9E4963F880257140D83AC69BFDDA5BCE3023B23116 +peer0.org2.example.com | [96e 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer0.org2.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer0.org2.example.com | [96f 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer0.org2.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer0.org2.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer0.org2.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer0.org2.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer0.org2.example.com | [970 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [971 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [972 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [973 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [974 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [976 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [977 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [978 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [979 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [97a 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [97b 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [97c 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [97d 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [975 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [97e 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [97f 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [980 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 gate 1602702070707121700 evaluation starts +peer0.org2.example.com | [981 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [83d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2020-10-14 19:01:08.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +peer1.org2.example.com | [9cb 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer0.org1.example.com | [821 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [982 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [83e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | "2020-10-14 19:01:08.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.6µs " +peer1.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer0.org1.example.com | [822 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [83f 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 principal matched by identity 0 +peer0.org2.example.com | [983 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +orderer0.example.com | "2020-10-14 19:01:08.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [9cc 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 93 db 1d 90 04 4a 71 e3 4a 77 |0E.!.......Jq.Jw| +peer0.org1.example.com | [823 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [840 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | [984 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 principal evaluation fails +orderer0.example.com | "2020-10-14 19:01:08.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 5d 7d 59 25 26 9c b2 e2 4a 04 18 6b 92 b9 a2 98 |]}Y%&...J..k....| +peer0.org1.example.com | [824 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [985 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339da30 gate 1602702070707121700 evaluation fails +peer1.org2.example.com | 00000020 25 fd b2 b1 b6 02 20 04 49 ec a7 b5 ab 8c 08 e9 |%..... .I.......| +peer1.org2.example.com | 00000030 49 a6 25 70 bd dd 25 38 c8 05 4d 66 a1 ec c4 c9 |I.%p..%8..Mf....| +peer0.org1.example.com | [825 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 55 58 a2 d0 10 df 2d |UX....-| +peer1.org2.example.com | [9cd 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [826 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-10-14 19:01:09.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:09.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer0.org1.example.com | [827 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [828 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-10-14 19:01:09.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.1µs " +peer1.org1.example.com | [841 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | [9ce 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118b90 gate 1602702075304371300 evaluation succeeds +peer0.org1.example.com | [829 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-10-14 19:01:09.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-10-14 19:01:09.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-10-14 19:01:09.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.1µs " +peer0.org1.example.com | [82a 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [986 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [82b 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | [9cf 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [82c 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | [9d0 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [82d 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [987 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:01:09.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.6µs " +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | [9d1 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [82e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [988 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-10-14 19:01:09.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU cce Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [9d2 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [82f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [830 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:01:09.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [842 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9d3 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [831 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org2.example.com | [989 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 gate 1602702070709282500 evaluation starts +orderer0.example.com | "2020-10-14 19:01:09.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [843 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539af0 gate 1602702069975751800 evaluation succeeds +peer1.org2.example.com | [9d4 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [832 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [98a 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:01:09.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 946.8µs" +peer1.org1.example.com | [844 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [845 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [833 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [98b 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:01:09.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.6µs " +peer1.org1.example.com | [846 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [9d5 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 9074720330768558081, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [834 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.948Z grpc.peer_address=172.18.0.7:45782 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=272.6µs +peer0.org2.example.com | [98c 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [98d 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [847 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [848 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [835 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [836 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | [849 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:09.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +peer0.org1.example.com | [837 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org2.example.com | [9d6 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [84a 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [84b 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [838 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:45782 +peer1.org2.example.com | [9d7 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [84c 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [84d 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:09.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 834.3µs " +peer1.org2.example.com | [9d8 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [839 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45782 +peer1.org1.example.com | [84e 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +orderer0.example.com | "2020-10-14 19:01:09.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel businesschannel took 249.3µs" +peer0.org2.example.com | [98e 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [83a 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9d9 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [84f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [850 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | [98f 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 principal matched by identity 0 +peer0.org1.example.com | [83b 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9da 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [990 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer0.org2.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer0.org1.example.com | [83c 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9db 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [851 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | [991 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer0.org1.example.com | [83d 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:09.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498µs " +peer1.org2.example.com | [9dc 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 3 +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer0.org1.example.com | [83e 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:09.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [9dd 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer0.org1.example.com | [83f 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:09.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [9de 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13312233161659412571, Envelope: 961 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer0.org1.example.com | [840 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:01:10.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [9df 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer0.org1.example.com | [841 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:01:10.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +peer1.org2.example.com | [9e0 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [852 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [992 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [842 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [843 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9e1 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [994 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [844 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [9e2 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:01:10.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +peer0.org2.example.com | [993 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [845 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 gate 1602702068954996100 evaluation starts +orderer0.example.com | "2020-10-14 19:01:10.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +peer1.org2.example.com | [9e3 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [853 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [995 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dc880 gate 1602702070709282500 evaluation succeeds +peer0.org1.example.com | [846 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:01:10.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +peer1.org2.example.com | [9e4 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9e5 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [854 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [855 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:10.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +peer1.org2.example.com | [9e6 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 gate 1602702075315878500 evaluation starts +peer1.org1.example.com | [856 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [996 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [997 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [847 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:01:10.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.9µs " +peer1.org1.example.com | [857 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [998 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [848 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:01:10.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [9e7 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [858 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [999 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [849 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +orderer0.example.com | "2020-10-14 19:01:10.196 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [9e8 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [859 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [99a 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +orderer0.example.com | "2020-10-14 19:01:10.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [9e9 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [85a 10-14 19:01:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [99b 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [84a 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 d8 12 dd e7 dc f4 e8 e1 75 94 0c |0D. .........u..| +orderer0.example.com | "2020-10-14 19:01:10.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138µs " +peer1.org2.example.com | [9ea 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 principal evaluation fails +peer1.org1.example.com | [85b 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [99c 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 42 a1 1e 2c 7e b3 bd 54 ce 62 2b 6d 77 b2 e5 09 |B..,~..T.b+mw...| +orderer0.example.com | "2020-10-14 19:01:10.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 84.8µs" +peer1.org2.example.com | [9eb 10-14 19:01:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003147860 gate 1602702075315878500 evaluation fails +peer1.org1.example.com | [85c 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [99d 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 16 ad 05 b4 02 20 7a 2e 5b dc bc c0 6e 7a 9f 06 |..... z.[...nz..| +orderer0.example.com | "2020-10-14 19:01:10.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +peer1.org2.example.com | [9ec 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [99e 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [85d 10-14 19:01:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 a3 0b 48 9e 58 4d 4d 15 1f 54 37 e6 50 f1 28 7f |..H.XMM..T7.P.(.| +peer0.org2.example.com | [99f 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [85e 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 d6 cd 02 2a 3c 8f |...*<.| +peer1.org2.example.com | [9ed 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:01:10.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +peer0.org2.example.com | [9a0 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [85f 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [84b 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9ee 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-10-14 19:01:10.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.4µs " +peer0.org2.example.com | [9a1 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9a2 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 gate 1602702070732504700 evaluation starts +peer0.org1.example.com | [84c 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 gate 1602702068954996100 evaluation succeeds +peer1.org2.example.com | [9ef 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 gate 1602702075321943900 evaluation starts +orderer0.example.com | "2020-10-14 19:01:10.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +peer0.org2.example.com | [9a3 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [84d 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [860 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [861 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [9a4 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:01:10.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [84e 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [84f 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [862 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9a5 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:01:10.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [850 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [863 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9f0 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9a6 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +orderer0.example.com | "2020-10-14 19:01:11.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [851 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45782 +peer1.org1.example.com | [864 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9f1 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +orderer0.example.com | "2020-10-14 19:01:11.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +peer0.org1.example.com | [852 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45782 +peer1.org1.example.com | [865 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9f2 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 principal matched by identity 0 +peer0.org2.example.com | [9a7 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +orderer0.example.com | "2020-10-14 19:01:11.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +peer0.org1.example.com | [853 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [866 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9f3 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +orderer0.example.com | "2020-10-14 19:01:11.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +peer0.org1.example.com | [854 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45780 disconnected +peer1.org1.example.com | [867 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +orderer0.example.com | "2020-10-14 19:01:11.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | [855 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45780 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=73.4672ms +peer1.org1.example.com | [868 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [9f4 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 38 38 3e f0 ca 9b 8c d8 f0 2d 18 |0D. ;88>......-.| +orderer0.example.com | "2020-10-14 19:01:11.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.4µs " +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | [856 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [869 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 gate 1602702070165014600 evaluation starts +peer1.org2.example.com | 00000010 b7 87 f4 70 e6 25 52 0c 1b 8c e0 cb ed 4c 1b 91 |...p.%R......L..| +orderer0.example.com | "2020-10-14 19:01:11.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227µs " +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [857 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45782 disconnected +peer1.org1.example.com | [86a 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 91 8a 6f c0 02 20 0b d8 77 32 2c f8 ce ee 02 f4 |..o.. ..w2,.....| +orderer0.example.com | "2020-10-14 19:01:11.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [9a8 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [858 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.951Z grpc.peer_address=172.18.0.7:45782 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.0486ms +peer1.org1.example.com | [86b 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | 00000030 e1 8e d3 5e 65 ce 81 82 af d7 44 89 ff 80 f5 17 |...^e.....D.....| +orderer0.example.com | "2020-10-14 19:01:11.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [9a9 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ecd20 gate 1602702070732504700 evaluation succeeds +peer0.org1.example.com | [859 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer1.org1.example.com | [86c 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 principal matched by identity 0 +peer1.org2.example.com | 00000040 8f c1 f4 89 79 c5 |....y.| +orderer0.example.com | "2020-10-14 19:01:11.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [9aa 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [85a 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [86d 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 06 10 b1 79 62 84 0d 61 60 04 91 da 78 03 4b |S...yb..a`...x.K| +peer1.org2.example.com | [9f5 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-10-14 19:01:11.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +peer0.org2.example.com | [9ab 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [85b 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | 00000010 84 05 0e 39 40 ad c9 28 f2 c1 b1 52 8a 90 82 b9 |...9@..(...R....| +peer1.org2.example.com | [9f6 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ab870 gate 1602702075321943900 evaluation succeeds +orderer0.example.com | "2020-10-14 19:01:11.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +peer0.org2.example.com | [9ac 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [85c 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.108Z grpc.peer_address=172.18.0.6:48726 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=232.1µs +peer1.org1.example.com | [86e 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 21 cf 75 a9 a5 a2 db 2f f9 a2 |0E.!..!.u..../..| +peer1.org2.example.com | [9f7 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:01:11.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +peer0.org2.example.com | [9ad 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [85d 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 ce 34 4b 9d 79 9c e2 30 54 f4 98 65 db 48 0e ce |.4K.y..0T..e.H..| +peer1.org2.example.com | [9f8 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:01:11.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +peer0.org2.example.com | [9ae 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [85e 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | 00000020 fc 44 3c 51 b1 02 20 5e 1b 7f c5 e3 89 05 fa 0d |.D DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:01:11.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " +peer0.org2.example.com | [9af 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes +peer0.org1.example.com | [85f 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org1.example.com | 00000030 4f 9d 1b 3e 8b 01 86 16 d4 02 0a 80 fc fa 73 98 |O..>..........s.| +peer1.org2.example.com | [9fa 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:01:11.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +peer0.org2.example.com | [9b0 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [860 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:48726 +peer1.org1.example.com | 00000040 06 1e 9a 70 a6 01 7b |...p..{| +peer1.org2.example.com | [9fb 10-14 19:01:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:11.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [9b1 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [861 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48726 +peer1.org1.example.com | [86f 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9fc 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:11.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [9b2 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [862 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [870 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00354be40 gate 1602702070165014600 evaluation succeeds +peer1.org2.example.com | [9fd 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13312233161659412571, Envelope: 961 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:12.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [9b3 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [863 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [871 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9fe 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:12.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +peer0.org2.example.com | [9b4 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [864 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [872 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:01:12.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219µs " +peer1.org2.example.com | [9ff 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9b5 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [873 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:01:12.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +peer1.org2.example.com | [a00 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9b6 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [874 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:01:12.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +peer1.org2.example.com | [a01 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9b7 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [875 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:01:12.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +peer1.org2.example.com | [a02 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [9b8 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [876 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-10-14 19:01:12.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.4µs " +peer1.org2.example.com | [a03 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 4 +peer0.org2.example.com | [9b9 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 gate 1602702070738517000 evaluation starts +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-10-14 19:01:12.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [877 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [a04 10-14 19:01:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ba 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +orderer0.example.com | "2020-10-14 19:01:12.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [878 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [a05 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [9bb 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +orderer0.example.com | "2020-10-14 19:01:12.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [879 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [a06 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9bc 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 principal matched by identity 0 +peer0.org2.example.com | [9bd 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | [87a 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:12.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | [9be 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org1.example.com | [87b 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | [a07 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:01:12.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.9µs " +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [87c 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +orderer0.example.com | "2020-10-14 19:01:12.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +peer1.org2.example.com | [a08 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [865 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [87e 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +orderer0.example.com | "2020-10-14 19:01:12.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 8.7µs" +peer1.org2.example.com | [a09 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [866 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [87d 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +orderer0.example.com | "2020-10-14 19:01:12.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +peer1.org2.example.com | [a0a 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [867 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [880 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9bf 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-10-14 19:01:12.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.6µs " +peer1.org2.example.com | [a0b 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [868 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [881 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9c0 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd900 gate 1602702070738517000 evaluation succeeds +orderer0.example.com | "2020-10-14 19:01:12.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [a0c 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [869 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [87f 10-14 19:01:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9c1 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a0d 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [86a 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [882 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [9c2 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:01:12.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [a0e 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [86b 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [883 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\213\001\206\026\324\002\n\200\374\372s\230\006\036\232p\246\001{" > alive: +peer0.org2.example.com | [9c3 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a0f 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a10 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 gate 1602702075467167700 evaluation starts +peer1.org2.example.com | [a11 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a12 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a13 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [86c 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [86d 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [86e 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [86f 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [870 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [871 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [872 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 gate 1602702069117496500 evaluation starts +peer0.org1.example.com | [873 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [874 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [875 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [876 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [877 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [878 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 principal matched by identity 0 +peer0.org1.example.com | [879 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [87a 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 87 7f b9 18 de 16 f1 7b a7 d1 |0E.!.........{..| +peer0.org1.example.com | 00000010 ba a1 1a ef 4e ee 3f c0 03 a4 8b ed 52 6b cf 10 |....N.?.....Rk..| +peer0.org1.example.com | 00000020 31 bd fb 39 82 02 20 11 a3 3f 08 e3 19 93 c8 56 |1..9.. ..?.....V| +peer0.org1.example.com | 00000030 df cf 89 2a c6 f3 34 3b 12 67 0b 6f 84 da 22 c9 |...*..4;.g.o..".| +peer0.org1.example.com | 00000040 88 bd 2c 3a 89 d0 2e |..,:...| +peer0.org1.example.com | [87b 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [87c 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 gate 1602702069117496500 evaluation succeeds +peer0.org1.example.com | [87d 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [87e 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [87f 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [880 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [881 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48726 +peer0.org1.example.com | [882 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48726 +peer0.org1.example.com | [883 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [884 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [885 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48726 disconnected +peer0.org1.example.com | [886 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:19.111Z grpc.peer_address=172.18.0.6:48726 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.624ms +peer0.org1.example.com | [887 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [888 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.164Z grpc.peer_address=172.18.0.6:48728 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=209.4µs +peer0.org1.example.com | [889 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [88a 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [88b 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [88c 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:48728 +peer0.org1.example.com | [88d 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A\nn80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2\nz+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E\nAwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48728 +peer0.org1.example.com | [88e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [88f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [890 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [891 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [892 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [893 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [894 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [895 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [896 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [897 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [898 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [899 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 gate 1602702069174059000 evaluation starts +peer0.org1.example.com | [89a 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [89b 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [89c 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 principal matched by identity 0 +peer0.org1.example.com | [89d 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [89e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 28 86 44 46 ec b1 5b 82 29 22 9d |0D. Q(.DF..[.)".| +peer0.org1.example.com | 00000010 a4 54 7d 86 07 a4 87 0c 2c c1 95 35 ce bc 90 d3 |.T}.....,..5....| +peer0.org1.example.com | 00000020 4e 11 a6 d7 02 20 0b 67 00 70 94 9e ad 95 5d 59 |N.... .g.p....]Y| +peer0.org1.example.com | 00000030 62 79 34 d7 15 96 87 5d 33 cd 08 1f 79 60 3b 85 |by4....]3...y`;.| +peer0.org1.example.com | 00000040 40 ab ec 75 bf 53 |@..u.S| +peer0.org1.example.com | [89f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8a0 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 gate 1602702069174059000 evaluation succeeds +peer0.org1.example.com | [8a1 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8a2 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8a3 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8a4 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8a5 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48728 +peer0.org1.example.com | [8a6 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48728 +peer0.org1.example.com | [8a7 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48728 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [8a8 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8a9 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [8aa 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [8ab 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8ac 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8ad 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a14 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 principal evaluation fails +peer1.org2.example.com | [a15 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c5b0 gate 1602702075467167700 evaluation fails +peer1.org2.example.com | [a16 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a17 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a18 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a19 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a1a 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a1b 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 gate 1602702075470397600 evaluation starts +peer1.org2.example.com | [a1c 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a1d 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a1e 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 principal matched by identity 0 +peer1.org2.example.com | [a1f 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 f3 3a 52 71 b5 a6 4d 6e 16 6d 9e 16 73 0d 0c |r.:Rq..Mn.m..s..| +peer1.org2.example.com | 00000010 31 37 fb e9 eb ac 19 8f 85 91 3e 92 e0 d4 64 ee |17........>...d.| +peer1.org2.example.com | [a20 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 ce b6 43 3e a5 6e 4f 1a fc 74 |0E.!....C>.nO..t| +peer1.org2.example.com | 00000010 f3 b6 48 1e bf 1a 81 05 a3 78 ca 7e 58 ef 08 e8 |..H......x.~X...| +peer1.org2.example.com | 00000020 9e 64 d2 a7 e6 02 20 60 ce bf ae 18 d3 eb 4c 0c |.d.... `......L.| +peer1.org2.example.com | 00000030 40 97 d1 22 d0 34 2f f6 e9 af a1 16 db 58 19 6c |@..".4/......X.l| +peer1.org2.example.com | 00000040 e7 90 32 59 77 c3 15 |..2Yw..| +peer1.org2.example.com | [a21 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a22 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322cb20 gate 1602702075470397600 evaluation succeeds +peer1.org2.example.com | [a23 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a24 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a25 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a26 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9c4 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9c5 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9c6 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9c7 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9c8 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9c9 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9ca 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9cb 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9cc 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9cd 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 gate 1602702070743067100 evaluation starts +peer0.org2.example.com | [9ce 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9cf 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [9d0 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 principal matched by identity 0 +peer0.org2.example.com | [9d1 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [9d2 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [9d3 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [9d4 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00340cb00 gate 1602702070743067100 evaluation succeeds +peer0.org2.example.com | [9d5 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9d6 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9d7 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [9d8 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9d9 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer0.org2.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer0.org2.example.com | [9da 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer0.org2.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer0.org2.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer0.org2.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer0.org2.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer0.org2.example.com | [9db 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9dc 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes +peer0.org2.example.com | [9dd 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9de 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9df 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e0 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9e1 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9e2 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9e3 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9e4 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [884 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes +peer1.org1.example.com | [885 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [886 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [887 10-14 19:01:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [888 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [889 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [88a 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [88b 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [88c 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [88d 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [88e 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 gate 1602702070183336200 evaluation starts +peer1.org1.example.com | [88f 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:01:13.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-10-14 19:01:13.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 777.6µs " +orderer0.example.com | "2020-10-14 19:01:13.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +orderer0.example.com | "2020-10-14 19:01:13.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.5µs " +orderer0.example.com | "2020-10-14 19:01:13.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d14 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d15 Sending msg of 28 bytes to 3 on channel businesschannel took 1.3835ms" +orderer0.example.com | "2020-10-14 19:01:13.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.6µs " +orderer0.example.com | "2020-10-14 19:01:13.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +orderer0.example.com | "2020-10-14 19:01:13.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2020-10-14 19:01:13.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2020-10-14 19:01:13.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +orderer0.example.com | "2020-10-14 19:01:13.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " +orderer0.example.com | "2020-10-14 19:01:13.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +orderer0.example.com | "2020-10-14 19:01:13.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:13.951 UTC [orderer.common.server] Broadcast -> DEBU d21 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:01:13.951 UTC [orderer.common.broadcast] Handle -> DEBU d22 Starting new broadcast loop for 172.18.0.9:40044" +orderer0.example.com | "2020-10-14 19:01:14.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d23 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +orderer0.example.com | "2020-10-14 19:01:14.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +orderer0.example.com | "2020-10-14 19:01:14.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-10-14 19:01:14.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2020-10-14 19:01:14.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +orderer0.example.com | "2020-10-14 19:01:14.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.4µs " +orderer0.example.com | "2020-10-14 19:01:14.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2020-10-14 19:01:14.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +orderer0.example.com | "2020-10-14 19:01:14.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2f Sending msg of 28 bytes to 3 on channel businesschannel took 52.9µs" +orderer0.example.com | "2020-10-14 19:01:14.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 2 on channel businesschannel took 11.1µs" +orderer0.example.com | "2020-10-14 19:01:14.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-10-14 19:01:14.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:14.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327µs " +orderer0.example.com | "2020-10-14 19:01:15.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:15.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2020-10-14 19:01:15.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +orderer0.example.com | "2020-10-14 19:01:15.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2020-10-14 19:01:15.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d39 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:15.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.2µs " +orderer0.example.com | "2020-10-14 19:01:15.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 342.3µs " +orderer0.example.com | "2020-10-14 19:01:15.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:15.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:15.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:15.591 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-10-14 19:01:15.592 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313µs " +orderer0.example.com | "2020-10-14 19:01:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +orderer0.example.com | "2020-10-14 19:01:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d42 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-10-14 19:01:15.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +orderer0.example.com | "2020-10-14 19:01:15.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.4µs " +orderer0.example.com | "2020-10-14 19:01:15.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:15.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [a27 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a28 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer1.org2.example.com | [a29 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a2a 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a2b 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a2c 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a2d 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a2e 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a2f 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a30 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a31 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a32 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a33 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a34 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a35 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a36 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a37 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [a38 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a39 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [a3a 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a3b 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a3c 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a3d 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [a3e 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [a3f 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [a40 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer1.org2.example.com | [a41 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [a42 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032cd860, CONNECTING +peer1.org2.example.com | [a43 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032cd860, READY +peer1.org2.example.com | [a44 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [a45 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [a46 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [a47 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051 +peer1.org2.example.com | [a48 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer1.org2.example.com | [a49 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e5 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9e6 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 gate 1602702070761102400 evaluation starts +peer0.org2.example.com | [9e7 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9e8 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [9e9 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 principal matched by identity 0 +peer0.org2.example.com | [9ea 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [9eb 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [9ec 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [9ed 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003430640 gate 1602702070761102400 evaluation succeeds +peer0.org2.example.com | [9ee 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9ef 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9f0 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [9f1 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9f2 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer0.org2.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer0.org2.example.com | [9f3 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer0.org2.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer0.org2.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer0.org2.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer0.org2.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer0.org2.example.com | [9f4 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer0.org2.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer0.org2.example.com | [9f5 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer0.org2.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer0.org2.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer0.org2.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer0.org2.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer0.org2.example.com | [9f6 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f7 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f8 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a4a 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a4b 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a4c 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a4d 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a4e 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a4f 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a50 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [890 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [891 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 principal matched by identity 0 +peer1.org1.example.com | [892 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 c9 b3 da 44 38 4e b4 ee af 71 ff 4c 4c b8 d8 |....D8N...q.LL..| +peer1.org1.example.com | 00000010 37 a7 e8 68 5f e1 72 84 93 c8 04 de ad a2 db 58 |7..h_.r........X| +peer1.org1.example.com | [893 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 ae 83 c0 d8 ed f5 66 84 c6 23 |0E.!........f..#| +peer1.org1.example.com | 00000010 70 7c 5d 2c d0 ad 92 9e 5b 99 84 92 19 d3 81 9f |p|],....[.......| +peer1.org1.example.com | 00000020 c6 66 cc 6b ea 02 20 1c f1 d8 bc 34 6f 12 b9 a2 |.f.k.. ....4o...| +peer1.org1.example.com | 00000030 38 2c 86 ef b4 53 86 93 b2 a1 aa 9a 4f b7 11 e7 |8,...S......O...| +peer1.org1.example.com | 00000040 16 5b 19 fb bf 5d 8e |.[...].| +peer1.org1.example.com | [894 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [895 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e5f0 gate 1602702070183336200 evaluation succeeds +peer1.org1.example.com | [896 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [897 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [898 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [899 10-14 19:01:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [89a 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [89b 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [89c 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [89d 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [89e 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [89f 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a0 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a1 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a2 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8a3 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8a4 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8a5 10-14 19:01:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8a6 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [8a7 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8a8 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a9 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8aa 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8ab 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8ac 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8ad 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [8ae 10-14 19:01:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8af 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [8b1 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0D0DF898CA1FC9E16...387B0008A61A99B98BA4E6D12A020803 +peer1.org1.example.com | [8b2 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 070802E05DBC2434D8DEB66783C7E9EAAEDB151CFFD98BB5AD9E01417BB0144A +peer1.org1.example.com | [8b0 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8b3 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer0.org1.example.com | [8ae 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8af 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [8b0 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [8b1 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8b2 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 gate 1602702069198677900 evaluation starts +peer0.org1.example.com | [8b3 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8b4 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [8b5 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 principal matched by identity 0 +peer0.org1.example.com | [8b6 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 93 da 1f b7 61 97 34 2d a2 c7 7f d4 ee 06 db |.....a.4-.......| +peer0.org1.example.com | 00000010 b7 a5 c8 74 35 6a 48 04 7a 40 1e ef ce 20 d2 9a |...t5jH.z@... ..| +peer0.org1.example.com | [8b7 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 1c 82 5d c3 66 d1 1b f6 3c dd 86 |0D. :..].f...<..| +peer0.org1.example.com | 00000010 8b d2 67 74 03 08 9d c1 f1 28 89 d4 d8 f7 3e 7c |..gt.....(....>|| +peer0.org1.example.com | 00000020 d8 d1 4d 5d 02 20 43 c6 59 86 4a ac 0c e6 cf 1e |..M]. C.Y.J.....| +peer0.org1.example.com | 00000030 b1 ec 53 3a 42 62 e2 22 1b 20 5f 62 27 a6 88 9c |..S:Bb.". _b'...| +peer0.org1.example.com | 00000040 94 10 bd 9c c9 63 |.....c| +peer0.org1.example.com | [8b8 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8b9 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 gate 1602702069198677900 evaluation succeeds +peer0.org1.example.com | [8ba 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8bb 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8bc 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8bd 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8be 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8bf 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [8c0 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [8c1 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8c2 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8c3 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8c4 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [8c5 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8c6 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8c7 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8c8 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [8c9 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [8ca 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8cb 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > alive: alive: alive: +peer0.org1.example.com | [8cc 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.275Z grpc.peer_address=172.18.0.6:48732 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=232.6µs +peer0.org1.example.com | [8cd 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [8ce 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [8cf 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [8d0 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:48732 +peer0.org1.example.com | [8d1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48732 +peer0.org1.example.com | [8d2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8d3 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d4 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8d5 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d6 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8d7 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8d8 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8d9 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8da 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [8db 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [8dc 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8dd 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 gate 1602702069282129800 evaluation starts +peer0.org1.example.com | [8de 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8df 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [8e0 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 principal matched by identity 0 +peer0.org1.example.com | [8e1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [8e2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 27 44 96 5a 02 d1 c6 28 5d 2f 15 |0D. h'D.Z...(]/.| +peer0.org1.example.com | 00000010 52 c4 b2 fc 04 ab 17 0f 18 da 74 d1 d7 7e 39 51 |R.........t..~9Q| +peer0.org1.example.com | 00000020 64 c2 15 6e 02 20 2c db fa 47 28 d7 d4 56 8e 02 |d..n. ,..G(..V..| +peer0.org1.example.com | 00000030 51 9c ce d7 93 a1 7c 72 66 5e d4 92 1d b7 16 02 |Q.....|rf^......| +peer0.org1.example.com | 00000040 3f 5c 41 57 67 fe |?\AWg.| +peer0.org1.example.com | [8e3 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8e4 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 gate 1602702069282129800 evaluation succeeds +peer0.org1.example.com | [8e5 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8e6 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8e7 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8e8 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8e9 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48732 +peer0.org1.example.com | [8ea 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48732 +peer0.org1.example.com | [8eb 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [8ec 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48728 disconnected +peer0.org1.example.com | [8ed 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:48728 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=118.63ms +peer0.org1.example.com | [8ee 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [8ef 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48732 disconnected +peer0.org1.example.com | [8f0 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:19.277Z grpc.peer_address=172.18.0.6:48732 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.0404ms +peer0.org1.example.com | [8f1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [8f2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [8f3 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8f4 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [8f6 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [8f7 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020803 +peer0.org1.example.com | [8f8 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C82496F45A90496EAFCA14D5E5300DF1C7C866571E1A4C36D27C66C6072695F7 +peer0.org1.example.com | [8f5 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8f9 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8fa 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2020-10-14 19:01:16.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU d47 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:16.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d48 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-10-14 19:01:16.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU d49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +orderer0.example.com | "2020-10-14 19:01:16.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2020-10-14 19:01:16.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2020-10-14 19:01:16.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +orderer0.example.com | "2020-10-14 19:01:16.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.3µs " +orderer0.example.com | "2020-10-14 19:01:16.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:16.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:16.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d50 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:16.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d51 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-10-14 19:01:16.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +orderer0.example.com | "2020-10-14 19:01:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2020-10-14 19:01:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-10-14 19:01:16.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.9µs " +orderer0.example.com | "2020-10-14 19:01:16.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2020-10-14 19:01:16.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:16.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-10-14 19:01:17.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.4µs " +peer0.org2.example.com | [9f9 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9fa 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9fb 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9fc 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9fd 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9fe 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 gate 1602702070765467400 evaluation starts +peer0.org2.example.com | [9ff 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a00 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [a01 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 principal matched by identity 0 +peer0.org2.example.com | [a02 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [a03 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [a04 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a05 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344a620 gate 1602702070765467400 evaluation succeeds +peer0.org2.example.com | [a06 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a07 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a08 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a09 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a0a 10-14 19:01:10.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a0b 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [a0c 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a0d 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a0e 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a0f 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [a10 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [a11 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [a12 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a13 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [a14 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [a15 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [a16 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a17 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a18 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a19 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a1a 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a1b 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 gate 1602702071000445100 evaluation starts +peer0.org2.example.com | [a1c 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a1d 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [a1e 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [a1f 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 principal evaluation fails +peer0.org2.example.com | [a20 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344bc90 gate 1602702071000445100 evaluation fails +peer0.org2.example.com | [a21 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a22 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a23 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8fb 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [8fc 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [8fd 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [8fe 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [8ff 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [900 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [901 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [902 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [903 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [904 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [905 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002582580, CONNECTING +peer0.org1.example.com | [906 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [907 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [908 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org1.example.com | [909 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [90a 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002593990, CONNECTING +peer0.org1.example.com | [90b 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [90c 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer0.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer0.org1.example.com | [90d 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer0.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer0.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer0.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer0.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer0.org1.example.com | [90e 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +peer0.org1.example.com | 00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +peer0.org1.example.com | [90f 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +peer0.org1.example.com | 00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +peer0.org1.example.com | 00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +peer0.org1.example.com | 00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +peer0.org1.example.com | 00000040 05 90 52 6c a0 f6 |..Rl..| +peer0.org1.example.com | [910 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [911 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [913 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002582580, READY +peer0.org1.example.com | [914 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [915 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [912 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [916 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [917 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [919 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [91a 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [91b 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [918 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [91c 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [91d 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [91e 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [91f 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [920 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [921 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [922 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [923 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002593990, READY +peer0.org1.example.com | [924 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer0.org1.example.com | [925 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [926 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [927 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8b4 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8b5 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b6 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8b7 10-14 19:01:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8b8 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [8b9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8ba 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bb 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8bc 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer1.org1.example.com | [8bd 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer1.org1.example.com | [8be 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8bf 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c0 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c1 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c2 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8c3 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8c4 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8c5 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8c6 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8c7 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8c8 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 gate 1602702070325680800 evaluation starts +peer1.org1.example.com | [8c9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8ca 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8cb 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [8cc 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 principal matched by identity 0 +peer1.org1.example.com | [8cd 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer1.org1.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer1.org1.example.com | [8ce 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer1.org1.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer1.org1.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer1.org1.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer1.org1.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer1.org1.example.com | [8cf 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8d0 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bed30 gate 1602702070325680800 evaluation succeeds +peer1.org1.example.com | [8d1 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8d2 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [8d3 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8d4 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [8d5 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8d6 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [8d7 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8d8 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8d9 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8da 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8db 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8dc 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8dd 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8de 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8df 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8e0 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8e1 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8e2 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 gate 1602702070350059300 evaluation starts +peer1.org1.example.com | [8e3 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [8e4 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [8e5 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 principal matched by identity 0 +peer1.org1.example.com | [8e6 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer1.org1.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer1.org1.example.com | [8e7 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer1.org1.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer1.org1.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer1.org1.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer1.org1.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer1.org1.example.com | [8e8 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8e9 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035bf870 gate 1602702070350059300 evaluation succeeds +peer1.org1.example.com | [8ea 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8eb 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8ec 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8ed 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8ee 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [8ef 10-14 19:01:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [8f0 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f1 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes +peer1.org1.example.com | [8f2 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +peer1.org1.example.com | 00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +peer1.org1.example.com | [8f3 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +peer1.org1.example.com | 00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +peer1.org1.example.com | 00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +peer1.org1.example.com | 00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +peer1.org1.example.com | 00000040 32 c5 ec 17 f3 4b b1 |2....K.| +peer1.org1.example.com | [8f4 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [8f5 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [8f6 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f7 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f8 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8f9 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8fa 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8fb 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8fc 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8fd 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8fe 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 gate 1602702070367781700 evaluation starts +peer1.org1.example.com | [8ff 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [900 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [901 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 principal matched by identity 0 +peer1.org1.example.com | [902 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer1.org1.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer1.org1.example.com | [903 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer1.org1.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer1.org1.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer1.org1.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer1.org1.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer1.org1.example.com | [904 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [905 10-14 19:01:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036040e0 gate 1602702070367781700 evaluation succeeds +peer1.org1.example.com | [906 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [907 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [908 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [909 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [90a 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org1.example.com | [90b 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [90c 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [90d 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [90e 10-14 19:01:10.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [90f 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [910 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [911 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [912 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [913 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [a24 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 gate 1602702071002153300 evaluation starts +peer0.org2.example.com | [a25 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a26 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [a27 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 principal matched by identity 0 +peer0.org2.example.com | [a28 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [a29 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [a2a 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a2b 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468200 gate 1602702071002153300 evaluation succeeds +peer0.org2.example.com | [a2c 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a2d 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a2e 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a2f 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a30 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a31 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [a32 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [a33 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [a34 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a35 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a36 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a37 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a38 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [a39 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a3a 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [a3b 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a3c 10-14 19:01:11.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a3d 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [a3e 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a3f 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +peer0.org2.example.com | [a40 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a41 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer0.org2.example.com | [a42 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a43 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [a44 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a45 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [a46 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:17.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-10-14 19:01:17.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2020-10-14 19:01:17.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.4µs " +orderer0.example.com | "2020-10-14 19:01:17.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +orderer0.example.com | "2020-10-14 19:01:17.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d62 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d63 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2020-10-14 19:01:17.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.2µs " +orderer0.example.com | "2020-10-14 19:01:17.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d65 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-10-14 19:01:17.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2020-10-14 19:01:17.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.4µs " +orderer0.example.com | "2020-10-14 19:01:17.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +orderer0.example.com | "2020-10-14 19:01:17.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU d69 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:17.963 UTC [orderer.common.server] replicateDisabledChains -> DEBU d6b No inactive chains to try to replicate" +orderer0.example.com | "2020-10-14 19:01:18.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:18.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-10-14 19:01:18.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +orderer0.example.com | "2020-10-14 19:01:18.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2020-10-14 19:01:18.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-10-14 19:01:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +orderer0.example.com | "2020-10-14 19:01:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.4µs " +orderer0.example.com | "2020-10-14 19:01:18.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:18.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:18.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:18.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2020-10-14 19:01:18.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490µs " +orderer0.example.com | "2020-10-14 19:01:18.661 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-10-14 19:01:18.661 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2020-10-14 19:01:18.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.3µs " +orderer0.example.com | "2020-10-14 19:01:18.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-10-14 19:01:18.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:18.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2020-10-14 19:01:19.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.3µs " +orderer0.example.com | "2020-10-14 19:01:19.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2020-10-14 19:01:19.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +peer0.org1.example.com | [928 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [929 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [92a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [92b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [92c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [92d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [92e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [92f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [930 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 gate 1602702069978584200 evaluation starts +peer0.org1.example.com | [931 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [932 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [933 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 principal matched by identity 0 +peer0.org1.example.com | [934 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [935 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 32 b2 55 53 03 d9 51 08 83 c2 |0E.!..2.US..Q...| +peer0.org1.example.com | 00000010 5f a6 4c e2 8e c3 55 04 51 e0 c7 0e b0 44 3d db |_.L...U.Q....D=.| +peer0.org1.example.com | 00000020 54 f7 9e 53 63 02 20 0e a3 e7 e1 f2 ca 7c fa 4f |T..Sc. ......|.O| +peer0.org1.example.com | 00000030 5d 91 b2 91 65 af 53 ce 47 48 2c 34 05 88 1a 12 |]...e.S.GH,4....| +peer0.org1.example.com | 00000040 ec a4 cd 97 68 82 9a |....h..| +peer0.org1.example.com | [936 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [937 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 gate 1602702069978584200 evaluation succeeds +peer0.org1.example.com | [938 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [939 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [93a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [93b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [93c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [93d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [93e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [93f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [940 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [941 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [942 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [943 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org2.example.com | [a51 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a52 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a53 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a54 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 gate 1602702075503219200 evaluation starts +peer1.org2.example.com | [a55 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a56 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a57 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [a58 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 principal evaluation fails +peer1.org2.example.com | [a59 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a160 gate 1602702075503219200 evaluation fails +peer1.org2.example.com | [a5a 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a5b 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a5c 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a5d 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 gate 1602702075503543000 evaluation starts +peer1.org2.example.com | [a5e 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a5f 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a60 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 principal matched by identity 0 +peer1.org2.example.com | [a61 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org2.example.com | [a62 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 d2 63 8b 6e 66 de 27 d6 63 b4 7d |0D. ..c.nf.'.c.}| +peer1.org2.example.com | 00000010 b6 28 46 31 d3 d2 c9 a1 52 f5 1f b9 9c f5 02 8c |.(F1....R.......| +peer1.org2.example.com | 00000020 17 bc 98 5c 02 20 06 b9 ae a9 23 53 4e 52 aa 1b |...\. ....#SNR..| +peer1.org2.example.com | 00000030 e7 41 da f9 37 1b cc d9 17 9c 06 05 e2 92 96 cd |.A..7...........| +peer1.org2.example.com | 00000040 18 b5 18 b7 36 f1 |....6.| +peer1.org2.example.com | [a63 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a64 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00337a6d0 gate 1602702075503543000 evaluation succeeds +peer1.org2.example.com | [a65 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a66 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a67 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a68 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a69 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer1.org2.example.com | [a6a 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a6b 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [a6c 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a6d 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a6e 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a6f 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a70 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [a71 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a72 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a73 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a74 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a75 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a76 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a77 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a78 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 gate 1602702075634038400 evaluation starts +peer1.org2.example.com | [a79 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a7a 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a7b 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [a7c 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 principal evaluation fails +peer1.org2.example.com | [a7d 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394690 gate 1602702075634038400 evaluation fails +peer1.org2.example.com | [a7e 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a7f 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a80 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [a81 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 gate 1602702075635769600 evaluation starts +peer1.org2.example.com | [a82 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a83 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [a84 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 principal matched by identity 0 +peer1.org2.example.com | [a85 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb ed 99 ad f2 f0 2f f5 39 3f e8 f1 5c 3b 01 95 |....../.9?..\;..| +peer1.org2.example.com | 00000010 ad 91 8a aa 50 9f 61 e0 3c d7 9e b8 e9 f3 5e 20 |....P.a.<.....^ | +peer1.org2.example.com | [a86 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 d0 69 5a a7 a6 b7 0a 4d 2a 21 |0E.!...iZ....M*!| +peer1.org2.example.com | 00000010 12 bb ce dc f4 01 73 dd 08 6c db 4e 29 f6 f7 d0 |......s..l.N)...| +peer1.org2.example.com | 00000020 00 de c5 eb f1 02 20 64 7f 97 e6 ef bb be ea 05 |...... d........| +peer1.org2.example.com | 00000030 02 04 1a b0 db 33 f6 40 3c 09 c3 f5 80 f0 bb ed |.....3.@<.......| +peer1.org2.example.com | 00000040 bd 6b 14 2a fb 58 25 |.k.*.X%| +peer1.org2.example.com | [a87 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a88 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003394c00 gate 1602702075635769600 evaluation succeeds +peer1.org2.example.com | [a89 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a8a 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a8b 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a8c 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a8d 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [a8e 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [a8f 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [a90 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [a91 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [a92 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a93 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a94 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a95 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a96 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a97 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a98 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a99 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9a 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9b 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [a9c 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9d 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a9e 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [a47 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 16763324500332613216, Envelope: 1905 bytes, Signature: 0 bytes +peer0.org2.example.com | [a48 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a49 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a4a 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a4b 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a4c 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a4d 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a4e 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a4f 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 gate 1602702071150904500 evaluation starts +peer0.org2.example.com | [a50 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a51 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [a52 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 principal matched by identity 0 +peer0.org2.example.com | [a53 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer0.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer0.org2.example.com | [a54 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 38 38 3e f0 ca 9b 8c d8 f0 2d 18 |0D. ;88>......-.| +peer0.org2.example.com | 00000010 b7 87 f4 70 e6 25 52 0c 1b 8c e0 cb ed 4c 1b 91 |...p.%R......L..| +peer0.org2.example.com | 00000020 91 8a 6f c0 02 20 0b d8 77 32 2c f8 ce ee 02 f4 |..o.. ..w2,.....| +peer0.org2.example.com | 00000030 e1 8e d3 5e 65 ce 81 82 af d7 44 89 ff 80 f5 17 |...^e.....D.....| +peer0.org2.example.com | 00000040 8f c1 f4 89 79 c5 |....y.| +peer0.org2.example.com | [a55 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a56 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003492380 gate 1602702071150904500 evaluation succeeds +peer0.org2.example.com | [a57 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a58 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a59 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a5a 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a5b 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a5c 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a5d 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a5e 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a5f 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a60 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a61 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a62 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a63 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a64 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 gate 1602702071156108800 evaluation starts +peer0.org2.example.com | [a65 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a66 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [a67 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 principal matched by identity 0 +peer0.org2.example.com | [a68 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer0.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer0.org2.example.com | [a69 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 93 db 1d 90 04 4a 71 e3 4a 77 |0E.!.......Jq.Jw| +peer0.org2.example.com | 00000010 5d 7d 59 25 26 9c b2 e2 4a 04 18 6b 92 b9 a2 98 |]}Y%&...J..k....| +peer0.org2.example.com | 00000020 25 fd b2 b1 b6 02 20 04 49 ec a7 b5 ab 8c 08 e9 |%..... .I.......| +peer0.org2.example.com | 00000030 49 a6 25 70 bd dd 25 38 c8 05 4d 66 a1 ec c4 c9 |I.%p..%8..Mf....| +peer0.org2.example.com | 00000040 55 58 a2 d0 10 df 2d |UX....-| +peer0.org2.example.com | [a6a 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a6b 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b80 gate 1602702071156108800 evaluation succeeds +peer0.org2.example.com | [a6c 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a6d 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a6e 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a6f 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a70 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a71 10-14 19:01:11.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a72 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 16763324500332613216, Envelope: 1905 bytes, Signature: 0 bytes +peer0.org2.example.com | [a73 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a74 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a75 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a76 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a77 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [a78 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 2 +peer0.org2.example.com | [a79 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a7a 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a7b 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a7c 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:01:19.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +orderer0.example.com | "2020-10-14 19:01:19.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 282.8µs " +orderer0.example.com | "2020-10-14 19:01:19.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +orderer0.example.com | "2020-10-14 19:01:19.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +orderer0.example.com | "2020-10-14 19:01:19.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2020-10-14 19:01:19.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +orderer0.example.com | "2020-10-14 19:01:19.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +orderer0.example.com | "2020-10-14 19:01:19.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.4µs " +orderer0.example.com | "2020-10-14 19:01:19.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:19.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2020-10-14 19:01:20.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 670.2µs " +orderer0.example.com | "2020-10-14 19:01:20.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d93 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-10-14 19:01:20.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2020-10-14 19:01:20.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114µs " +orderer0.example.com | "2020-10-14 19:01:20.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.8µs " +orderer0.example.com | "2020-10-14 19:01:20.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 3 on channel testchainid took 92.3µs" +orderer0.example.com | "2020-10-14 19:01:20.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.8µs " +orderer0.example.com | "2020-10-14 19:01:20.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-10-14 19:01:20.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +orderer0.example.com | "2020-10-14 19:01:20.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100µs " +orderer0.example.com | "2020-10-14 19:01:20.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:20.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 961.3µs " +orderer0.example.com | "2020-10-14 19:01:20.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +orderer0.example.com | "2020-10-14 19:01:21.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 479.3µs" +orderer0.example.com | "2020-10-14 19:01:21.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2020-10-14 19:01:21.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da6 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +orderer0.example.com | "2020-10-14 19:01:21.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU da7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.4µs " +orderer0.example.com | "2020-10-14 19:01:21.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.2µs " +orderer0.example.com | "2020-10-14 19:01:21.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU daa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU dab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2020-10-14 19:01:21.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.3µs " +orderer0.example.com | "2020-10-14 19:01:21.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2020-10-14 19:01:21.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2020-10-14 19:01:21.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.9µs " +orderer0.example.com | "2020-10-14 19:01:21.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.4µs " +orderer0.example.com | "2020-10-14 19:01:21.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:21.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [944 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [945 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org1.example.com | [946 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org1.example.com | [947 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [948 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [949 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [94a 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [94b 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94c 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94d 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [94e 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [94f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [950 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 gate 1602702069999008800 evaluation starts +peer0.org1.example.com | [951 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [952 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [953 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 principal matched by identity 0 +peer0.org1.example.com | [954 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer0.org1.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer0.org1.example.com | [955 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer0.org1.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer0.org1.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer0.org1.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer0.org1.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer0.org1.example.com | [956 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [957 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 gate 1602702069999008800 evaluation succeeds +peer0.org1.example.com | [958 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [959 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [95a 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [95b 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [95c 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [95d 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [95e 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [95f 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [960 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [961 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [962 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 gate 1602702070003891200 evaluation starts +peer0.org1.example.com | [963 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [964 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [965 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 principal matched by identity 0 +peer0.org1.example.com | [966 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +peer0.org1.example.com | 00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +peer0.org1.example.com | [967 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +peer0.org1.example.com | 00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +peer0.org1.example.com | 00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +peer0.org1.example.com | 00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +peer0.org1.example.com | 00000040 ab fd b5 44 0b 7b |...D.{| +peer0.org1.example.com | [968 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [969 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 gate 1602702070003891200 evaluation succeeds +peer0.org1.example.com | [96a 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [96b 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [96c 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [96d 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [96e 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [96f 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +peer0.org1.example.com | [970 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [971 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [972 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [973 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [974 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [975 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [976 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [977 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [978 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [979 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [97a 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [97b 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [97c 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [97d 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [97e 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 gate 1602702070014582300 evaluation starts +peer0.org1.example.com | [97f 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [980 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [981 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 principal matched by identity 0 +peer0.org1.example.com | [982 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [983 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 94 48 32 74 ac dd 59 98 54 3f 38 |0D. x.H2t..Y.T?8| +peer0.org1.example.com | 00000010 a4 7a 80 e1 a0 49 ce 92 8c de 30 28 b3 6b a0 19 |.z...I....0(.k..| +peer0.org1.example.com | 00000020 24 f5 cc 77 02 20 1f e8 16 2c 89 7e 13 cb de 26 |$..w. ...,.~...&| +peer0.org1.example.com | 00000030 aa 24 70 ce 9c 2c e9 dd bf 4f f4 4a 01 ca d6 36 |.$p..,...O.J...6| +peer0.org1.example.com | 00000040 bd d9 ef b6 e7 71 |.....q| +peer0.org1.example.com | [984 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [985 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 gate 1602702070014582300 evaluation succeeds +peer0.org1.example.com | [986 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [987 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [988 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [989 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [98a 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [98b 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [98c 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [98d 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [98e 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [98f 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org1.example.com | [990 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer0.org1.example.com | [991 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [992 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [993 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:22.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU db4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:22.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +orderer0.example.com | "2020-10-14 19:01:22.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU db6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +orderer0.example.com | "2020-10-14 19:01:22.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +orderer0.example.com | "2020-10-14 19:01:22.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db9 Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +orderer0.example.com | "2020-10-14 19:01:22.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 270.4µs " +orderer0.example.com | "2020-10-14 19:01:22.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.1µs " +orderer0.example.com | "2020-10-14 19:01:22.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:22.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:22.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:22.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel testchainid took 54.7µs" +orderer0.example.com | "2020-10-14 19:01:22.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +orderer0.example.com | "2020-10-14 19:01:22.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc0 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2020-10-14 19:01:22.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +orderer0.example.com | "2020-10-14 19:01:22.659 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc2 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2020-10-14 19:01:22.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +orderer0.example.com | "2020-10-14 19:01:22.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:22.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:23.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:23.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2020-10-14 19:01:23.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.8µs " +orderer0.example.com | "2020-10-14 19:01:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-10-14 19:01:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:23.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +orderer0.example.com | "2020-10-14 19:01:23.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 412.6µs " +orderer0.example.com | "2020-10-14 19:01:23.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [915 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [914 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [917 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [918 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161015 +peer1.org1.example.com | [919 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7A440E34116F14632D6764DE92BC80651FD95CBDBA5F8CD0CFFB548AF90C8692 +peer1.org1.example.com | [91b 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [91c 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [91d 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [91e 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [91f 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [920 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [916 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [91a 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [921 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [922 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [923 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [924 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [925 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [926 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [927 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [929 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [92a 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [928 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [92b 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [92c 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [92d 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [92e 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [92f 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161016 +peer1.org1.example.com | [930 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FD7B2A4D8E17AD45A40DC630E24314508923E61C53425CED8F2DFBCAEE928C75 +peer1.org1.example.com | [931 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [932 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [933 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [934 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [935 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [936 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a7d 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [a7e 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 3 +peer0.org2.example.com | [a7f 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a80 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 705210784412113434, Envelope: 957 bytes, Signature: 0 bytes +peer0.org2.example.com | [a81 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer0.org2.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org2.example.com | [a82 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 84 74 89 0e 0c 32 c5 7e 7d 29 |0E.!...t...2.~})| +peer0.org2.example.com | 00000010 77 8d 28 4c 1e 80 db 91 b4 09 ea 5e 2d 8e c1 c8 |w.(L.......^-...| +peer0.org2.example.com | 00000020 48 75 9b 2b cd 02 20 15 59 9b c3 be 2f 33 f6 13 |Hu.+.. .Y.../3..| +peer0.org2.example.com | 00000030 ca 6f 46 a2 09 b7 8f 10 2b 8c 1a 16 84 2d 5c 3a |.oF.....+....-\:| +peer0.org2.example.com | 00000040 55 ef 26 08 6d aa fb |U.&.m..| +peer0.org2.example.com | [a83 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 705210784412113434, Envelope: 957 bytes, Signature: 0 bytes +peer0.org2.example.com | [a84 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [a85 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 4 +peer0.org2.example.com | [a86 10-14 19:01:11.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a87 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [a88 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [a89 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a8a 10-14 19:01:11.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [a8b 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [994 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [995 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [996 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [997 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [998 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [999 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [99a 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 gate 1602702070030108100 evaluation starts +peer0.org1.example.com | [99b 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [99c 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [99d 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 principal matched by identity 0 +peer0.org1.example.com | [99e 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer0.org1.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer0.org1.example.com | [99f 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer0.org1.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer0.org1.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer0.org1.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer0.org1.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer0.org1.example.com | [9a0 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9a1 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 gate 1602702070030108100 evaluation succeeds +peer0.org1.example.com | [9a2 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9a3 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9a4 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9a5 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9a6 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9a7 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9a8 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9a9 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9aa 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9ab 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9ac 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 gate 1602702070033898700 evaluation starts +peer0.org1.example.com | [9ad 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9ae 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [9af 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 principal matched by identity 0 +peer0.org1.example.com | [9b0 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +peer0.org1.example.com | 00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +peer0.org1.example.com | [9b1 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +peer0.org1.example.com | 00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +peer0.org1.example.com | 00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +peer0.org1.example.com | 00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +peer0.org1.example.com | 00000040 59 fb f1 7d 0b 22 |Y..}."| +peer0.org1.example.com | [9b2 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9b3 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 gate 1602702070033898700 evaluation succeeds +peer0.org1.example.com | [9b4 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9b5 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9b6 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [937 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [938 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [939 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [93a 10-14 19:01:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [93b 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [93c 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [93d 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [93e 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [93f 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [940 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer1.org1.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer1.org1.example.com | [941 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer1.org1.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer1.org1.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer1.org1.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer1.org1.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer1.org1.example.com | [942 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [943 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 40 ea ea 40 58 18 b9 9b 4f ea |0E.!..@..@X...O.| +peer1.org1.example.com | 00000010 35 5d 0b 30 55 58 48 51 6c d3 66 da 42 33 24 f5 |5].0UXHQl.f.B3$.| +peer1.org1.example.com | 00000020 bc 27 29 7f 60 02 20 73 70 6b 7d b0 2d d9 a2 85 |.').`. spk}.-...| +peer1.org1.example.com | 00000030 08 f6 18 ee 1b 6f 2c c0 ca cf eb 6f be 53 e5 1c |.....o,....o.S..| +peer1.org1.example.com | 00000040 2c a5 8d f9 4e 4d 99 |,...NM.| +peer1.org1.example.com | [944 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [945 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [946 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [947 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [948 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [949 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [94a 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [94c 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [94d 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [94b 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [94e 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer1.org1.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer1.org1.example.com | [94f 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer1.org1.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer1.org1.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer1.org1.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer1.org1.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer1.org1.example.com | [950 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [951 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [952 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [953 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [a8c 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [a8d 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a8e 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a8f 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [a90 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [a91 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org2.example.com | [a92 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a93 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a94 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [a95 10-14 19:01:12.66 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]] +peer0.org2.example.com | [a96 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:52988 +peer0.org2.example.com | [a97 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0034cf310 +peer0.org2.example.com | [a98 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [a99 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [a9a 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [a9b 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [a9c 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d fe 3f 4b 58 38 ed 2f 92 a2 cc c1 4e 83 21 18 |m.?KX8./....N.!.| +peer0.org2.example.com | 00000010 96 9d 5e d1 db 31 d6 ad 27 8c cd c9 37 59 98 ad |..^..1..'...7Y..| +peer0.org2.example.com | [a9d 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 4a d4 70 87 da 7e 46 b1 cb 0b |0E.!..J.p..~F...| +peer0.org2.example.com | 00000010 3a 18 8b a0 ee bd 5f 45 27 4f 3b 1f 15 0e 5a aa |:....._E'O;...Z.| +peer0.org2.example.com | 00000020 b2 55 c3 d0 5c 02 20 3d e4 4d c8 ec 75 07 91 01 |.U..\. =.M..u...| +peer0.org2.example.com | 00000030 ed 28 d5 2e 73 5c 86 2a 2a b9 a6 44 b1 76 46 cd |.(..s\.**..D.vF.| +peer0.org2.example.com | 00000040 d0 db b3 02 7e 78 a6 |....~x.| +peer0.org2.example.com | [a9e 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [a9f 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0033b1500, header 0xc0034cf720 +peer0.org2.example.com | [aa0 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org2.example.com | [aa1 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU [][edfeab3b] processing txid: edfeab3b0746b83e9b3c8caf709c9b35c2af97a76354e9fbdee98a92d293616f +peer0.org2.example.com | [aa2 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU [][edfeab3b] Entry chaincode: name:"lscc" +peer0.org2.example.com | [aa3 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> INFO [][edfeab3b] Entry chaincode: name:"lscc" +peer0.org2.example.com | [aa4 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [aa5 10-14 19:01:12.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d fe 3f 4b 58 38 ed 2f 92 a2 cc c1 4e 83 21 18 |m.?KX8./....N.!.| +peer0.org2.example.com | 00000010 96 9d 5e d1 db 31 d6 ad 27 8c cd c9 37 59 98 ad |..^..1..'...7Y..| +peer0.org2.example.com | [aa6 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 4a d4 70 87 da 7e 46 b1 cb 0b |0E.!..J.p..~F...| +peer0.org2.example.com | 00000010 3a 18 8b a0 ee bd 5f 45 27 4f 3b 1f 15 0e 5a aa |:....._E'O;...Z.| +peer0.org2.example.com | 00000020 b2 55 c3 d0 5c 02 20 3d e4 4d c8 ec 75 07 91 01 |.U..\. =.M..u...| +peer0.org2.example.com | 00000030 ed 28 d5 2e 73 5c 86 2a 2a b9 a6 44 b1 76 46 cd |.(..s\.**..D.vF.| +peer0.org2.example.com | 00000040 d0 db b3 02 7e 78 a6 |....~x.| +peer0.org2.example.com | [aa7 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [aa8 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org2.example.com | [aa9 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org2.example.com | [aaa 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ba7a78a4-7214-4e54-b440-200a55a9c024] +peer0.org2.example.com | [aab 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [aac 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba7a78a4-7214-4e54-b440-200a55a9c024] +peer0.org2.example.com | [aad 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org2.example.com | [aae 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org2.example.com | [aaf 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU [edfeab3b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [ab0 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU [edfeab3b] notifying Txid:edfeab3b0746b83e9b3c8caf709c9b35c2af97a76354e9fbdee98a92d293616f, channelID: +peer0.org2.example.com | [ab1 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [ab2 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> INFO [][edfeab3b] Exit chaincode: name:"lscc" (5ms) +peer0.org2.example.com | [ab3 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU [][edfeab3b] Exit +peer0.org2.example.com | [ab4 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:52988 +peer0.org2.example.com | [ab5 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:52988 grpc.code=OK grpc.call_duration=10.1393ms +peer0.org2.example.com | [ab6 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ab7 10-14 19:01:12.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ab8 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [ab9 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [aba 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [abb 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C0880CFE4BB8DA1FC9E1610031801 +peer0.org2.example.com | [abc 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8F71B849D268858A48FE30B4DAB2D9EE0539F2798F014F096F7052A04C1F07FD +peer0.org2.example.com | [abd 10-14 19:01:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [abe 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [abf 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac0 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac1 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac2 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [ac3 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac4 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ac5 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [ac6 10-14 19:01:13.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac7 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [ac8 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 1d 1b e1 ee 8c 8d d5 a0 e5 12 02 c7 fb 82 bf |=...............| +peer0.org2.example.com | 00000010 c9 1e 34 e5 61 cb ee c3 1f 16 ab 06 33 74 32 db |..4.a.......3t2.| +peer0.org2.example.com | [ac9 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c c3 cb 0b 12 cf 59 23 1d df e0 4e |0D. ......Y#...N| +peer0.org2.example.com | 00000010 f4 5d 23 04 a4 78 99 ef d0 1b 9b 93 bf 7e 5b 36 |.]#..x.......~[6| +peer0.org2.example.com | 00000020 05 e9 35 2e 02 20 7e ee dd 70 ae 46 34 48 e6 32 |..5.. ~..p.F4H.2| +peer0.org2.example.com | 00000030 5a de 0e 02 bc ff df e8 40 9e 1f 41 88 e0 b3 9b |Z.......@..A....| +peer0.org2.example.com | 00000040 31 48 5b f8 69 a2 |1H[.i.| +peer0.org2.example.com | [aca 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [acb 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [acc 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [acd 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [ace 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [acf 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 Stopped being a leader +peer0.org2.example.com | [ad0 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> INFO Renounced leadership, stopping delivery service for channel businesschannel +peer0.org2.example.com | [ad1 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [ad2 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad3 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU This peer will stop pass blocks from orderer service to other peers +peer0.org2.example.com | [ad4 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [ad5 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad6 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> WARN Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s +peer0.org2.example.com | [ad7 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ad8 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> WARN [businesschannel] Receive error: client is closing +peer0.org2.example.com | [ad9 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [ada 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [adb 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [adc 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [add 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [ade 10-14 19:01:13.72 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [adf 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ae0 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ae1 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ae2 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ae3 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ae4 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [ae5 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ae6 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [ae7 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [ae8 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [ae9 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [aea 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aeb 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aec 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aed 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aee 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aef 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [af0 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org2.example.com | [af1 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org2.example.com | [af2 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [af3 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [af4 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [af5 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [af6 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [af7 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161010 +peer0.org2.example.com | [af8 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2A2441F3D4E8FD5833E765F006BD5E19CD643A4F9467966F0D35912BBE9E802D +peer0.org2.example.com | [af9 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [afa 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [afb 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [afc 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [afd 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [afe 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [aff 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b00 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b01 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [a9f 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aa1 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa0 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aa2 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa3 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aa4 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aa5 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa6 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aa7 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aa8 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [aa9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aaa 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [aab 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aac 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [aad 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [aae 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [aaf 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [ab0 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ab1 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [ab2 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [ab3 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ab4 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [ab5 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [ab6 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org2.example.com | [ab7 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org2.example.com | [ab8 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [ab9 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 83 03 0e 0e 16 80 c1 41 33 9c a9 |0D. #.......A3..| +peer1.org2.example.com | 00000010 24 2e 9f 5d e3 70 1a 40 76 1f 8b d9 55 34 14 5e |$..].p.@v...U4.^| +peer1.org2.example.com | 00000020 ef ec 64 af 02 20 4d 18 c7 cd 99 05 40 a9 40 70 |..d.. M.....@.@p| +peer1.org2.example.com | 00000030 6a b5 d2 56 5b 0a e5 1e b2 fe 59 4f 0f 64 11 be |j..V[.....YO.d..| +peer1.org2.example.com | 00000040 8a bf 5c 59 30 7f |..\Y0.| +peer1.org2.example.com | [aba 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [abb 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [abc 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [abd 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [abe 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [abf 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac0 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac1 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac2 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [ac3 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ac4 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ac5 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ac6 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [ac7 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:23.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:23.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:23.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-10-14 19:01:23.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.5µs " +orderer0.example.com | "2020-10-14 19:01:23.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +orderer0.example.com | "2020-10-14 19:01:23.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:01:23.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:23.659 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2020-10-14 19:01:23.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.2µs " +orderer0.example.com | "2020-10-14 19:01:23.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-10-14 19:01:24.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU dda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.8µs " +orderer0.example.com | "2020-10-14 19:01:24.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2020-10-14 19:01:24.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2020-10-14 19:01:24.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.5µs " +orderer0.example.com | "2020-10-14 19:01:24.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.1µs " +orderer0.example.com | "2020-10-14 19:01:24.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-10-14 19:01:24.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.7µs " +orderer0.example.com | "2020-10-14 19:01:24.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2020-10-14 19:01:24.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-10-14 19:01:24.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 831.2µs " +orderer0.example.com | "2020-10-14 19:01:24.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:24.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.7958ms " +orderer0.example.com | "2020-10-14 19:01:24.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2020-10-14 19:01:25.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.2µs " +orderer0.example.com | "2020-10-14 19:01:25.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 2 on channel businesschannel took 114.5µs" +orderer0.example.com | "2020-10-14 19:01:25.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +orderer0.example.com | "2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.8µs " +orderer0.example.com | "2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.4µs " +orderer0.example.com | "2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +peer1.org1.example.com | [954 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +peer1.org1.example.com | 00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +peer1.org1.example.com | [955 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +peer1.org1.example.com | 00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +peer1.org1.example.com | 00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +peer1.org1.example.com | 00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +peer1.org1.example.com | 00000040 18 33 db 7a 92 d8 |.3.z..| +peer1.org1.example.com | [956 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[]}, deadMembers={[]} +peer1.org1.example.com | [957 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [958 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [959 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [95a 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [95b 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [95c 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [95d 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [95e 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [95f 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [960 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [961 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [962 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [963 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer1.org1.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer1.org1.example.com | [964 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +peer1.org1.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer1.org1.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer1.org1.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer1.org1.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer1.org1.example.com | [965 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [966 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 60 12 6d 02 83 f4 14 aa 47 6a |0E.!..`.m.....Gj| +peer1.org1.example.com | 00000010 54 17 f2 5b 8d 85 54 6b 63 36 e4 fc a4 de 30 2e |T..[..Tkc6....0.| +peer1.org1.example.com | 00000020 d0 f0 ce 38 37 02 20 60 50 14 aa 85 5e 03 c3 58 |...87. `P...^..X| +peer1.org1.example.com | 00000030 75 a2 17 04 18 f0 be 19 9f 00 a0 3f 84 ea 75 4b |u..........?..uK| +peer1.org1.example.com | 00000040 e2 2d 83 aa 38 cc ad |.-..8..| +peer1.org1.example.com | [967 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [968 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [969 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [9b7 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9b8 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [9b9 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [9ba 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9bb 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [9bc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9bd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [9be 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [9bf 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9c0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9c1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9c2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9c3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9c4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9c5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9c6 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 gate 1602702070205201800 evaluation starts +peer0.org1.example.com | [9c7 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9c8 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [9c9 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:01:25.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU df5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 551µs " +orderer0.example.com | "2020-10-14 19:01:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2020-10-14 19:01:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-10-14 19:01:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.7µs " +orderer0.example.com | "2020-10-14 19:01:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.1µs " +orderer0.example.com | "2020-10-14 19:01:25.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:25.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2020-10-14 19:01:26.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.2µs " +orderer0.example.com | "2020-10-14 19:01:26.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2020-10-14 19:01:26.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:26.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +orderer0.example.com | "2020-10-14 19:01:26.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.9µs " +orderer0.example.com | "2020-10-14 19:01:26.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2020-10-14 19:01:26.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 646.3µs " +orderer0.example.com | "2020-10-14 19:01:26.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2020-10-14 19:01:26.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2020-10-14 19:01:26.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.7µs " +orderer0.example.com | "2020-10-14 19:01:26.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 429.7µs " +orderer0.example.com | "2020-10-14 19:01:26.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:26.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-10-14 19:01:27.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +orderer0.example.com | "2020-10-14 19:01:27.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2020-10-14 19:01:27.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2020-10-14 19:01:27.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.6µs " +orderer0.example.com | "2020-10-14 19:01:27.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +orderer0.example.com | "2020-10-14 19:01:27.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2020-10-14 19:01:27.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.4µs " +orderer0.example.com | "2020-10-14 19:01:27.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2020-10-14 19:01:27.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:27.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.5µs " +orderer0.example.com | "2020-10-14 19:01:27.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.2µs " +orderer0.example.com | "2020-10-14 19:01:27.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:27.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel testchainid took 37.1µs" +orderer0.example.com | "2020-10-14 19:01:28.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.3µs " +orderer0.example.com | "2020-10-14 19:01:28.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:01:28.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-10-14 19:01:28.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.4µs " +orderer0.example.com | "2020-10-14 19:01:28.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.7µs " +orderer0.example.com | "2020-10-14 19:01:28.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +orderer0.example.com | "2020-10-14 19:01:28.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.8µs " +orderer0.example.com | "2020-10-14 19:01:28.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2020-10-14 19:01:28.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:28.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.8µs " +orderer0.example.com | "2020-10-14 19:01:28.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " +orderer0.example.com | "2020-10-14 19:01:28.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:28.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 133.6µs" +orderer0.example.com | "2020-10-14 19:01:29.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +orderer0.example.com | "2020-10-14 19:01:29.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +orderer0.example.com | "2020-10-14 19:01:29.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-10-14 19:01:29.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +orderer0.example.com | "2020-10-14 19:01:29.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +orderer0.example.com | "2020-10-14 19:01:29.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2020-10-14 19:01:29.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.2µs " +orderer0.example.com | "2020-10-14 19:01:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2020-10-14 19:01:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:29.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " +orderer0.example.com | "2020-10-14 19:01:29.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " +orderer0.example.com | "2020-10-14 19:01:29.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:29.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2020-10-14 19:01:30.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.2µs " +orderer0.example.com | "2020-10-14 19:01:30.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2020-10-14 19:01:30.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2020-10-14 19:01:30.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.1µs " +orderer0.example.com | "2020-10-14 19:01:30.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.3µs " +orderer0.example.com | "2020-10-14 19:01:30.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:30.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.7µs " +orderer0.example.com | "2020-10-14 19:01:30.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2020-10-14 19:01:30.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +orderer0.example.com | "2020-10-14 19:01:30.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +orderer0.example.com | "2020-10-14 19:01:30.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:30.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +orderer0.example.com | "2020-10-14 19:01:30.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 484.3µs" +orderer0.example.com | "2020-10-14 19:01:31.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.1µs " +orderer0.example.com | "2020-10-14 19:01:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" +orderer0.example.com | "2020-10-14 19:01:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-10-14 19:01:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.8µs " +orderer0.example.com | "2020-10-14 19:01:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.3µs " +orderer0.example.com | "2020-10-14 19:01:31.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-10-14 19:01:31.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.9µs " +orderer0.example.com | "2020-10-14 19:01:31.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-10-14 19:01:31.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2020-10-14 19:01:31.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 387.5µs " +orderer0.example.com | "2020-10-14 19:01:31.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.8µs " +orderer0.example.com | "2020-10-14 19:01:31.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:31.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 43.7µs" +orderer0.example.com | "2020-10-14 19:01:32.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.8µs " +orderer0.example.com | "2020-10-14 19:01:32.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-10-14 19:01:32.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2020-10-14 19:01:32.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.3µs " +orderer0.example.com | "2020-10-14 19:01:32.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.2µs " +orderer0.example.com | "2020-10-14 19:01:32.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2020-10-14 19:01:32.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.6µs " +peer0.org2.example.com | [b02 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [b03 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b04 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [b06 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b05 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [b07 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b08 10-14 19:01:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [b09 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b0a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org2.example.com | [b0b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org2.example.com | [b0c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [b0d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer0.org2.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer0.org2.example.com | [b0e 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer0.org2.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer0.org2.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer0.org2.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer0.org2.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer0.org2.example.com | [b0f 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [b10 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 76 a9 65 f6 e5 c4 df 67 96 4c 31 |0D. bv.e....g.L1| +peer0.org2.example.com | 00000010 01 71 4f e1 2c ad 62 24 7f 49 14 8d 9b de 35 20 |.qO.,.b$.I....5 | +peer0.org2.example.com | 00000020 c9 e4 d3 b3 02 20 46 ec f3 84 28 f6 e6 da f1 b1 |..... F...(.....| +peer0.org2.example.com | 00000030 81 f8 d4 d8 d0 2a a5 35 d7 39 61 04 32 81 16 0d |.....*.5.9a.2...| +peer0.org2.example.com | 00000040 c1 ca 0c 8e 02 04 |......| +peer0.org2.example.com | [b11 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [b12 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [b13 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b14 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b15 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b16 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [b17 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b18 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [b19 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [b1a 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [b1b 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer0.org2.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer0.org2.example.com | [b1c 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer0.org2.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer0.org2.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer0.org2.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer0.org2.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer0.org2.example.com | [b1d 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b1e 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b1f 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b20 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b21 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [b22 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [b23 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b24 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b25 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b26 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b27 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b28 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b29 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b2a 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b2b 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 gate 1602702074174087600 evaluation starts +peer0.org2.example.com | [b2c 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b2d 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [b2e 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 principal matched by identity 0 +peer0.org2.example.com | [b2f 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer0.org2.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer0.org2.example.com | [b30 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer0.org2.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer0.org2.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer1.org1.example.com | [96a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [96b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [96c 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [96d 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [96e 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [970 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [96f 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [971 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [972 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > alive: +peer1.org1.example.com | [973 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [974 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [975 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [976 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [977 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [978 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [979 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [97a 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 5b 43 b3 98 c3 2b 83 3e 57 3d 0f 4a a5 a9 2a |.[C...+.>W=.J..*| +peer1.org1.example.com | 00000010 9e 2f 3d a1 98 2d f9 3f 49 4a 69 87 cf 3f c8 b2 |./=..-.?IJi..?..| +peer1.org1.example.com | [97b 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 9b 46 40 42 a6 42 c5 8c 46 dc |0E.!...F@B.B..F.| +peer1.org1.example.com | 00000010 e6 9f 86 17 2f 23 b5 78 25 7b 8b fd f8 e7 05 0e |..../#.x%{......| +peer1.org1.example.com | 00000020 d2 1c 09 3d 58 02 20 5e 61 79 5f 39 e7 89 6e 7c |...=X. ^ay_9..n|| +peer1.org1.example.com | 00000030 75 c6 a9 be a9 c6 d4 52 d6 e9 46 2b 37 f8 65 08 |u......R..F+7.e.| +peer1.org1.example.com | 00000040 73 20 96 5d 58 33 30 |s .]X30| +peer1.org1.example.com | [97c 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [97d 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [97e 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [97f 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [980 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [981 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [982 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [983 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [984 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [985 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [986 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [987 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [988 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [989 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [98a 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [98b 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [98c 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [98d 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [98e 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [98f 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [990 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [991 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [992 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [993 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [994 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [995 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [996 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [997 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 gate 1602702070718233700 evaluation starts +peer1.org1.example.com | [998 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [999 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [99a 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 principal matched by identity 0 +peer1.org1.example.com | [99b 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [99c 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [99d 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [99e 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003684c10 gate 1602702070718233700 evaluation succeeds +peer1.org1.example.com | [99f 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9a0 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9a1 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9a2 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9a3 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9a4 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9ca 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 c9 b3 da 44 38 4e b4 ee af 71 ff 4c 4c b8 d8 |....D8N...q.LL..| +peer0.org1.example.com | 00000010 37 a7 e8 68 5f e1 72 84 93 c8 04 de ad a2 db 58 |7..h_.r........X| +peer0.org1.example.com | [9cb 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 ae 83 c0 d8 ed f5 66 84 c6 23 |0E.!........f..#| +peer0.org1.example.com | 00000010 70 7c 5d 2c d0 ad 92 9e 5b 99 84 92 19 d3 81 9f |p|],....[.......| +peer0.org1.example.com | 00000020 c6 66 cc 6b ea 02 20 1c f1 d8 bc 34 6f 12 b9 a2 |.f.k.. ....4o...| +peer0.org1.example.com | 00000030 38 2c 86 ef b4 53 86 93 b2 a1 aa 9a 4f b7 11 e7 |8,...S......O...| +peer0.org1.example.com | 00000040 16 5b 19 fb bf 5d 8e |.[...].| +peer0.org1.example.com | [9cc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9cd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 gate 1602702070205201800 evaluation succeeds +peer0.org1.example.com | [9ce 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9cf 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9d0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9d1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9d2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [9d3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [9d4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [9d5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [9d6 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [9d7 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9d8 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9d9 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9da 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9db 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9dc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9dd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9de 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9df 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [9e2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9e5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [9e6 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [9e7 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9e4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [9e8 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9e9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ea 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9eb 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9ec 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9ed 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ee 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ef 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [9f0 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:32.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 2 on channel businesschannel took 35.6µs" +orderer0.example.com | "2020-10-14 19:01:32.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +orderer0.example.com | "2020-10-14 19:01:32.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.1µs " +orderer0.example.com | "2020-10-14 19:01:32.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.4µs " +orderer0.example.com | "2020-10-14 19:01:32.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:32.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel testchainid took 392.4µs" +orderer0.example.com | "2020-10-14 19:01:33.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.5µs " +orderer0.example.com | "2020-10-14 19:01:33.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +orderer0.example.com | "2020-10-14 19:01:33.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 7.7µs" +orderer0.example.com | "2020-10-14 19:01:33.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.4µs " +orderer0.example.com | "2020-10-14 19:01:33.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.4µs " +orderer0.example.com | "2020-10-14 19:01:33.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel testchainid took 34.3µs" +orderer0.example.com | "2020-10-14 19:01:33.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU e85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.1µs " +orderer0.example.com | "2020-10-14 19:01:33.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2020-10-14 19:01:33.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +orderer0.example.com | "2020-10-14 19:01:33.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.7µs " +orderer0.example.com | "2020-10-14 19:01:33.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " +orderer0.example.com | "2020-10-14 19:01:33.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:33.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 3 on channel testchainid took 53.8µs" +orderer0.example.com | "2020-10-14 19:01:34.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 440.4µs " +orderer0.example.com | "2020-10-14 19:01:34.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 2 on channel businesschannel took 317µs" +orderer0.example.com | "2020-10-14 19:01:34.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2020-10-14 19:01:34.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 496.3µs " +orderer0.example.com | "2020-10-14 19:01:34.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 229.3µs " +orderer0.example.com | "2020-10-14 19:01:34.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +orderer0.example.com | "2020-10-14 19:01:34.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +orderer0.example.com | "2020-10-14 19:01:34.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +orderer0.example.com | "2020-10-14 19:01:34.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +orderer0.example.com | "2020-10-14 19:01:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +orderer0.example.com | "2020-10-14 19:01:34.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147µs " +orderer0.example.com | "2020-10-14 19:01:35.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:35.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2020-10-14 19:01:35.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " +orderer0.example.com | "2020-10-14 19:01:35.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-10-14 19:01:35.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-10-14 19:01:35.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.2µs " +orderer0.example.com | "2020-10-14 19:01:35.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +orderer0.example.com | "2020-10-14 19:01:35.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:35.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:35.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:35.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-10-14 19:01:35.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 500.5µs " +orderer0.example.com | "2020-10-14 19:01:35.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-10-14 19:01:35.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eab Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-10-14 19:01:35.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 529.5µs " +orderer0.example.com | "2020-10-14 19:01:35.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +orderer0.example.com | "2020-10-14 19:01:35.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:35.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 3 on channel testchainid took 67.2µs" +orderer0.example.com | "2020-10-14 19:01:36.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.9µs " +peer0.org2.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer0.org2.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer0.org2.example.com | [b31 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b32 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cacb0 gate 1602702074174087600 evaluation succeeds +peer0.org2.example.com | [b33 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b34 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b35 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b36 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b37 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b38 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b39 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [b3a 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer0.org2.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer0.org2.example.com | [b3b 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer0.org2.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer0.org2.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer0.org2.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer0.org2.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer0.org2.example.com | [b3c 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b3d 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b3e 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b3f 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [b40 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 2e f0 13 02 92 f7 68 8b 22 4e db 86 d3 44 12 |\......h."N...D.| +peer0.org2.example.com | 00000010 13 a0 ae 1c 4c d7 a3 0d 44 3a f8 2f b6 48 a1 3b |....L...D:./.H.;| +peer0.org2.example.com | [b41 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 4f 27 bd 80 22 e5 cb 79 e7 16 e8 |0D. .O'.."..y...| +peer0.org2.example.com | 00000010 40 c1 41 b8 51 76 cc 89 71 1d 73 76 16 aa 20 d3 |@.A.Qv..q.sv.. .| +peer0.org2.example.com | 00000020 eb cf f5 3b 02 20 79 37 9f 10 b8 2e 6b 81 0a 22 |...;. y7....k.."| +peer0.org2.example.com | 00000030 4d b7 6a ca b3 52 f4 6e e2 41 d5 bf a7 0a e0 30 |M.j..R.n.A.....0| +peer0.org2.example.com | 00000040 c5 b5 6c 81 17 72 |..l..r| +peer0.org2.example.com | [b42 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b43 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b44 10-14 19:01:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b45 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b46 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b47 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [b48 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b49 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [b4a 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b4b 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [b4c 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [b4d 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +peer0.org2.example.com | 00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +peer0.org2.example.com | [b4e 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +peer0.org2.example.com | 00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +peer0.org2.example.com | 00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +peer0.org2.example.com | 00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +peer0.org2.example.com | 00000040 a5 3c 20 be c1 72 dc |.< ..r.| +peer0.org2.example.com | [b4f 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [b50 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 5b 18 a5 2f 85 63 a5 8e b5 81 e9 |0D. X[../.c.....| +peer0.org2.example.com | 00000010 9b 2b 59 89 59 26 eb c5 08 96 4d e1 6a ae 5b 55 |.+Y.Y&....M.j.[U| +peer0.org2.example.com | 00000020 36 4d ec ee 02 20 63 bd bd 96 eb 6d 82 7b 3a 08 |6M... c....m.{:.| +peer0.org2.example.com | 00000030 0b 40 2c f0 cb 3c 7f 02 e7 3b 7a 73 47 ba a6 a0 |.@,..<...;zsG...| +peer0.org2.example.com | 00000040 cb 68 36 5b 45 c9 |.h6[E.| +peer0.org2.example.com | [b51 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-10-14 19:01:36.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-10-14 19:01:36.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:36.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.8µs " +orderer0.example.com | "2020-10-14 19:01:36.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.4µs " +orderer0.example.com | "2020-10-14 19:01:36.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.557 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.558 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2020-10-14 19:01:36.560 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3859ms " +orderer0.example.com | "2020-10-14 19:01:36.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +orderer0.example.com | "2020-10-14 19:01:36.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2020-10-14 19:01:36.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 554.2µs " +orderer0.example.com | "2020-10-14 19:01:36.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +orderer0.example.com | "2020-10-14 19:01:36.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:36.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2020-10-14 19:01:37.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " +orderer0.example.com | "2020-10-14 19:01:37.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-10-14 19:01:37.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-10-14 19:01:37.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.6µs " +orderer0.example.com | "2020-10-14 19:01:37.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +orderer0.example.com | "2020-10-14 19:01:37.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:37.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +orderer0.example.com | "2020-10-14 19:01:37.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +orderer0.example.com | "2020-10-14 19:01:37.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 214.4µs" +orderer0.example.com | "2020-10-14 19:01:37.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +orderer0.example.com | "2020-10-14 19:01:37.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 363.4µs " +orderer0.example.com | "2020-10-14 19:01:37.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:37.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 3 on channel testchainid took 268.3µs" +orderer0.example.com | "2020-10-14 19:01:38.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335µs " +orderer0.example.com | "2020-10-14 19:01:38.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2020-10-14 19:01:38.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2020-10-14 19:01:38.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 587.9µs " +peer1.org2.example.com | [ac8 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ac9 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [aca 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [acb 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [acc 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [acd 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [ace 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [acf 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ad0 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad1 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ad2 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad3 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ad4 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad5 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [b52 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [b53 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [b54 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [b55 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [b56 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b57 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b58 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b59 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [b5a 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b5b 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b5c 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b5d 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\350\245< \276\301r\334" secret_envelope: > alive: +peer0.org2.example.com | [b5e 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [b5f 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b60 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [b61 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b62 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b63 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b64 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b65 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b66 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b67 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b68 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b69 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6a 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6b 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6c 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6d 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [b6e 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6f 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [b70 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b71 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [b72 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [b73 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9f1 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [9f2 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [9f3 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [9f4 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9f5 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9f6 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9f7 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9f8 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9f9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9fa 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [9fb 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 gate 1602702070330241600 evaluation starts +peer0.org1.example.com | [9fc 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9fd 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [9fe 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [9ff 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 principal evaluation fails +peer0.org1.example.com | [a00 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 gate 1602702070330241600 evaluation fails +peer0.org1.example.com | [a01 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a02 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a03 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [a04 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 gate 1602702070330518100 evaluation starts +peer0.org1.example.com | [a05 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a06 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [a07 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [a08 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [a09 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [a0a 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 principal matched by identity 0 +peer0.org1.example.com | [a0b 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [a0c 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [a0d 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a0e 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 gate 1602702070330518100 evaluation succeeds +peer0.org1.example.com | [a0f 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a10 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a11 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a12 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a13 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:38.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 421µs " +orderer0.example.com | "2020-10-14 19:01:38.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2020-10-14 19:01:38.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +orderer0.example.com | "2020-10-14 19:01:38.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:38.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2020-10-14 19:01:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +orderer0.example.com | "2020-10-14 19:01:38.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:38.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-10-14 19:01:39.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.8µs " +orderer0.example.com | "2020-10-14 19:01:39.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2020-10-14 19:01:39.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-10-14 19:01:39.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " +orderer0.example.com | "2020-10-14 19:01:39.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.4µs " +orderer0.example.com | "2020-10-14 19:01:39.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 3 on channel testchainid took 76.6µs" +orderer0.example.com | "2020-10-14 19:01:39.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.6µs " +orderer0.example.com | "2020-10-14 19:01:39.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2020-10-14 19:01:39.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +orderer0.example.com | "2020-10-14 19:01:39.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.4µs " +orderer0.example.com | "2020-10-14 19:01:39.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 565µs " +orderer0.example.com | "2020-10-14 19:01:39.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:39.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:40.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:40.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-10-14 19:01:40.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU efa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.4µs " +orderer0.example.com | "2020-10-14 19:01:40.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2020-10-14 19:01:40.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2020-10-14 19:01:40.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +orderer0.example.com | "2020-10-14 19:01:40.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.7µs " +orderer0.example.com | "2020-10-14 19:01:40.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [ad6 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [ad7 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad8 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ad9 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [ada 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [adb 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [adc 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [add 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161012 +peer1.org2.example.com | [ade 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8543A2E3D54B335AFB2B0A738AB2A50789F32AF29447C2B15D0949D35533C49E +peer1.org2.example.com | [adf 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [ae0 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [ae1 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [ae2 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ae3 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ae4 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer1.org2.example.com | [ae5 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ae6 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ae8 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ae9 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [aea 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aeb 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [aed 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aec 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [aee 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ae7 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer1.org2.example.com | [af0 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer1.org2.example.com | [af1 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aef 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [af2 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [af4 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af5 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [af3 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [af6 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [af7 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [af8 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org2.example.com | [af9 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org2.example.com | [afa 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [afb 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [afc 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [afd 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer1.org2.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer1.org2.example.com | [afe 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer1.org2.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer1.org2.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer1.org2.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer1.org2.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer1.org2.example.com | [aff 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b00 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b01 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b02 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b03 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [b04 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b05 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [b06 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [b07 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer1.org2.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer1.org2.example.com | [b08 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer1.org2.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer1.org2.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer1.org2.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer1.org2.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer1.org2.example.com | [b09 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [b0a 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 c3 64 87 1e 8d a9 25 f5 14 0e |0E.!...d....%...| +peer1.org2.example.com | 00000010 77 b6 ad 0f 06 36 e3 10 50 c2 71 f4 59 c1 3d f7 |w....6..P.q.Y.=.| +peer1.org2.example.com | 00000020 c0 20 24 17 ea 02 20 2b bf a0 fa 39 da 0c ed 9f |. $... +...9....| +peer1.org2.example.com | 00000030 be 2b 88 45 d0 93 e0 d7 a9 85 66 f2 e5 eb bf 8a |.+.E......f.....| +peer1.org2.example.com | 00000040 c3 9c 9e ca ef 2d 9d |.....-.| +peer1.org2.example.com | [b0b 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [b0c 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [b0d 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b0e 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b0f 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [b11 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [b10 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b12 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org2.example.com | [b13 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org2.example.com | [b14 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [b15 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b16 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [b17 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer1.org2.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer1.org2.example.com | [b18 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer1.org2.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer1.org2.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer1.org2.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer1.org2.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer1.org2.example.com | [b19 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b1a 10-14 19:01:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b1b 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b1c 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b1d 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b1e 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b1f 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b20 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b21 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b22 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [b23 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [b24 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [b25 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b26 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b27 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b28 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b29 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b2a 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b2b 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [b2c 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b2d 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [b2e 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [b2f 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b30 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [b31 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [b32 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b33 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b34 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b35 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b36 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b37 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b38 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b39 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 gate 1602702078426975800 evaluation starts +peer1.org2.example.com | [b3a 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b3b 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [b3c 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b3d 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 principal evaluation fails +peer1.org2.example.com | [b3e 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348cbc0 gate 1602702078426975800 evaluation fails +peer1.org2.example.com | [b3f 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b40 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b41 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b42 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 gate 1602702078432742700 evaluation starts +peer1.org2.example.com | [b43 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b44 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [b45 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 principal matched by identity 0 +peer1.org1.example.com | [9a5 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9a6 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9a7 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9a8 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9a9 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9aa 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 gate 1602702070722653400 evaluation starts +peer1.org1.example.com | [9ab 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9ac 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [9ad 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 principal matched by identity 0 +peer1.org1.example.com | [9ae 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [9af 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [9b0 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9b1 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003685800 gate 1602702070722653400 evaluation succeeds +peer1.org1.example.com | [9b2 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9b3 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9b4 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9b5 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9b6 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9b7 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9b8 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [9b9 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ba 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9bb 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9bc 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9bd 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9be 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9bf 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c0 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a14 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a15 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a16 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [a17 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a18 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:40.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:40.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:40.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-10-14 19:01:40.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +orderer0.example.com | "2020-10-14 19:01:40.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel businesschannel took 31.6µs" +orderer0.example.com | "2020-10-14 19:01:40.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 2 on channel businesschannel took 8.8µs" +orderer0.example.com | "2020-10-14 19:01:40.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.7µs " +orderer0.example.com | "2020-10-14 19:01:40.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +orderer0.example.com | "2020-10-14 19:01:40.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:40.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-10-14 19:01:41.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " +orderer0.example.com | "2020-10-14 19:01:41.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2020-10-14 19:01:41.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel businesschannel took 7.7µs" +orderer0.example.com | "2020-10-14 19:01:41.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.5µs " +orderer0.example.com | "2020-10-14 19:01:41.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 434.7µs " +orderer0.example.com | "2020-10-14 19:01:41.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 10.2µs" +orderer0.example.com | "2020-10-14 19:01:41.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 602µs " +orderer0.example.com | "2020-10-14 19:01:41.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2020-10-14 19:01:41.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +orderer0.example.com | "2020-10-14 19:01:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 338.1µs " +orderer0.example.com | "2020-10-14 19:01:41.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:41.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +orderer0.example.com | "2020-10-14 19:01:42.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.5µs " +orderer0.example.com | "2020-10-14 19:01:42.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2020-10-14 19:01:42.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:42.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.8µs " +orderer0.example.com | "2020-10-14 19:01:42.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 477.9µs " +orderer0.example.com | "2020-10-14 19:01:42.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +orderer0.example.com | "2020-10-14 19:01:42.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.4µs " +orderer0.example.com | "2020-10-14 19:01:42.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-10-14 19:01:42.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2020-10-14 19:01:42.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +orderer0.example.com | "2020-10-14 19:01:42.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 339.1µs " +orderer0.example.com | "2020-10-14 19:01:42.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:42.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2f Sending msg of 28 bytes to 3 on channel testchainid took 64.8µs" +orderer0.example.com | "2020-10-14 19:01:43.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU f30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.9µs " +orderer0.example.com | "2020-10-14 19:01:43.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:01:43.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +peer1.org2.example.com | [b46 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer1.org2.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer1.org2.example.com | [b47 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer1.org2.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer1.org2.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer1.org2.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer1.org2.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer1.org2.example.com | [b48 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b49 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00348d130 gate 1602702078432742700 evaluation succeeds +peer1.org2.example.com | [b4a 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b4b 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b4c 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b4d 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b4e 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b4f 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [b50 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [b51 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [b52 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [b53 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b54 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b55 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b56 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [b57 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b58 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b59 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b5a 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [b5b 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [b5c 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [b5d 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b5e 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [b5f 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [b60 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b61 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b62 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b63 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b64 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b65 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b66 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [b67 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b68 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [b69 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b6a 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [b6b 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [b6c 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b6d 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b6e 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b6f 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b70 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b71 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b72 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b73 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 gate 1602702078576272000 evaluation starts +peer1.org2.example.com | [b74 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b75 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [b76 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b77 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 principal evaluation fails +peer1.org2.example.com | [b78 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003477340 gate 1602702078576272000 evaluation fails +peer1.org2.example.com | [b79 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b7a 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b7b 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b7c 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 gate 1602702078578258700 evaluation starts +peer1.org2.example.com | [b7d 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b7e 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [b74 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b75 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b76 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b77 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b78 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b79 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b7a 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 gate 1602702074447557000 evaluation starts +peer0.org2.example.com | [b7b 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b7c 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [b7d 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 principal matched by identity 0 +peer0.org2.example.com | [b7e 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +peer0.org2.example.com | 00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +peer0.org2.example.com | [b7f 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +peer0.org2.example.com | 00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +peer0.org2.example.com | 00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +peer0.org2.example.com | 00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +peer0.org2.example.com | 00000040 a9 45 ea e8 63 24 |.E..c$| +peer0.org2.example.com | [b80 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b81 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c90 gate 1602702074447557000 evaluation succeeds +peer0.org2.example.com | [b82 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b83 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b84 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b85 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b86 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b87 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [b88 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [b89 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [b8a 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [b8b 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b8c 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b8d 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b8e 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [b8f 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b90 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b91 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a19 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a1a 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [a1b 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1c 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1d 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a1e 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a1f 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [a20 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a21 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a22 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a23 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a24 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [a25 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 44 0e 34 11 6f 14 63 2d 67 64 de 92 bc 80 65 |zD.4.o.c-gd....e| +peer0.org1.example.com | 00000010 1f d9 5c bd ba 5f 8c d0 cf fb 54 8a f9 0c 86 92 |..\.._....T.....| +peer0.org1.example.com | [a26 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 7c 3f ea 11 50 eb 95 8e 07 be 2c |0D. m|?..P.....,| +peer0.org1.example.com | 00000010 3b 16 87 3f 7d 7b e7 27 bf 17 74 e3 1c 94 18 99 |;..?}{.'..t.....| +peer0.org1.example.com | 00000020 57 b9 ad 44 02 20 70 10 eb 21 10 0d a9 c8 70 6e |W..D. p..!....pn| +peer0.org1.example.com | 00000030 05 ed 72 5c 66 67 ad db 7e 9a 67 3d 94 61 0d 2a |..r\fg..~.g=.a.*| +peer0.org1.example.com | 00000040 aa 06 97 eb a4 28 |.....(| +peer0.org1.example.com | [a27 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a28 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [a29 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a2a 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a2b 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [a2c 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a2d 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a2e 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a2f 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a30 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a31 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a32 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [a33 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a34 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [a35 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a36 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a37 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a38 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9c1 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9c2 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9c3 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9c4 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9c5 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 gate 1602702070756545200 evaluation starts +peer1.org1.example.com | [9c6 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9c7 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [9c8 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 principal matched by identity 0 +peer1.org1.example.com | [9c9 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [9ca 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [9cb 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9cc 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00365f760 gate 1602702070756545200 evaluation succeeds +peer1.org1.example.com | [9cd 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9ce 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9cf 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9d0 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9d1 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d2 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d3 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d4 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found +peer1.org1.example.com | [9d5 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes isn't valid +peer1.org1.example.com | [9d6 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d7 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d8 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d9 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found +peer1.org1.example.com | [9da 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes isn't valid +peer1.org1.example.com | [9db 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9dc 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [9dd 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [b92 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b93 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\350\245< \276\301r\334" > alive: alive: alive: +peer0.org2.example.com | [b94 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [b95 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b96 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b97 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b98 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b99 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9a 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9b 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9c 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9d 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b9e 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [b9f 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ba0 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ba1 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ba2 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ba3 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [ba4 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ba5 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b7f 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 principal matched by identity 0 +peer1.org2.example.com | [b80 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +peer1.org2.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +peer1.org2.example.com | [b81 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer1.org2.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer1.org2.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +peer1.org2.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +peer1.org2.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +peer1.org2.example.com | [b82 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b83 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034778b0 gate 1602702078578258700 evaluation succeeds +peer1.org2.example.com | [b84 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b85 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b86 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b87 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b88 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [b89 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [b8a 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [b8b 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [b8c 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [b8d 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b8e 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b8f 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b90 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [b91 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b92 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b93 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b94 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [b95 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [b96 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [b97 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b98 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b99 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9a 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b9b 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b9c 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9d 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9e 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9f 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [ba0 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ba1 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [ba2 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [ba3 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [ba6 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ba7 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ba8 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ba9 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [baa 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [bab 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 gate 1602702074608108500 evaluation starts +peer0.org2.example.com | [bac 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bad 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [bae 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 principal matched by identity 0 +peer0.org2.example.com | [baf 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer0.org2.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer0.org2.example.com | [bb0 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer0.org2.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer0.org2.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer0.org2.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer0.org2.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer0.org2.example.com | [bb1 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bb2 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003664330 gate 1602702074608108500 evaluation succeeds +peer0.org2.example.com | [bb3 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bb4 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bb5 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bb6 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bb7 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bb8 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [bb9 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [bba 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [bbb 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [bbc 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bbd 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bbe 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bbf 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [bc0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bc1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bc2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bc3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [bc4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\350\245< \276\301r\334" > alive: alive:]=\243\\Mt\247\220d\007" > alive: +peer0.org2.example.com | [bc5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [bc6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bc7 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bc8 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9de 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [9df 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e0 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e1 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e2 10-14 19:01:11.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [9e3 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org1.example.com | [9e4 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [9e5 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e6 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9e7 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4682755254069794021, Envelope: 961 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e8 10-14 19:01:11.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4682755254069794021, Envelope: 961 bytes, Signature: 0 bytes +peer1.org1.example.com | [9e9 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9ea 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9eb 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ec 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9ed 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9ee 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9ef 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9f0 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 gate 1602702071431717900 evaluation starts +peer1.org1.example.com | [9f1 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9f2 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [9f3 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 principal matched by identity 0 +peer1.org1.example.com | [9f4 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org1.example.com | [9f5 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f3 fb 62 7f 87 11 4b 34 63 d3 |0E.!....b...K4c.| +peer1.org1.example.com | 00000010 01 62 92 3f c2 b1 6a 9e d0 4f f1 b0 1a 5d 14 4e |.b.?..j..O...].N| +peer1.org1.example.com | 00000020 a8 c9 af 1f 14 02 20 65 85 bd 39 de 1a e7 83 71 |...... e..9....q| +peer1.org1.example.com | 00000030 d2 6a 00 2f 3f f8 77 35 68 a3 6d de c2 70 81 18 |.j./?.w5h.m..p..| +peer1.org1.example.com | 00000040 37 2e ac 89 e0 37 6b |7....7k| +peer1.org1.example.com | [9f6 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9f7 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036a7700 gate 1602702071431717900 evaluation succeeds +peer1.org1.example.com | [9f8 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9f9 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9fa 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9fb 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9fc 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9fd 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9fe 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4682755254069794021, Envelope: 961 bytes, Signature: 0 bytes +peer1.org1.example.com | [9ff 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a00 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a01 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ba4 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610041801 +peer1.org2.example.com | [ba5 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 885262FF121FCB1DC32F9A31F92026C92CE8C0018DA77E5CDEF004BE561203B5 +peer1.org2.example.com | [ba6 10-14 19:01:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [ba7 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ba8 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ba9 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [baa 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bab 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bac 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [bad 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bae 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [baf 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb0 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [bb1 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb2 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bb3 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb4 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bb5 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb6 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bb7 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb8 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb9 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bba 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bbb 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [bbc 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bbd 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bbe 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [bbf 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [bc0 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [bc1 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 gate 1602702078951477600 evaluation starts +peer1.org2.example.com | [bc2 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bc3 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [bc4 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [bc5 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 principal evaluation fails +peer1.org2.example.com | [bc6 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ddbb0 gate 1602702078951477600 evaluation fails +peer1.org2.example.com | [bc7 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bc8 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bc9 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [bca 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 gate 1602702078952573600 evaluation starts +peer1.org2.example.com | [bcb 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bcc 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [bcd 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 principal matched by identity 0 +peer1.org2.example.com | [bce 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [bcf 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [bd0 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [bd1 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [bd2 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bd3 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [bd4 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bd5 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [bd6 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [bd7 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bd9 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [bda 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003516120 gate 1602702078952573600 evaluation succeeds +peer1.org2.example.com | [bdb 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bdc 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bdd 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [bde 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [bdf 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [be0 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:01:43.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +orderer0.example.com | "2020-10-14 19:01:43.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 697.5µs " +orderer0.example.com | "2020-10-14 19:01:43.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2020-10-14 19:01:43.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +orderer0.example.com | "2020-10-14 19:01:43.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-10-14 19:01:43.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2020-10-14 19:01:43.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.8µs " +orderer0.example.com | "2020-10-14 19:01:43.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 422.5µs " +orderer0.example.com | "2020-10-14 19:01:43.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:43.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f41 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2020-10-14 19:01:44.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.6µs " +orderer0.example.com | "2020-10-14 19:01:44.159 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-10-14 19:01:44.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.1µs " +orderer0.example.com | "2020-10-14 19:01:44.160 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.6µs " +orderer0.example.com | "2020-10-14 19:01:44.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.161 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.163 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 2 on channel businesschannel took 50.7µs" +orderer0.example.com | "2020-10-14 19:01:44.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4a Sending msg of 28 bytes to 3 on channel testchainid took 93.4µs" +orderer0.example.com | "2020-10-14 19:01:44.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " +orderer0.example.com | "2020-10-14 19:01:44.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2020-10-14 19:01:44.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +orderer0.example.com | "2020-10-14 19:01:44.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +orderer0.example.com | "2020-10-14 19:01:44.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.5µs " +orderer0.example.com | "2020-10-14 19:01:44.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:44.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f53 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +orderer0.example.com | "2020-10-14 19:01:45.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.8µs " +orderer0.example.com | "2020-10-14 19:01:45.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 2 on channel businesschannel took 213.9µs" +orderer0.example.com | "2020-10-14 19:01:45.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel businesschannel took 110.8µs" +orderer0.example.com | "2020-10-14 19:01:45.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +orderer0.example.com | "2020-10-14 19:01:45.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.169 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.7365ms " +orderer0.example.com | "2020-10-14 19:01:45.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +orderer0.example.com | "2020-10-14 19:01:45.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.3µs " +orderer0.example.com | "2020-10-14 19:01:45.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +orderer0.example.com | "2020-10-14 19:01:45.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +orderer0.example.com | "2020-10-14 19:01:45.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.7µs " +orderer0.example.com | "2020-10-14 19:01:45.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 417.4µs " +orderer0.example.com | "2020-10-14 19:01:45.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:45.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2020-10-14 19:01:46.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.3µs " +orderer0.example.com | "2020-10-14 19:01:46.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2020-10-14 19:01:46.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2020-10-14 19:01:46.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.2µs " +orderer0.example.com | "2020-10-14 19:01:46.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 584.4µs " +orderer0.example.com | "2020-10-14 19:01:46.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.161 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6e Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +orderer0.example.com | "2020-10-14 19:01:46.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78µs " +orderer0.example.com | "2020-10-14 19:01:46.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-10-14 19:01:46.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +orderer0.example.com | "2020-10-14 19:01:46.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " +orderer0.example.com | "2020-10-14 19:01:46.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +orderer0.example.com | "2020-10-14 19:01:46.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:46.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.057 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f77 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2020-10-14 19:01:47.059 UTC [orderer.common.cluster.step] sendMessage -> DEBU f78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 958.4µs " +orderer0.example.com | "2020-10-14 19:01:47.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +orderer0.example.com | "2020-10-14 19:01:47.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +orderer0.example.com | "2020-10-14 19:01:47.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 231.6µs " +orderer0.example.com | "2020-10-14 19:01:47.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.2µs " +orderer0.example.com | "2020-10-14 19:01:47.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-10-14 19:01:47.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.9µs " +orderer0.example.com | "2020-10-14 19:01:47.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +orderer0.example.com | "2020-10-14 19:01:47.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2020-10-14 19:01:47.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.4µs " +orderer0.example.com | "2020-10-14 19:01:47.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.4µs " +orderer0.example.com | "2020-10-14 19:01:47.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:47.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [a39 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [a3a 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a3b 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [a3c 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [a3d 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer0.org1.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer0.org1.example.com | [a3e 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer0.org1.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer0.org1.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer0.org1.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer0.org1.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer0.org1.example.com | [a3f 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [a40 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 40 ea ea 40 58 18 b9 9b 4f ea |0E.!..@..@X...O.| +peer0.org1.example.com | 00000010 35 5d 0b 30 55 58 48 51 6c d3 66 da 42 33 24 f5 |5].0UXHQl.f.B3$.| +peer0.org1.example.com | 00000020 bc 27 29 7f 60 02 20 73 70 6b 7d b0 2d d9 a2 85 |.').`. spk}.-...| +peer0.org1.example.com | 00000030 08 f6 18 ee 1b 6f 2c c0 ca cf eb 6f be 53 e5 1c |.....o,....o.S..| +peer0.org1.example.com | 00000040 2c a5 8d f9 4e 4d 99 |,...NM.| +peer0.org1.example.com | [a41 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [a42 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [a43 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a44 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a45 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [a46 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a47 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a48 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a49 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [a4a 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4b 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a4c 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a4d 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org1.example.com | [a4e 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer0.org1.example.com | [a4f 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a50 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [a51 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a52 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [a53 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a54 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a55 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a56 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [a59 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a57 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a5a 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a58 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [a5b 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [a5c 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a5d 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [a5e 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a5f 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a60 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a61 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [a62 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a63 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [bc9 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [bca 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [bcb 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bcc 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [bcd 10-14 19:01:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bce 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [bcf 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bd0 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [bd1 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd2 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd3 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bd4 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [bd5 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bd6 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bd7 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [bd8 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [bd9 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [bda 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 gate 1602702074662444300 evaluation starts +peer0.org2.example.com | [bdb 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bdc 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [bdd 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 principal matched by identity 0 +peer0.org2.example.com | [bde 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [bdf 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [be0 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [be1 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696540 gate 1602702074662444300 evaluation succeeds +peer0.org2.example.com | [be2 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [be3 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [be4 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [be5 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [be6 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be7 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [be1 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [be2 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [be3 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [be4 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [be5 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [be6 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [be7 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 gate 1602702078991902700 evaluation starts +peer1.org2.example.com | [be8 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [be9 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [bea 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [beb 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 principal evaluation fails +peer1.org2.example.com | [bec 10-14 19:01:18.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517320 gate 1602702078991902700 evaluation fails +peer1.org2.example.com | [bed 10-14 19:01:19.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bee 10-14 19:01:19.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bef 10-14 19:01:19.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [bf0 10-14 19:01:19.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 gate 1602702079009141900 evaluation starts +peer1.org2.example.com | [bd8 10-14 19:01:18.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [bf1 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bf2 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [bf3 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 principal matched by identity 0 +peer1.org2.example.com | [bf4 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [bf5 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [bf6 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [bf7 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003517890 gate 1602702079009141900 evaluation succeeds +peer1.org2.example.com | [bf8 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bf9 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bfa 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [bfb 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [bfc 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bfd 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bfe 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bff 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c00 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c01 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c02 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 gate 1602702079017898800 evaluation starts +peer1.org2.example.com | [c03 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c04 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c05 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c06 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 principal evaluation fails +peer1.org2.example.com | [c07 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c3d0 gate 1602702079017898800 evaluation fails +peer1.org2.example.com | [c08 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c09 10-14 19:01:19.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c0a 10-14 19:01:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [a02 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a03 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [a04 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 3 +peer1.org1.example.com | [a05 10-14 19:01:11.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a06 10-14 19:01:12.31 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]] +peer1.org1.example.com | [a07 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54670 +peer1.org1.example.com | [a08 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003740320 +peer1.org1.example.com | [a09 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [a0a 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [a0b 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [a0c 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [a0d 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 71 a8 8e 51 7c dd 1e 53 ed 5a f3 68 63 8d 14 |.q..Q|..S.Z.hc..| +peer1.org1.example.com | 00000010 67 04 3c 4c 4d d8 10 28 ac 69 06 15 fb 80 a7 77 |g. DEBU Verify: sig = 00000000 30 44 02 20 27 5f bf ee b2 0a 3b 8f 22 17 1a 79 |0D. '_....;."..y| +peer1.org1.example.com | 00000010 dc f8 8f 26 5c 02 9d 40 09 40 ea d2 95 93 89 f2 |...&\..@.@......| +peer1.org1.example.com | 00000020 b8 d4 f7 fe 02 20 3e 26 0d 59 52 5d 12 07 26 44 |..... >&.YR]..&D| +peer1.org1.example.com | 00000030 da 20 9e a5 c4 94 e9 7d 9c a5 d1 98 5c 91 dd 20 |. .....}....\.. | +peer1.org1.example.com | 00000040 0a 2b 92 07 ab 53 |.+...S| +peer1.org1.example.com | [a0f 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [a10 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035ab110, header 0xc003740730 +peer1.org1.example.com | [a11 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [a12 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU [][e3a482f9] processing txid: e3a482f9b6009c7117e831c55f1533379fcf7516520cd47a12bd979585d3fefc +peer1.org1.example.com | [a13 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU [][e3a482f9] Entry chaincode: name:"lscc" +peer1.org1.example.com | [a14 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> INFO [][e3a482f9] Entry chaincode: name:"lscc" +peer1.org1.example.com | [a15 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [a16 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 71 a8 8e 51 7c dd 1e 53 ed 5a f3 68 63 8d 14 |.q..Q|..S.Z.hc..| +peer1.org1.example.com | 00000010 67 04 3c 4c 4d d8 10 28 ac 69 06 15 fb 80 a7 77 |g. DEBU Verify: sig = 00000000 30 44 02 20 27 5f bf ee b2 0a 3b 8f 22 17 1a 79 |0D. '_....;."..y| +peer1.org1.example.com | 00000010 dc f8 8f 26 5c 02 9d 40 09 40 ea d2 95 93 89 f2 |...&\..@.@......| +peer1.org1.example.com | 00000020 b8 d4 f7 fe 02 20 3e 26 0d 59 52 5d 12 07 26 44 |..... >&.YR]..&D| +peer1.org1.example.com | 00000030 da 20 9e a5 c4 94 e9 7d 9c a5 d1 98 5c 91 dd 20 |. .....}....\.. | +peer1.org1.example.com | 00000040 0a 2b 92 07 ab 53 |.+...S| +peer1.org1.example.com | [a18 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [a19 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org1.example.com | [a1a 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org1.example.com | [a1b 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [3de7c40f-9d45-42fc-8225-653006b83ed8] +peer1.org1.example.com | [a1c 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [a1d 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3de7c40f-9d45-42fc-8225-653006b83ed8] +peer1.org1.example.com | [a1e 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org2.example.com | [c0b 10-14 19:01:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 gate 1602702079020618200 evaluation starts +peer1.org2.example.com | [c0c 10-14 19:01:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c0d 10-14 19:01:19.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c0e 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 principal matched by identity 0 +peer1.org2.example.com | [c0f 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [c10 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [c11 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c12 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353c940 gate 1602702079020618200 evaluation succeeds +peer1.org2.example.com | [c13 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c14 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c15 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c16 10-14 19:01:19.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c17 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [c18 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [c19 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [c1a 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [c1b 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c1c 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [c1d 10-14 19:01:19.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1e 10-14 19:01:19.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1f 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c20 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c21 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c22 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c23 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c24 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c25 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 gate 1602702079094747700 evaluation starts +peer1.org2.example.com | [c26 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c27 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c28 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c29 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 principal evaluation fails +peer1.org2.example.com | [c2a 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554ac0 gate 1602702079094747700 evaluation fails +peer1.org2.example.com | [c2b 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2c 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2d 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c2e 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 gate 1602702079096304400 evaluation starts +peer1.org2.example.com | [c2f 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c30 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c31 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 principal matched by identity 0 +peer1.org2.example.com | [c32 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [c33 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [c34 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c35 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555030 gate 1602702079096304400 evaluation succeeds +peer1.org2.example.com | [c36 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c37 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c38 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c39 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c3a 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c3b 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c3c 10-14 19:01:19.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c3d 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c3e 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c3f 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c40 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c41 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c42 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 gate 1602702079101169000 evaluation starts +peer1.org2.example.com | [c43 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c44 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c45 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c46 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 principal evaluation fails +peer1.org2.example.com | [c47 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574230 gate 1602702079101169000 evaluation fails +peer1.org2.example.com | [c48 10-14 19:01:19.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c49 10-14 19:01:19.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c4a 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c4b 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 gate 1602702079122080800 evaluation starts +peer1.org2.example.com | [c4c 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c4d 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c4e 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 principal matched by identity 0 +peer1.org2.example.com | [c4f 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [c50 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [c51 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c52 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035747a0 gate 1602702079122080800 evaluation succeeds +peer1.org2.example.com | [c53 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c54 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c55 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c56 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c57 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [c58 10-14 19:01:19.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [c59 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [c5a 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [c5b 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:48.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:48.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f89 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +orderer0.example.com | "2020-10-14 19:01:48.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " +orderer0.example.com | "2020-10-14 19:01:48.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2020-10-14 19:01:48.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8c Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +orderer0.example.com | "2020-10-14 19:01:48.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +orderer0.example.com | "2020-10-14 19:01:48.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.6µs " +orderer0.example.com | "2020-10-14 19:01:48.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:48.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:48.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:48.523 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f92 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +orderer0.example.com | "2020-10-14 19:01:48.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +orderer0.example.com | "2020-10-14 19:01:48.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 31.7µs" +orderer0.example.com | "2020-10-14 19:01:48.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.9µs " +orderer0.example.com | "2020-10-14 19:01:48.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +orderer0.example.com | "2020-10-14 19:01:48.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +peer1.org1.example.com | [a1f 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org1.example.com | [a20 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU [e3a482f9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [a21 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU [e3a482f9] notifying Txid:e3a482f9b6009c7117e831c55f1533379fcf7516520cd47a12bd979585d3fefc, channelID: +peer1.org1.example.com | [a22 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [a23 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> INFO [][e3a482f9] Exit chaincode: name:"lscc" (3ms) +peer1.org1.example.com | [a24 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU [][e3a482f9] Exit +peer1.org1.example.com | [a25 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54670 +peer1.org1.example.com | [a26 10-14 19:01:12.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54670 grpc.code=OK grpc.call_duration=6.2836ms +peer1.org1.example.com | [a27 10-14 19:01:12.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [a28 10-14 19:01:12.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [a29 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [a2a 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [a2b 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a2c 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610031801 +peer1.org1.example.com | [a2d 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B25EB7D5AD4A8433D233FA83589837FEFEFA6D26B73BAEC877F9AC625397227A +peer1.org1.example.com | [a2e 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [a2f 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a30 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a31 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [a32 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a33 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [a34 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a35 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a36 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a37 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a38 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a39 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org1.example.com | [a3a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org1.example.com | [a3b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org1.example.com | [a3c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [a3d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a3e 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a3f 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a40 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [a41 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a42 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a43 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a44 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a45 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [a46 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a47 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [a64 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [a65 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [a66 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a67 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a68 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161011 +peer0.org1.example.com | [a69 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F66084DCFBD811BFF8C121EB363FCBD574F7ECF792E829916CE16CB5FFF2916C +peer0.org1.example.com | [a6a 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a6b 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [a6c 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [a6d 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a6e 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a6f 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a70 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c5c 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [c5d 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c5e 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c5f 10-14 19:01:19.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c60 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c61 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c62 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c63 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c64 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c65 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c66 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 gate 1602702079147304400 evaluation starts +peer1.org2.example.com | [c67 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c68 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c69 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c6a 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 principal evaluation fails +peer1.org2.example.com | [c6b 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358e9d0 gate 1602702079147304400 evaluation fails +peer1.org2.example.com | [c6c 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c6d 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c6e 10-14 19:01:19.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c6f 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 gate 1602702079150018400 evaluation starts +peer1.org2.example.com | [c70 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c71 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c72 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 principal matched by identity 0 +peer1.org2.example.com | [c73 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [c74 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [c75 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c76 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358ef40 gate 1602702079150018400 evaluation succeeds +peer1.org2.example.com | [c77 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:01:48.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:48.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9b Sending msg of 28 bytes to 3 on channel testchainid took 11.3µs" +orderer0.example.com | "2020-10-14 19:01:49.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-10-14 19:01:49.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2020-10-14 19:01:49.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2020-10-14 19:01:49.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.7µs " +orderer0.example.com | "2020-10-14 19:01:49.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.1µs " +orderer0.example.com | "2020-10-14 19:01:49.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa4 Sending msg of 28 bytes to 3 on channel testchainid took 9.1µs" +orderer0.example.com | "2020-10-14 19:01:49.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +orderer0.example.com | "2020-10-14 19:01:49.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +orderer0.example.com | "2020-10-14 19:01:49.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-10-14 19:01:49.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 252µs " +orderer0.example.com | "2020-10-14 19:01:49.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 601.7µs " +orderer0.example.com | "2020-10-14 19:01:49.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:49.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2020-10-14 19:01:50.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +orderer0.example.com | "2020-10-14 19:01:50.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2020-10-14 19:01:50.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel businesschannel took 43.5µs" +orderer0.example.com | "2020-10-14 19:01:50.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 308.4µs " +orderer0.example.com | "2020-10-14 19:01:50.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.3µs " +orderer0.example.com | "2020-10-14 19:01:50.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:50.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.7µs " +orderer0.example.com | "2020-10-14 19:01:50.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2020-10-14 19:01:50.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2020-10-14 19:01:50.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +orderer0.example.com | "2020-10-14 19:01:50.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +orderer0.example.com | "2020-10-14 19:01:50.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:50.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [be8 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [be9 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bea 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [beb 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [bec 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [bed 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [bee 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 gate 1602702074663664000 evaluation starts +peer0.org2.example.com | [bef 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bf0 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [bf1 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 principal matched by identity 0 +peer0.org2.example.com | [bf2 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [bf3 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [bf4 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bf5 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697740 gate 1602702074663664000 evaluation succeeds +peer0.org2.example.com | [bf6 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bf7 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bf8 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bf9 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bfa 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [bfb 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [bfc 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [bfd 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [bfe 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bff 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [c00 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c01 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c02 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [c03 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c04 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c05 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a48 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [a49 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a4a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [a4b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [a4c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a4d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a4e 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a4f 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a50 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a51 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a52 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a53 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 gate 1602702074162318600 evaluation starts +peer1.org1.example.com | [a54 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a55 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [a56 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 principal matched by identity 0 +peer1.org1.example.com | [a57 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer1.org1.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer1.org1.example.com | [a58 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer1.org1.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer1.org1.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer1.org1.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer1.org1.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer1.org1.example.com | [a59 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a5a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a6810 gate 1602702074162318600 evaluation succeeds +peer1.org1.example.com | [a5b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a5c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a5d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a5e 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a5f 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [a60 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [a61 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a71 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [a72 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a73 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a74 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a75 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a76 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a77 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a78 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [a79 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [a7a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a7b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [a7d 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [a7e 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer0.org1.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer0.org1.example.com | [a7f 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +peer0.org1.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer0.org1.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer0.org1.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer0.org1.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer0.org1.example.com | [a80 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a7c 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a82 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161012 +peer0.org1.example.com | [a81 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [a84 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a85 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [a83 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E45B43B398C32B833E573D0F4AA5A92A9E2F3DA1982DF93F494A6987CF3FC8B2 +peer0.org1.example.com | [a86 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a87 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [a88 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [a8a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [a8b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [a89 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [a8c 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a8d 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a8e 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a8f 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a91 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [a92 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 gate 1602702070621449000 evaluation starts +peer0.org1.example.com | [a93 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a90 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [a94 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [a95 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 principal matched by identity 0 +peer0.org1.example.com | [a96 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [a97 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 97 90 39 ff 62 20 6e e9 99 1b 26 dc e0 99 a7 |;..9.b n...&....| +peer0.org1.example.com | 00000010 80 94 8c 81 c6 91 e0 f2 a0 4f ad c1 4e 92 57 df |.........O..N.W.| +peer0.org1.example.com | [a98 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 cd 8f a0 a1 0b 26 2b 6d a5 45 |0E.!.......&+m.E| +peer0.org1.example.com | 00000010 f0 76 84 90 50 0b 25 66 b3 c2 71 85 c0 07 6c db |.v..P.%f..q...l.| +peer0.org1.example.com | 00000020 43 ad 33 e4 41 02 20 50 83 58 0d a0 77 a9 4f ac |C.3.A. P.X..w.O.| +peer0.org1.example.com | 00000030 89 9d fd a4 f7 9b 66 35 71 4c 46 ef e0 12 5b 19 |......f5qLF...[.| +peer0.org1.example.com | 00000040 ee a6 1d c6 e9 dd 5b |......[| +peer0.org1.example.com | [a99 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9a 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [a9b 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 gate 1602702070621449000 evaluation succeeds +peer0.org1.example.com | [a9d 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a9e 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [a9f 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [aa0 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a9c 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aa1 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [aa3 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [aa4 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [aa5 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [aa6 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [aa2 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aa7 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aa9 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aa8 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [aab 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aac 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [aad 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [aae 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ab1 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aaf 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ab2 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ab0 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ab3 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aaa 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ab4 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ab5 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [ab6 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [ab7 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [ab8 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +peer0.org1.example.com | 00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +peer0.org1.example.com | [ab9 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +peer0.org1.example.com | 00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +peer0.org1.example.com | 00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +peer0.org1.example.com | 00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +peer0.org1.example.com | 00000040 b4 ba 0c 92 c2 8d |......| +peer0.org1.example.com | [aba 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [abb 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abc 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [abd 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer0.org1.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer0.org1.example.com | [abe 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +orderer0.example.com | "2020-10-14 19:01:51.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:51.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2020-10-14 19:01:51.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48µs " +orderer0.example.com | "2020-10-14 19:01:51.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2020-10-14 19:01:51.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 2 on channel businesschannel took 11.1µs" +orderer0.example.com | "2020-10-14 19:01:51.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.6µs " +orderer0.example.com | "2020-10-14 19:01:51.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +orderer0.example.com | "2020-10-14 19:01:51.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:51.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:51.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:51.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2020-10-14 19:01:51.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +orderer0.example.com | "2020-10-14 19:01:51.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel businesschannel took 59.5µs" +orderer0.example.com | "2020-10-14 19:01:51.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 2 on channel businesschannel took 14.3µs" +orderer0.example.com | "2020-10-14 19:01:51.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 252.6µs " +orderer0.example.com | "2020-10-14 19:01:51.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +orderer0.example.com | "2020-10-14 19:01:51.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:51.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-10-14 19:01:52.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-10-14 19:01:52.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:01:52.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-10-14 19:01:52.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.4µs " +orderer0.example.com | "2020-10-14 19:01:52.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +orderer0.example.com | "2020-10-14 19:01:52.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd9 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40044 with txid '7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2020-10-14 19:01:52.220 UTC [policies] Evaluate -> DEBU fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:52.220 UTC [policies] Evaluate -> DEBU fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fde == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:52.221 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:52.221 UTC [msp.identity] newIdentity -> DEBU fe0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func1 -> DEBU fe1 0xc000dabe20 gate 1602702112222104100 evaluation starts" +peer1.org1.example.com | [a62 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [a63 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [a64 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a65 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a66 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a67 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [a68 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a69 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a6a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a6b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org1.example.com | [a6c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org1.example.com | [a6d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a6e 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a6f 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [a70 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a71 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a72 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a73 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a74 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [a75 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [a76 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [a77 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [a78 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [a79 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [a7a 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a7b 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a7c 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a7d 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a7e 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a7f 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a80 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a81 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a82 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 gate 1602702074321304500 evaluation starts +peer1.org1.example.com | [a83 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a84 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [a85 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 principal matched by identity 0 +peer1.org1.example.com | [a86 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [a87 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [a88 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a89 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d5460 gate 1602702074321304500 evaluation succeeds +peer1.org1.example.com | [a8a 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a8b 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [a8c 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a8d 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a8e 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org1.example.com | [a8f 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a90 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [a91 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [a92 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a93 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [a94 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [a95 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [a96 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [a97 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a98 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a99 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a9a 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a9b 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a9c 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a9d 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a9e 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a9f 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 gate 1602702074326503900 evaluation starts +peer1.org1.example.com | [aa0 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [aa1 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [aa3 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 principal matched by identity 0 +peer1.org1.example.com | [aa4 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [aa5 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [aa6 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [aa7 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7870 gate 1602702074326503900 evaluation succeeds +peer1.org1.example.com | [aa8 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [aa9 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [aaa 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [aab 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [aac 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ����)�����H�5���K��q���2���( +peer1.org1.example.com | [aad 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aa2 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aae 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [aaf 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ab0 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ab1 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab2 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab3 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab4 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab5 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab6 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab7 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [ab8 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ab9 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [aba 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [abb 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [abc 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [abd 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [abe 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [abf 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer0.org1.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer0.org1.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer0.org1.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer0.org1.example.com | [abf 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ac0 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ac1 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ac2 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [ac3 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c78 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c79 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c7a 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c7b 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c7c 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c7d 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c7e 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c7f 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c80 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c81 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c82 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c83 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 gate 1602702079153476500 evaluation starts +peer1.org2.example.com | [c84 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c85 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c86 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [c87 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 principal evaluation fails +peer1.org2.example.com | [c88 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac140 gate 1602702079153476500 evaluation fails +peer1.org2.example.com | [c89 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c8a 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c8b 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c8c 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 gate 1602702079154504500 evaluation starts +peer1.org2.example.com | [c8d 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c8e 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [c8f 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 principal matched by identity 0 +peer1.org2.example.com | [c90 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [c91 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [c92 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c93 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac6b0 gate 1602702079154504500 evaluation succeeds +peer1.org2.example.com | [c94 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c95 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [c96 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c97 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c98 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [c99 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [c9a 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [c9b 10-14 19:01:19.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [c9c 10-14 19:01:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c9d 10-14 19:01:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [c9e 10-14 19:01:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [c9f 10-14 19:01:19.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca0 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [ca1 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c06 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [c07 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c08 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c09 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c0a 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c0b 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c0c 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c0d 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c0e 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c0f 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c10 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c11 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 gate 1602702074670142800 evaluation starts +peer0.org2.example.com | [c12 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c13 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [c14 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 principal matched by identity 0 +peer0.org2.example.com | [c15 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [c16 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [c17 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c18 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3970 gate 1602702074670142800 evaluation succeeds +peer0.org2.example.com | [c19 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c1a 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c1b 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c1c 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c1d 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c1e 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c1f 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c20 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c21 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c22 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c23 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c24 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c25 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 gate 1602702074672265600 evaluation starts +peer0.org2.example.com | [c26 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c27 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [c28 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 principal matched by identity 0 +peer0.org2.example.com | [c29 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [c2a 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [c2b 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c2c 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dab70 gate 1602702074672265600 evaluation succeeds +peer0.org2.example.com | [c2d 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c2e 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c2f 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c30 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ac4 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ac5 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ac6 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ac7 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ac8 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ac9 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [aca 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 gate 1602702070667242400 evaluation starts +peer0.org1.example.com | [acb 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [acc 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [acd 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 principal matched by identity 0 +peer0.org1.example.com | [ace 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 2e f0 13 02 92 f7 68 8b 22 4e db 86 d3 44 12 |\......h."N...D.| +peer0.org1.example.com | 00000010 13 a0 ae 1c 4c d7 a3 0d 44 3a f8 2f b6 48 a1 3b |....L...D:./.H.;| +peer0.org1.example.com | [acf 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 4f 27 bd 80 22 e5 cb 79 e7 16 e8 |0D. .O'.."..y...| +peer0.org1.example.com | 00000010 40 c1 41 b8 51 76 cc 89 71 1d 73 76 16 aa 20 d3 |@.A.Qv..q.sv.. .| +peer0.org1.example.com | 00000020 eb cf f5 3b 02 20 79 37 9f 10 b8 2e 6b 81 0a 22 |...;. y7....k.."| +peer0.org1.example.com | 00000030 4d b7 6a ca b3 52 f4 6e e2 41 d5 bf a7 0a e0 30 |M.j..R.n.A.....0| +peer0.org1.example.com | 00000040 c5 b5 6c 81 17 72 |..l..r| +peer0.org1.example.com | [ad0 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ad1 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 gate 1602702070667242400 evaluation succeeds +peer0.org1.example.com | [ad2 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ad3 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ad4 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ad5 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ad6 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ad7 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [ad8 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [ad9 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [ada 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [adb 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [adc 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [add 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ade 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [adf 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [ae0 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +peer0.org1.example.com | 00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +peer0.org1.example.com | [ae1 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +peer0.org1.example.com | 00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +peer0.org1.example.com | 00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +peer0.org1.example.com | 00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +peer0.org1.example.com | 00000040 b9 49 f6 4a a1 89 |.I.J..| +peer0.org1.example.com | [ae2 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ae3 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [ae5 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 60 12 6d 02 83 f4 14 aa 47 6a |0E.!..`.m.....Gj| +peer0.org1.example.com | 00000010 54 17 f2 5b 8d 85 54 6b 63 36 e4 fc a4 de 30 2e |T..[..Tkc6....0.| +peer0.org1.example.com | 00000020 d0 f0 ce 38 37 02 20 60 50 14 aa 85 5e 03 c3 58 |...87. `P...^..X| +peer0.org1.example.com | 00000030 75 a2 17 04 18 f0 be 19 9f 00 a0 3f 84 ea 75 4b |u..........?..uK| +peer0.org1.example.com | 00000040 e2 2d 83 aa 38 cc ad |.-..8..| +peer0.org1.example.com | [ae6 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [ac0 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac1 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac2 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ac3 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac4 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac5 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [ac6 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ac7 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [ac8 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161017 +peer1.org1.example.com | [ac9 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A3F9302B10A35F55D44A7149C2E36C6A23A9F5C46BA58B839D8CF111B24BD35 +peer1.org1.example.com | [aca 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [acb 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [acc 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [acd 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ace 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [acf 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [ad0 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad1 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ad2 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad3 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ad4 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad5 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad6 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ad7 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad8 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [ad9 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [ada 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +peer1.org1.example.com | 00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +peer1.org1.example.com | [adb 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +peer1.org1.example.com | 00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +peer1.org1.example.com | 00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +peer1.org1.example.com | 00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +peer1.org1.example.com | 00000040 a9 45 ea e8 63 24 |.E..c$| +peer1.org1.example.com | [adc 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [add 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ade 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [adf 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae0 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae1 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae2 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae3 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae4 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [ae5 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +peer1.org1.example.com | 00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +peer1.org1.example.com | [ae6 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +peer1.org1.example.com | 00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +peer1.org1.example.com | 00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +peer1.org1.example.com | 00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +peer1.org1.example.com | 00000040 a9 45 ea e8 63 24 |.E..c$| +peer1.org1.example.com | [ae7 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [ae8 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 22 35 72 4f fe 0a 9e 19 ef 33 53 |0D. T"5rO.....3S| +peer1.org1.example.com | 00000010 44 f3 f6 7a 71 4c 82 31 ce 1e 97 1a 17 1f 2a 6e |D..zqL.1......*n| +peer1.org1.example.com | 00000020 a4 b1 43 bf 02 20 18 14 9c 2b 99 34 f1 f8 40 00 |..C.. ...+.4..@.| +peer1.org1.example.com | 00000030 4f e4 be 28 06 50 ed d5 97 d8 6e 56 f4 31 5b 8b |O..(.P....nV.1[.| +peer1.org1.example.com | 00000040 ea 78 40 f1 bf 4b |.x@..K| +peer1.org1.example.com | [ae9 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [aea 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [aeb 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aec 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [aed 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [aee 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [aef 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [af0 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [af1 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af2 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [af3 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [af4 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [af5 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [af6 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [af7 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer1.org1.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer1.org1.example.com | [af8 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer1.org1.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer1.org1.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer1.org1.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer1.org1.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer1.org1.example.com | [af9 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [afa 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 4e 44 2e 0e 53 df e8 21 3f 3e |0E.!..ND..S..!?>| +peer1.org1.example.com | 00000010 e6 90 f1 1f 6d 1e 69 9b b0 ce 5f cc 93 18 a0 dc |....m.i..._.....| +peer1.org1.example.com | 00000020 92 16 32 bd 4a 02 20 1a 07 4f 29 b5 4f 88 d3 55 |..2.J. ..O).O..U| +peer1.org1.example.com | 00000030 9e a9 32 e4 81 ad b5 35 cb b9 c1 d9 42 0a d6 df |..2....5....B...| +peer1.org1.example.com | 00000040 82 4f f1 43 fb c6 f1 |.O.C...| +peer1.org1.example.com | [afb 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [afc 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [afd 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [afe 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [aff 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [b00 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b01 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b02 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b03 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [b04 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b05 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b06 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > alive: +peer1.org1.example.com | [b07 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [b08 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b09 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b0a 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ca2 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ca3 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [ca4 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [ca5 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 53 2d a9 c1 62 a6 da ce ff 81 4b 77 5c 1d 2a |xS-..b.....Kw\.*| +peer1.org2.example.com | 00000010 9e 67 1e da bf 59 6b b6 b6 5f 0f f7 84 ff 8b 61 |.g...Yk.._.....a| +peer1.org2.example.com | [ca6 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 3c a8 cb af 76 21 f8 70 ca bd 13 |0D. ><...v!.p...| +peer1.org2.example.com | 00000010 7e 29 48 45 2c 07 10 0b a5 d0 69 22 42 4d 18 4e |~)HE,.....i"BM.N| +peer1.org2.example.com | 00000020 eb f8 f1 8a 02 20 35 e1 2e 6e 0f b3 ba 21 26 93 |..... 5..n...!&.| +peer1.org2.example.com | 00000030 66 9e 95 9c ce f5 d5 4e 91 70 55 a8 53 60 ab b3 |f......N.pU.S`..| +peer1.org2.example.com | 00000040 51 36 82 bf 95 43 |Q6...C| +peer1.org2.example.com | [ca7 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [ca8 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [ca9 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [caa 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [cab 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [cac 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cad 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cae 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [caf 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb0 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb1 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb2 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [cb3 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cb4 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [cb5 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cb6 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb7 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cb8 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb9 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cba 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cbb 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbc 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cbd 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbe 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cbf 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc0 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [cc1 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cc2 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [cc3 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161013 +peer1.org2.example.com | [cc4 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CFE91FE2581611B0D27CAD92640DDC0B68E07D7121CA360D39989D0A13FA81E +peer1.org2.example.com | [cc5 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [cc6 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [cc7 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [cc8 10-14 19:01:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [cc9 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cca 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccb 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ccc 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [ccd 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cce 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [ccf 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cd1 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd0 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cd3 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cd4 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd2 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cd5 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd6 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cd7 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cd8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cd9 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe2 0xc000dabe20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe3 0xc000dabe20 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe4 0xc000dabe20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe5 0xc000dabe20 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [cauthdsl] func1 -> DEBU fe6 0xc000dabe20 gate 1602702112222104100 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [policies] Evaluate -> DEBU fe7 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [policies] Evaluate -> DEBU fe8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:52.222 UTC [policies] func1 -> DEBU fe9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fea Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU feb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [cauthdsl] func1 -> DEBU fef 0xc000e07490 gate 1602702112223605300 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [cauthdsl] func2 -> DEBU ff0 0xc000e07490 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [cauthdsl] func2 -> DEBU ff1 0xc000e07490 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:52.223 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ff2 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [msp] Validate -> DEBU ff3 MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [msp] getCertificationChain -> DEBU ff4 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [cauthdsl] func2 -> DEBU ff5 0xc000e07490 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [msp.identity] Verify -> DEBU ff6 Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +orderer0.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..|" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [msp.identity] Verify -> DEBU ff7 Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +orderer0.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +orderer0.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +orderer0.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +orderer0.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y|" +orderer0.example.com | "2020-10-14 19:01:52.224 UTC [cauthdsl] func2 -> DEBU ff8 0xc000e07490 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [cauthdsl] func1 -> DEBU ff9 0xc000e07490 gate 1602702112223605300 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffc Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffe Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU fff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [orderer.common.blockcutter] Ordered -> DEBU 1000 Enqueuing message into batch" +orderer0.example.com | "2020-10-14 19:01:52.225 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1001 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40044" +orderer0.example.com | "2020-10-14 19:01:52.229 UTC [grpc] warningf -> DEBU 1002 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:40044: read: connection reset by peer" +orderer0.example.com | "2020-10-14 19:01:52.229 UTC [grpc] infof -> DEBU 1003 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:52.229 UTC [orderer.common.broadcast] Handle -> WARN 1004 Error reading from 172.18.0.9:40044: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:52.230 UTC [orderer.common.server] func1 -> DEBU 1005 Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:52.231 UTC [comm.grpc.server] 1 -> INFO 1006 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40044 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.3482961s +orderer0.example.com | "2020-10-14 19:01:52.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 260µs" +orderer0.example.com | "2020-10-14 19:01:52.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.8µs " +orderer0.example.com | "2020-10-14 19:01:52.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 2 on channel businesschannel took 102.6µs" +orderer0.example.com | "2020-10-14 19:01:52.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-10-14 19:01:52.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238µs " +orderer0.example.com | "2020-10-14 19:01:52.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +orderer0.example.com | "2020-10-14 19:01:52.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:52.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [b0b 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b0c 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b0d 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b0e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b0f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b10 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b11 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b12 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [b13 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b14 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b15 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b16 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b17 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b18 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b19 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b1a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 gate 1602702075172645200 evaluation starts +peer1.org1.example.com | [b1b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b1c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [b1d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 principal matched by identity 0 +peer1.org1.example.com | [b1e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 09 0f b2 6b f0 90 6e 95 04 c2 3d 31 ed 64 80 |t...k..n...=1.d.| +peer1.org1.example.com | 00000010 15 be ae ba 14 0d d5 db f2 de 32 4d 1f 87 4f c1 |..........2M..O.| +peer1.org1.example.com | [b1f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d fc 9e e0 54 0d 5d 78 c5 f5 12 d4 |0D. M...T.]x....| +peer1.org1.example.com | 00000010 e0 46 8b 24 2f 4f 32 03 06 53 ee 39 7e 39 8a 25 |.F.$/O2..S.9~9.%| +peer1.org1.example.com | 00000020 8a 65 89 45 02 20 28 a4 fe 61 55 7c 72 e6 2a 76 |.e.E. (..aU|r.*v| +peer1.org1.example.com | 00000030 94 43 04 53 64 b5 75 68 f1 96 d4 d0 f9 6d ee cc |.C.Sd.uh.....m..| +peer1.org1.example.com | 00000040 25 f5 a8 78 7c 24 |%..x|$| +peer1.org1.example.com | [b20 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b21 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879060 gate 1602702075172645200 evaluation succeeds +peer1.org1.example.com | [b22 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b23 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b24 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b25 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b26 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b27 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [b28 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [b29 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [b2a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [b2b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b2e 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b2f 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b30 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b31 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b32 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b33 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b34 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b35 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b36 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b37 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b38 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b39 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b3a 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3b 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b3d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b3e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [b3f 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b40 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b41 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b42 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b43 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b44 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [b45 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b46 10-14 19:01:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [b47 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer0.org1.example.com:7051 +peer1.org1.example.com | [b48 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [b49 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [b4a 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b4b 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16252568913595185404, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [b4c 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16252568913595185404, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [b4d 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b4e 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b4f 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [b50 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [b51 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [b52 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b53 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b54 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b55 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b56 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b57 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b58 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 gate 1602702075432533700 evaluation starts +peer1.org1.example.com | [b59 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b5a 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [b5b 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [b5c 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [b5d 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [b5e 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 principal matched by identity 0 +peer1.org1.example.com | [b5f 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer1.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org2.example.com | [c31 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [c32 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [c33 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c34 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [c35 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c36 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c37 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c38 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c39 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c3a 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c3b 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [cda 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [cdb 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cdc 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [cdd 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cde 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cdf 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ce0 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ce1 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ce2 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 gate 1602702080425135800 evaluation starts +peer1.org2.example.com | [ce3 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ce4 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [ce5 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ce6 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 principal evaluation fails +peer1.org2.example.com | [ce7 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f2fe0 gate 1602702080425135800 evaluation fails +peer1.org2.example.com | [ce8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ce9 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cea 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ceb 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 gate 1602702080427207800 evaluation starts +peer1.org2.example.com | [cec 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ced 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [cee 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 principal matched by identity 0 +peer1.org2.example.com | [cef 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 98 6a 73 ad 11 1f 61 55 7b a4 8d 05 12 40 98 |&.js...aU{....@.| +peer1.org2.example.com | 00000010 a1 1b 7b f7 97 22 e0 a8 26 ed 5c e3 ee 97 06 a1 |..{.."..&.\.....| +peer1.org2.example.com | [cf0 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 ae 61 d1 8e 26 59 34 d1 33 53 |0E.!...a..&Y4.3S| +peer1.org2.example.com | 00000010 ef de 72 88 57 64 62 c9 1d 36 2f 0d a3 cc a1 c4 |..r.Wdb..6/.....| +peer1.org2.example.com | 00000020 fa 5c 7a 27 ce 02 20 0d 41 38 b4 35 b4 ce 7c ec |.\z'.. .A8.5..|.| +peer1.org2.example.com | 00000030 0e 6b e9 ff c0 31 53 18 6d bd 2c 51 ed 6d 35 f5 |.k...1S.m.,Q.m5.| +peer1.org2.example.com | 00000040 2a d3 02 53 28 96 e7 |*..S(..| +peer1.org2.example.com | [cf1 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [cf2 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f3550 gate 1602702080427207800 evaluation succeeds +peer1.org2.example.com | [cf3 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [cf4 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [cf5 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [cf6 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [cf7 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cf8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [cf9 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [cfa 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [cfb 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [cfc 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cfd 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cfe 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cff 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d00 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d01 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d02 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d03 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d04 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d05 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d06 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d07 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d08 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d09 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d0a 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d0b 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d0c 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d0d 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d0e 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [d0f 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d10 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d11 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [d12 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d13 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d14 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d15 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d16 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d17 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c3c 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c3d 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 gate 1602702074675408000 evaluation starts +peer0.org2.example.com | [c3e 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c3f 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [c40 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 principal matched by identity 0 +peer0.org2.example.com | [c41 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [c42 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [c43 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c44 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe600 gate 1602702074675408000 evaluation succeeds +peer0.org2.example.com | [c45 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c46 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [c47 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c48 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c49 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [c4a 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [c4b 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [c4c 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [c4d 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c4e 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c4f 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c50 10-14 19:01:14.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c51 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [c52 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c53 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c54 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c55 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [c56 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [c57 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [c58 10-14 19:01:15.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c59 10-14 19:01:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [c5a 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c5b 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161011 +peer0.org2.example.com | [c5c 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 74090FB26BF0906E9504C23D31ED648015BEAEBA140DD5DBF2DE324D1F874FC1 +peer0.org2.example.com | [c5d 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c5e 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [c5f 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [c60 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [c61 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c62 10-14 19:01:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c63 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c64 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c65 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c66 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c67 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c68 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c69 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c6a 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c6b 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c6c 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c6d 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c6e 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [c6f 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [c70 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c71 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [c72 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c73 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c74 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c75 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [c76 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 c5 71 33 78 22 52 e5 c4 d9 dc bd 25 69 5d d6 |..q3x"R.....%i].| +peer0.org2.example.com | 00000010 22 71 df 0f 19 d7 14 4d 8f 83 16 2d fe 7e 57 fc |"q.....M...-.~W.| +peer0.org2.example.com | [c77 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 cc 1d 62 d3 47 ee 80 4c 95 71 33 |0D. ...b.G..L.q3| +peer0.org2.example.com | 00000010 23 53 74 b1 81 38 82 34 da cb 71 c1 bc 95 0e e8 |#St..8.4..q.....| +peer0.org2.example.com | 00000020 42 47 c4 0f 02 20 77 b4 1d 60 1a ae 6d c1 b9 26 |BG... w..`..m..&| +peer0.org2.example.com | 00000030 5b 5c a8 f9 1f 17 f3 c5 a6 5f d1 17 58 37 01 55 |[\......._..X7.U| +peer0.org2.example.com | 00000040 f8 fe db b4 43 1d |....C.| +peer0.org2.example.com | [c78 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ae4 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ae8 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ae7 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [ae9 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aea 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aeb 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [aec 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [aed 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [aee 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aef 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [af0 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [af1 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [af2 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [af3 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [af4 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [af5 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [af6 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 5b 43 b3 98 c3 2b 83 3e 57 3d 0f 4a a5 a9 2a |.[C...+.>W=.J..*| +peer0.org1.example.com | 00000010 9e 2f 3d a1 98 2d f9 3f 49 4a 69 87 cf 3f c8 b2 |./=..-.?IJi..?..| +peer0.org1.example.com | [af7 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [af8 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 9b 46 40 42 a6 42 c5 8c 46 dc |0E.!...F@B.B..F.| +peer0.org1.example.com | 00000010 e6 9f 86 17 2f 23 b5 78 25 7b 8b fd f8 e7 05 0e |..../#.x%{......| +peer0.org1.example.com | 00000020 d2 1c 09 3d 58 02 20 5e 61 79 5f 39 e7 89 6e 7c |...=X. ^ay_9..n|| +peer0.org1.example.com | 00000030 75 c6 a9 be a9 c6 d4 52 d6 e9 46 2b 37 f8 65 08 |u......R..F+7.e.| +peer0.org1.example.com | 00000040 73 20 96 5d 58 33 30 |s .]X30| +peer0.org1.example.com | [af9 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [afa 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [afb 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [afc 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-10-14 19:01:53.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:53.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2020-10-14 19:01:53.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1012 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 820.4µs " +orderer0.example.com | "2020-10-14 19:01:53.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +orderer0.example.com | "2020-10-14 19:01:53.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +orderer0.example.com | "2020-10-14 19:01:53.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +orderer0.example.com | "2020-10-14 19:01:53.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 937.3µs " +orderer0.example.com | "2020-10-14 19:01:53.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:53.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1018 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:53.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:53.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101a Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-10-14 19:01:53.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +orderer0.example.com | "2020-10-14 19:01:53.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101c Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2020-10-14 19:01:53.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2020-10-14 19:01:53.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382.4µs " +orderer0.example.com | "2020-10-14 19:01:53.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 706.8µs " +orderer0.example.com | "2020-10-14 19:01:53.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:53.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1021 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1023 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2020-10-14 19:01:54.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1024 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +orderer0.example.com | "2020-10-14 19:01:54.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 69µs" +orderer0.example.com | "2020-10-14 19:01:54.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2020-10-14 19:01:54.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.2µs " +orderer0.example.com | "2020-10-14 19:01:54.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1028 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.4µs " +orderer0.example.com | "2020-10-14 19:01:54.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 102b Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] propose -> INFO 102c Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] 2 -> DEBU 102d Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:54.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 3648 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2020-10-14 19:01:54.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102f Sending msg of 3648 bytes to 3 on channel businesschannel took 7.7µs" +orderer0.example.com | "2020-10-14 19:01:54.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +orderer0.example.com | "2020-10-14 19:01:54.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1031 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer1.example.com(orderer1.example.com:7050) took 552.8µs " +orderer0.example.com | "2020-10-14 19:01:54.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.236 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1033 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1034 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1036 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +orderer0.example.com | "2020-10-14 19:01:54.237 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1037 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +peer1.org1.example.com | [b60 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 84 74 89 0e 0c 32 c5 7e 7d 29 |0E.!...t...2.~})| +peer1.org1.example.com | 00000010 77 8d 28 4c 1e 80 db 91 b4 09 ea 5e 2d 8e c1 c8 |w.(L.......^-...| +peer1.org1.example.com | 00000020 48 75 9b 2b cd 02 20 15 59 9b c3 be 2f 33 f6 13 |Hu.+.. .Y.../3..| +peer1.org1.example.com | 00000030 ca 6f 46 a2 09 b7 8f 10 2b 8c 1a 16 84 2d 5c 3a |.oF.....+....-\:| +peer1.org1.example.com | 00000040 55 ef 26 08 6d aa fb |U.&.m..| +peer1.org1.example.com | [b61 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b62 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003897980 gate 1602702075432533700 evaluation succeeds +peer1.org1.example.com | [b63 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b64 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b65 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b66 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b67 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b68 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b69 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16252568913595185404, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [b6a 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b6b 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b6c 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d18 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d19 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [d1a 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d1b 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d1c 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d1d 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d1e 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d1f 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d20 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d21 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 gate 1602702080608778100 evaluation starts +peer1.org2.example.com | [d22 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d23 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [d24 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d25 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 principal evaluation fails +peer1.org2.example.com | [d26 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630650 gate 1602702080608778100 evaluation fails +peer1.org2.example.com | [d27 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d28 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d29 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d2a 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 gate 1602702080611938900 evaluation starts +peer1.org2.example.com | [d2b 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d2c 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [d2d 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 principal matched by identity 0 +peer1.org2.example.com | [d2e 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 05 db 90 5a 92 b5 98 46 f3 e2 93 5c 4e 13 82 |Q...Z...F...\N..| +peer1.org2.example.com | 00000010 a4 26 4b 87 8b 63 54 cb f2 eb 0c 33 28 ad 05 0d |.&K..cT....3(...| +peer1.org2.example.com | [d2f 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 84 5a bf ad c5 f4 3b ee 43 96 |0E.!...Z....;.C.| +peer1.org2.example.com | 00000010 34 09 8d e6 2a d5 03 89 b0 d8 95 e5 38 da 1d 84 |4...*.......8...| +peer1.org2.example.com | 00000020 95 1e 31 26 a5 02 20 49 4a f9 55 3a 45 cb e8 a7 |..1&.. IJ.U:E...| +peer1.org2.example.com | 00000030 35 9d 45 c3 65 4d 96 ec e3 20 99 e7 f0 c7 91 7f |5.E.eM... ......| +peer1.org2.example.com | 00000040 67 5e 2a 56 c5 09 f2 |g^*V...| +peer1.org2.example.com | [d30 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d31 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003630bc0 gate 1602702080611938900 evaluation succeeds +peer1.org2.example.com | [d32 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d33 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d34 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d35 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d36 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d37 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d38 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d39 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d3a 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [d3b 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d3c 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d3d 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [d3e 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d3f 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d40 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d41 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d42 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d43 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d44 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d45 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d46 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d47 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d48 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d49 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4a 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4b 10-14 19:01:20.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4c 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4d 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d4e 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [d4f 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d51 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d50 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d52 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d53 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [d54 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d55 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d56 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [d57 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d58 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d59 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d5a 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d5b 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [d5c 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [d5d 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1035 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:54.237 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1038 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-10-14 19:01:54.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 1039 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:54.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 103a Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:54.250 UTC [msp.identity] Sign -> DEBU 103e Sign: plaintext: 0A020802120B0A090A03010203100418...DF90509CA53B6A161095733EDD710F0C " +orderer0.example.com | "2020-10-14 19:01:54.243 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 479.9µs " +orderer0.example.com | "2020-10-14 19:01:54.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.252 UTC [msp.identity] Sign -> DEBU 103f Sign: digest: 497618C8EAE6BAB20A7D85691DA673A92FD5B44F12BE152B6D147E19809A683A " +orderer0.example.com | "2020-10-14 19:01:54.260 UTC [fsblkstorage] indexBlock -> DEBU 1040 Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +orderer0.example.com | txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:54.262 UTC [fsblkstorage] updateCheckpoint -> DEBU 1041 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89368], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2020-10-14 19:01:54.262 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1042 [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2020-10-14 19:01:54.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +orderer0.example.com | "2020-10-14 19:01:54.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.2µs " +orderer0.example.com | "2020-10-14 19:01:54.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 2 on channel businesschannel took 69.8µs" +orderer0.example.com | "2020-10-14 19:01:54.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-10-14 19:01:54.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +orderer0.example.com | "2020-10-14 19:01:54.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 409.2µs " +orderer0.example.com | "2020-10-14 19:01:54.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:54.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 3 on channel testchainid took 228.6µs" +orderer0.example.com | "2020-10-14 19:01:55.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " +orderer0.example.com | "2020-10-14 19:01:55.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104f Sending msg of 28 bytes to 2 on channel businesschannel took 67.1µs" +orderer0.example.com | "2020-10-14 19:01:55.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2020-10-14 19:01:55.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1051 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 323.1µs " +orderer0.example.com | "2020-10-14 19:01:55.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.7µs " +orderer0.example.com | "2020-10-14 19:01:55.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.222 UTC [orderer.common.server] Broadcast -> DEBU 1055 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:01:55.222 UTC [orderer.common.broadcast] Handle -> DEBU 1056 Starting new broadcast loop for 172.18.0.9:40062" +orderer0.example.com | "2020-10-14 19:01:55.232 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1057 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40062 with txid 'b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2020-10-14 19:01:55.233 UTC [policies] Evaluate -> DEBU 1058 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:55.234 UTC [policies] Evaluate -> DEBU 1059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:55.234 UTC [policies] Evaluate -> DEBU 105a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 105b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 105c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func1 -> DEBU 105d 0xc000e5de00 gate 1602702115239473900 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 105e 0xc000e5de00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 105f 0xc000e5de00 processing identity 0 with bytes of fe2870" +peer1.org1.example.com | [b6d 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b6e 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b6f 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [b70 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 4 +peer1.org1.example.com | [b71 10-14 19:01:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b72 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b73 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161018 +peer1.org1.example.com | [b74 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 72F33A5271B5A64D6E166D9E16730D0C3137FBE9EBAC198F85913E92E0D464EE +peer1.org1.example.com | [b75 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b76 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [b77 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [b78 10-14 19:01:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [b79 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b7a 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [b7b 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b7c 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [b7d 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b7f 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b7e 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b80 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b81 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:17.491Z grpc.peer_address=172.18.0.6:44620 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=317.7µs +peer1.org1.example.com | [b82 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [b83 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [b84 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [b85 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:44620 +peer1.org1.example.com | [b86 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A\nn80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2\nz+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E\nAwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:44620 +peer1.org1.example.com | [b87 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b88 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b89 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8a 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b8b 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8c 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b8d 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b8e 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b8f 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b90 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b91 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b92 10-14 19:01:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 gate 1602702075499697900 evaluation starts +peer1.org1.example.com | [b93 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b94 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [b95 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 principal matched by identity 0 +peer1.org1.example.com | [b96 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer1.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer1.org1.example.com | [b97 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 6e aa 9d 93 44 d0 24 e8 82 15 66 |0D. ,n...D.$...f| +peer1.org1.example.com | 00000010 72 56 5c 90 9d 86 2b 9c b1 8d a1 99 b4 10 ad cf |rV\...+.........| +peer1.org1.example.com | 00000020 d9 c4 3a 17 02 20 04 30 23 0e 24 2f ab 8c ee a7 |..:.. .0#.$/....| +peer1.org1.example.com | 00000030 00 3b ba a6 d7 1b cc 69 1f ff 20 73 92 cf 13 88 |.;.....i.. s....| +peer1.org1.example.com | 00000040 ab b6 a0 97 59 10 |....Y.| +peer1.org1.example.com | [b98 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b99 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392c420 gate 1602702075499697900 evaluation succeeds +peer1.org1.example.com | [b9a 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b9b 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b9c 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b9d 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b9e 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:44620 +peer1.org1.example.com | [b9f 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:44620 +peer1.org1.example.com | [ba0 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ba1 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ba2 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ba3 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [ba4 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 f3 3a 52 71 b5 a6 4d 6e 16 6d 9e 16 73 0d 0c |r.:Rq..Mn.m..s..| +peer1.org1.example.com | 00000010 31 37 fb e9 eb ac 19 8f 85 91 3e 92 e0 d4 64 ee |17........>...d.| +peer1.org1.example.com | [ba5 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 ce b6 43 3e a5 6e 4f 1a fc 74 |0E.!....C>.nO..t| +peer1.org1.example.com | 00000010 f3 b6 48 1e bf 1a 81 05 a3 78 ca 7e 58 ef 08 e8 |..H......x.~X...| +peer1.org1.example.com | 00000020 9e 64 d2 a7 e6 02 20 60 ce bf ae 18 d3 eb 4c 0c |.d.... `......L.| +peer1.org1.example.com | 00000030 40 97 d1 22 d0 34 2f f6 e9 af a1 16 db 58 19 6c |@..".4/......X.l| +peer1.org1.example.com | 00000040 e7 90 32 59 77 c3 15 |..2Yw..| +peer1.org1.example.com | [ba6 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ba7 10-14 19:01:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ba8 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ba9 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [baa 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bab 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bac 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [bad 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb ed 99 ad f2 f0 2f f5 39 3f e8 f1 5c 3b 01 95 |....../.9?..\;..| +peer1.org1.example.com | 00000010 ad 91 8a aa 50 9f 61 e0 3c d7 9e b8 e9 f3 5e 20 |....P.a.<.....^ | +peer1.org1.example.com | [bae 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 d0 69 5a a7 a6 b7 0a 4d 2a 21 |0E.!...iZ....M*!| +peer1.org1.example.com | 00000010 12 bb ce dc f4 01 73 dd 08 6c db 4e 29 f6 f7 d0 |......s..l.N)...| +peer1.org1.example.com | 00000020 00 de c5 eb f1 02 20 64 7f 97 e6 ef bb be ea 05 |...... d........| +peer1.org1.example.com | 00000030 02 04 1a b0 db 33 f6 40 3c 09 c3 f5 80 f0 bb ed |.....3.@<.......| +peer1.org1.example.com | 00000040 bd 6b 14 2a fb 58 25 |.k.*.X%| +peer1.org1.example.com | [baf 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bb0 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [bb1 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [bb2 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [bb3 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [bb4 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb5 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb6 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb7 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb8 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bb9 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [bba 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bbb 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bbc 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d5e 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [d5f 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d60 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [d61 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [d62 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d63 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [d64 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [d65 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer1.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer1.org2.example.com | [d66 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer1.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer1.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer1.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer1.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer1.org2.example.com | [d67 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [d68 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 cc 57 f9 86 b6 a7 51 9d c8 c5 |0E.!...W....Q...| +peer1.org2.example.com | 00000010 2f 41 16 45 3e fd a3 97 00 95 c9 6d 94 e8 a6 69 |/A.E>......m...i| +peer1.org2.example.com | 00000020 0f bc e1 f4 f6 02 20 3f cc 34 a3 e9 58 3e b8 b9 |...... ?.4..X>..| +peer1.org2.example.com | 00000030 ca 5f 13 43 bb 63 01 d2 07 af 85 32 18 24 6b a8 |._.C.c.....2.$k.| +peer1.org2.example.com | 00000040 59 f1 fb b1 98 30 17 |Y....0.| +peer1.org2.example.com | [d69 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [d6a 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [d6b 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d6c 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d6d 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [d6e 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d6f 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d70 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d71 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [d72 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d73 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d74 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d75 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [d76 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d77 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > alive: +peer1.org2.example.com | [d78 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [d79 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d7a 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [d7b 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d7c 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [d7d 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d7e 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [d7f 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [d81 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [d83 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d80 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d82 10-14 19:01:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d84 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [d85 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [d86 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d87 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d88 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d89 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d8a 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d8b 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d8c 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d8d 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [d8e 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d8f 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [d90 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161014 +peer1.org2.example.com | [d91 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E35DB3618112EF78E911E67E609AA7383E3D8E91465D8B290258412A8DF5FBD9 +peer1.org2.example.com | [d92 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [d93 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [d94 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [d95 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d96 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d97 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d98 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d99 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d9a 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [d9b 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d9c 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [d9d 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d9e 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [d9f 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [da0 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [da1 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [da2 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [da3 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [da4 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer1.org2.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer1.org2.example.com | [da5 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer1.org2.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 1060 0xc000e5de00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 1061 0xc000e5de00 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [cauthdsl] func1 -> DEBU 1062 0xc000e5de00 gate 1602702115239473900 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1063 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1064 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] func1 -> DEBU 1065 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1066 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1068 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1069 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 106a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func1 -> DEBU 106b 0xc001036af0 gate 1602702115240102200 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106c 0xc001036af0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106d 0xc001036af0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106e 0xc001036af0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [msp.identity] Verify -> DEBU 106f Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +orderer0.example.com | 00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA|" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [msp.identity] Verify -> DEBU 1070 Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +orderer0.example.com | 00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +orderer0.example.com | 00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +orderer0.example.com | 00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +orderer0.example.com | 00000040 2a 75 63 d1 1c 2e ca |*uc....|" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 1071 0xc001036af0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [cauthdsl] func1 -> DEBU 1072 0xc001036af0 gate 1602702115240102200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1073 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1074 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1075 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1076 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:55.241 UTC [policies] Evaluate -> DEBU 1077 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:55.242 UTC [policies] Evaluate -> DEBU 1078 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:55.242 UTC [orderer.common.blockcutter] Ordered -> DEBU 1079 Enqueuing message into batch" +orderer0.example.com | "2020-10-14 19:01:55.243 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 107a [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40062" +orderer0.example.com | "2020-10-14 19:01:55.264 UTC [orderer.common.broadcast] Handle -> WARN 107b Error reading from 172.18.0.9:40062: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:55.264 UTC [orderer.common.server] func1 -> DEBU 107c Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:55.264 UTC [comm.grpc.server] 1 -> INFO 107d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7429ms +orderer0.example.com | "2020-10-14 19:01:55.264 UTC [grpc] infof -> DEBU 107e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:55.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:55.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +orderer0.example.com | "2020-10-14 19:01:55.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +orderer0.example.com | "2020-10-14 19:01:55.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +orderer0.example.com | "2020-10-14 19:01:55.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1084 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.2µs " +orderer0.example.com | "2020-10-14 19:01:55.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +orderer0.example.com | "2020-10-14 19:01:55.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1086 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:55.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.020 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.021 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1089 Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +orderer0.example.com | "2020-10-14 19:01:56.022 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " +orderer0.example.com | "2020-10-14 19:01:56.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +orderer0.example.com | "2020-10-14 19:01:56.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2020-10-14 19:01:56.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +orderer0.example.com | "2020-10-14 19:01:56.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.2µs " +orderer0.example.com | "2020-10-14 19:01:56.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1092 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2020-10-14 19:01:56.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 702.5µs " +orderer0.example.com | "2020-10-14 19:01:56.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2020-10-14 19:01:56.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2020-10-14 19:01:56.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.1µs " +orderer0.example.com | "2020-10-14 19:01:56.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.5µs " +orderer0.example.com | "2020-10-14 19:01:56.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1098 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:56.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +orderer0.example.com | "2020-10-14 19:01:57.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.4µs " +orderer0.example.com | "2020-10-14 19:01:57.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +orderer0.example.com | "2020-10-14 19:01:57.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-10-14 19:01:57.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.4µs " +orderer0.example.com | "2020-10-14 19:01:57.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0178ms " +orderer0.example.com | "2020-10-14 19:01:57.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.244 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10a3 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:57.245 UTC [orderer.consensus.etcdraft] propose -> INFO 10a4 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:57.246 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10a5 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:57.249 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 3109 bytes to 2 on channel businesschannel took 20µs" +orderer0.example.com | "2020-10-14 19:01:57.250 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 3109 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-10-14 19:01:57.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer2.example.com(orderer2.example.com:7050) took 213.5µs " +peer0.org2.example.com | [c79 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [c7a 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [c7b 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [c7c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [c7d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c7e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c7f 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c80 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c81 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c82 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c83 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c84 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c85 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [c86 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c87 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c88 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c89 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8a 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c8b 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8c 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c8d 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8e 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c8f 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c90 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [c91 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [c92 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [c93 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [c94 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c95 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [c96 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c97 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c98 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [c99 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 gate 1602702075454707100 evaluation starts +peer0.org2.example.com | [c9a 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c9b 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [c9c 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 principal matched by identity 0 +peer0.org2.example.com | [c9d 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 f3 3a 52 71 b5 a6 4d 6e 16 6d 9e 16 73 0d 0c |r.:Rq..Mn.m..s..| +peer0.org2.example.com | 00000010 31 37 fb e9 eb ac 19 8f 85 91 3e 92 e0 d4 64 ee |17........>...d.| +peer0.org2.example.com | [c9e 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 ce b6 43 3e a5 6e 4f 1a fc 74 |0E.!....C>.nO..t| +peer0.org2.example.com | 00000010 f3 b6 48 1e bf 1a 81 05 a3 78 ca 7e 58 ef 08 e8 |..H......x.~X...| +peer0.org2.example.com | 00000020 9e 64 d2 a7 e6 02 20 60 ce bf ae 18 d3 eb 4c 0c |.d.... `......L.| +peer0.org2.example.com | 00000030 40 97 d1 22 d0 34 2f f6 e9 af a1 16 db 58 19 6c |@..".4/......X.l| +peer0.org2.example.com | 00000040 e7 90 32 59 77 c3 15 |..2Yw..| +peer0.org2.example.com | [c9f 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ca0 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747210 gate 1602702075454707100 evaluation succeeds +peer0.org2.example.com | [ca1 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ca2 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ca3 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ca4 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ca5 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ca6 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [ca7 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ca8 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [ca9 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [caa 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cab 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cac 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cad 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cae 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [caf 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb0 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb1 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb2 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb3 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb4 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [cb5 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb7 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [cb8 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cb9 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cb6 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cba 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cbb 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cbc 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cbd 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cbe 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:57.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer1.example.com(orderer1.example.com:7050) took 506.3µs " +orderer0.example.com | "2020-10-14 19:01:57.254 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.255 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ac Sending msg of 28 bytes to 2 on channel businesschannel took 432.1µs" +orderer0.example.com | "2020-10-14 19:01:57.256 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +orderer0.example.com | "2020-10-14 19:01:57.256 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10ae Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:01:57.257 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 843.7µs " +orderer0.example.com | "2020-10-14 19:01:57.257 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.7µs " +orderer0.example.com | "2020-10-14 19:01:57.255 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.257 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10b1 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-10-14 19:01:57.258 UTC [msp] GetDefaultSigningIdentity -> DEBU 10b2 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:57.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [bbd 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bbe 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bbf 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bc0 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc1 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bc2 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc3 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bc4 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc5 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc6 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc7 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bc8 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc9 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [bca 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [bcb 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [bcc 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [bcd 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bce 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [bcf 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [bd0 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [bd1 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd2 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd3 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd4 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd5 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd6 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bd7 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [bd8 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bd9 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bda 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bdb 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bdc 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [bdd 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [bde 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer1.org2.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer1.org2.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer1.org2.example.com | [da6 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [da7 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 e9 ef db fe ae be bf 22 51 2e 4c |0D. ........"Q.L| +peer1.org2.example.com | 00000010 f1 99 a9 d9 a4 f8 1a 34 9f e2 a3 8a c8 4c 53 7f |.......4.....LS.| +peer1.org2.example.com | 00000020 f4 2e 09 36 02 20 75 98 04 4b 20 80 77 4a db 89 |...6. u..K .wJ..| +peer1.org2.example.com | 00000030 47 fd 2c 27 cb 49 54 2a ec 6a 73 6e 37 1d 44 61 |G.,'.IT*.jsn7.Da| +peer1.org2.example.com | 00000040 4f d1 71 25 5d cb |O.q%].| +peer1.org2.example.com | [da8 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [da9 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [daa 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dab 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dac 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [dad 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dae 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [daf 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [db0 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [db1 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [db2 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer1.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer1.org2.example.com | [db3 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer1.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer1.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer1.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer1.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer1.org2.example.com | [db4 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [db5 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [db6 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [db7 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer1.org2.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer1.org2.example.com | [db8 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer1.org2.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer1.org2.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer1.org2.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer1.org2.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer1.org2.example.com | [db9 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dba 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dbb 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cbf 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cc0 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cc1 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cc2 10-14 19:01:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cc3 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cc4 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cc5 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cc6 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [cc7 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cc8 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [cc9 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [cca 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ccb 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ccc 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ccd 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [cce 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 gate 1602702075639430500 evaluation starts +peer0.org2.example.com | [ccf 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cd0 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [cd1 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 principal matched by identity 0 +peer0.org2.example.com | [cd2 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb ed 99 ad f2 f0 2f f5 39 3f e8 f1 5c 3b 01 95 |....../.9?..\;..| +peer0.org2.example.com | 00000010 ad 91 8a aa 50 9f 61 e0 3c d7 9e b8 e9 f3 5e 20 |....P.a.<.....^ | +peer0.org2.example.com | [cd3 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 d0 69 5a a7 a6 b7 0a 4d 2a 21 |0E.!...iZ....M*!| +peer0.org2.example.com | 00000010 12 bb ce dc f4 01 73 dd 08 6c db 4e 29 f6 f7 d0 |......s..l.N)...| +peer0.org2.example.com | 00000020 00 de c5 eb f1 02 20 64 7f 97 e6 ef bb be ea 05 |...... d........| +peer0.org2.example.com | 00000030 02 04 1a b0 db 33 f6 40 3c 09 c3 f5 80 f0 bb ed |.....3.@<.......| +peer0.org2.example.com | 00000040 bd 6b 14 2a fb 58 25 |.k.*.X%| +peer0.org2.example.com | [cd4 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [cd5 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003721a30 gate 1602702075639430500 evaluation succeeds +peer0.org2.example.com | [cd6 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cd7 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cd8 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cd9 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cda 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [afd 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [aff 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b00 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [afe 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b01 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b02 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 gate 1602702070729155000 evaluation starts +peer0.org1.example.com | [b03 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b04 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b05 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 principal matched by identity 0 +peer0.org1.example.com | [b06 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [b07 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [b08 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b09 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 gate 1602702070729155000 evaluation succeeds +peer0.org1.example.com | [b0a 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b0b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b0c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b0d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b0e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b10 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b11 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b12 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b13 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b14 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b15 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 gate 1602702070745658200 evaluation starts +peer0.org1.example.com | [b16 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b17 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b18 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 principal matched by identity 0 +peer0.org1.example.com | [b19 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [b1a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [b1b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b1c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 gate 1602702070745658200 evaluation succeeds +peer0.org1.example.com | [b1d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b1e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b1f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b20 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b21 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b22 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b23 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b24 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b25 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b26 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b27 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b28 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b29 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b2a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 gate 1602702070746826600 evaluation starts +peer0.org1.example.com | [b2b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b2c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b2d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 principal matched by identity 0 +peer0.org1.example.com | [b2e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [b2f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [b30 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b31 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 gate 1602702070746826600 evaluation succeeds +peer0.org1.example.com | [b32 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b33 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b34 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b35 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b36 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b37 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b38 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b39 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b3a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [cdb 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [cdc 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [cdd 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [cde 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [cdf 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ce0 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ce1 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ce2 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ce4 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ce5 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ce3 10-14 19:01:15.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ce6 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ce7 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ce8 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ce9 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cea 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ceb 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cec 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ced 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cee 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cef 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [cf1 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cf2 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf0 10-14 19:01:15.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cf3 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cf4 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf5 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [cf7 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf6 10-14 19:01:15.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cf8 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [cf9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cfa 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cfb 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cfc 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cfd 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [cfe 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [cff 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [d00 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d01 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [d02 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d03 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [d06 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:01:57.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 10b5 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:01:57.266 UTC [msp.identity] Sign -> DEBU 10b6 Sign: plaintext: 0A020802120B0A090A03010203100418...5D008587A5A1859DE648C06BABBCD926 " +orderer0.example.com | "2020-10-14 19:01:57.266 UTC [msp.identity] Sign -> DEBU 10b7 Sign: digest: 536E662C0776AD9DF3B2DDCD550C1279F1596B875ED02D4DCF6D157956633282 " +orderer0.example.com | "2020-10-14 19:01:57.280 UTC [fsblkstorage] indexBlock -> DEBU 10b8 Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +orderer0.example.com | txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:01:57.287 UTC [fsblkstorage] updateCheckpoint -> DEBU 10b9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93380], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2020-10-14 19:01:57.288 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ba [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2020-10-14 19:01:57.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bc Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-10-14 19:01:57.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +orderer0.example.com | "2020-10-14 19:01:57.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10be Sending msg of 28 bytes to 2 on channel businesschannel took 131µs" +orderer0.example.com | "2020-10-14 19:01:57.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2020-10-14 19:01:57.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 431.3µs " +orderer0.example.com | "2020-10-14 19:01:57.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.8418ms " +orderer0.example.com | "2020-10-14 19:01:57.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:57.930 UTC [orderer.common.server] replicateDisabledChains -> DEBU 10c4 No inactive chains to try to replicate" +orderer0.example.com | "2020-10-14 19:01:58.015 UTC [orderer.common.server] Broadcast -> DEBU 10c5 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:01:58.015 UTC [orderer.common.broadcast] Handle -> DEBU 10c6 Starting new broadcast loop for 172.18.0.9:40076" +orderer0.example.com | "2020-10-14 19:01:58.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:58.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2020-10-14 19:01:58.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +orderer0.example.com | "2020-10-14 19:01:58.054 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10ca [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40076 with txid 'ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [msp] DeserializeIdentity -> DEBU 10d0 Obtaining identity" +orderer0.example.com | "2020-10-14 19:01:58.055 UTC [msp.identity] newIdentity -> DEBU 10d1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:01:58.056 UTC [cauthdsl] func1 -> DEBU 10d2 0xc00113b4d0 gate 1602702118056361800 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:58.056 UTC [cauthdsl] func2 -> DEBU 10d3 0xc00113b4d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:58.056 UTC [cauthdsl] func2 -> DEBU 10d4 0xc00113b4d0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:58.057 UTC [cauthdsl] func2 -> DEBU 10d5 0xc00113b4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2020-10-14 19:01:58.057 UTC [cauthdsl] func2 -> DEBU 10d6 0xc00113b4d0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:58.057 UTC [cauthdsl] func1 -> DEBU 10d7 0xc00113b4d0 gate 1602702118056361800 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:58.057 UTC [policies] Evaluate -> DEBU 10d8 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] func1 -> DEBU 10da Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer1.org1.example.com | [bdf 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [be0 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [be1 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [be2 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [be3 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [be4 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [be5 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 gate 1602702078125773800 evaluation starts +peer1.org1.example.com | [be6 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [be7 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [be8 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 principal matched by identity 0 +peer1.org1.example.com | [be9 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org1.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org1.example.com | [bea 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org1.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org1.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org1.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org1.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org1.example.com | [beb 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [bec 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003959aa0 gate 1602702078125773800 evaluation succeeds +peer1.org1.example.com | [bed 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bee 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [bef 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [bf0 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [bf1 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [bf2 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [bf3 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [bf4 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [bf5 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [bf6 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf7 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf8 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf9 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [bfa 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bfb 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d04 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d07 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d05 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d09 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d08 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0a 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0b 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0c 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0d 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0e 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org2.example.com | [d10 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org2.example.com | [d12 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d11 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [d13 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161012 +peer0.org2.example.com | [d14 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 61997BB802DACBE43F3B83DBBC4F593D7CFE3591915DA9D17E8488B5C7ACB103 +peer0.org2.example.com | [d15 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [d16 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [d17 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [d18 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d19 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d1a 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d1b 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d1c 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10db Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func1 -> DEBU 10e0 0xc00118cb40 gate 1602702118059129600 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e1 0xc00118cb40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e2 0xc00118cb40 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e3 0xc00118cb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e4 0xc00118cb40 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:01:58.059 UTC [cauthdsl] func1 -> DEBU 10e5 0xc00118cb40 gate 1602702118059129600 evaluation fails" +orderer0.example.com | "2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-10-14 19:01:58.060 UTC [cauthdsl] func1 -> DEBU 10e9 0xc00118d3a0 gate 1602702118060918500 evaluation starts" +orderer0.example.com | "2020-10-14 19:01:58.061 UTC [cauthdsl] func2 -> DEBU 10ea 0xc00118d3a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:01:58.061 UTC [cauthdsl] func2 -> DEBU 10eb 0xc00118d3a0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:01:58.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10ec Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2020-10-14 19:01:58.061 UTC [msp] Validate -> DEBU 10ed MSP Org2MSP validating identity" +orderer0.example.com | "2020-10-14 19:01:58.061 UTC [msp] getCertificationChain -> DEBU 10ee MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:01:58.062 UTC [cauthdsl] func2 -> DEBU 10ef 0xc00118d3a0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:01:58.062 UTC [msp.identity] Verify -> DEBU 10f0 Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +orderer0.example.com | 00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.|" +orderer0.example.com | "2020-10-14 19:01:58.062 UTC [msp.identity] Verify -> DEBU 10f1 Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +orderer0.example.com | 00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +orderer0.example.com | 00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +orderer0.example.com | 00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +orderer0.example.com | 00000040 5c 21 63 9f f2 |\!c..|" +orderer0.example.com | "2020-10-14 19:01:58.063 UTC [cauthdsl] func2 -> DEBU 10f2 0xc00118d3a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:01:58.063 UTC [cauthdsl] func1 -> DEBU 10f3 0xc00118d3a0 gate 1602702118060918500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:01:58.063 UTC [policies] Evaluate -> DEBU 10f4 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:58.063 UTC [policies] Evaluate -> DEBU 10f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f6 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f8 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:01:58.066 UTC [orderer.common.blockcutter] Ordered -> DEBU 10fa Enqueuing message into batch" +orderer0.example.com | "2020-10-14 19:01:58.066 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10fb [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40076" +orderer0.example.com | "2020-10-14 19:01:58.073 UTC [orderer.common.broadcast] Handle -> WARN 10fc Error reading from 172.18.0.9:40076: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:01:58.074 UTC [orderer.common.server] func1 -> DEBU 10fd Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:01:58.074 UTC [comm.grpc.server] 1 -> INFO 10fe streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.9056ms +orderer0.example.com | "2020-10-14 19:01:58.074 UTC [grpc] infof -> DEBU 10ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:01:58.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +orderer0.example.com | "2020-10-14 19:01:58.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1101 Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +orderer0.example.com | "2020-10-14 19:01:58.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1102 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +orderer0.example.com | "2020-10-14 19:01:58.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.3µs " +orderer0.example.com | "2020-10-14 19:01:58.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:58.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1105 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:58.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1106 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:58.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 3 on channel testchainid took 56µs" +orderer0.example.com | "2020-10-14 19:01:58.531 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1108 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 474.9µs " +peer0.org1.example.com | [b3b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b3c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b3d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b3e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b3f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b40 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 gate 1602702070747968700 evaluation starts +peer0.org1.example.com | [b41 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b42 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b43 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 principal matched by identity 0 +peer0.org1.example.com | [b44 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [b45 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [b46 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b47 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 gate 1602702070747968700 evaluation succeeds +peer0.org1.example.com | [b48 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b49 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b4a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b4b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b4c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b4d 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b4e 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b4f 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [b50 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b51 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b52 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b53 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b54 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b55 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b56 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b57 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b58 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b59 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5a 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5b 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b5c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b5d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b5e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bfc 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [bfd 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > +peer1.org1.example.com | [bfe 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org1.example.com | [bff 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c00 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [c01 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [c02 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c03 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c04 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c05 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c06 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c07 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c08 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [c09 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c0a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [c0b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c0c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [c0d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [c0e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c0f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c10 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c11 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c12 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c13 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c14 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c15 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 gate 1602702078262069700 evaluation starts +peer1.org1.example.com | [c16 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c17 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [c18 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 principal matched by identity 0 +peer1.org1.example.com | [c19 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer1.org1.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer1.org1.example.com | [c1a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer1.org1.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer1.org1.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer1.org1.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer1.org1.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer1.org1.example.com | [c1b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c1c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003981fb0 gate 1602702078262069700 evaluation succeeds +peer1.org1.example.com | [c1d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c1e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c1f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c20 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c21 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c22 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [d1d 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [d1e 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d1f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [d20 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d21 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [d22 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d23 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [d24 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d25 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org2.example.com | [d26 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [d27 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer0.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer0.org2.example.com | [d28 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer0.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer0.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer0.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer0.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer0.org2.example.com | [d29 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [d2a 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [d2b 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d2c 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d2d 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [d2e 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d2f 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [d30 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [d31 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [d32 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer0.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer0.org2.example.com | [d33 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer0.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer0.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer0.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer0.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer0.org2.example.com | [d34 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [d35 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 83 03 0e 0e 16 80 c1 41 33 9c a9 |0D. #.......A3..| +peer0.org2.example.com | 00000010 24 2e 9f 5d e3 70 1a 40 76 1f 8b d9 55 34 14 5e |$..].p.@v...U4.^| +peer0.org2.example.com | 00000020 ef ec 64 af 02 20 4d 18 c7 cd 99 05 40 a9 40 70 |..d.. M.....@.@p| +peer0.org2.example.com | 00000030 6a b5 d2 56 5b 0a e5 1e b2 fe 59 4f 0f 64 11 be |j..V[.....YO.d..| +peer0.org2.example.com | 00000040 8a bf 5c 59 30 7f |..\Y0.| +peer0.org2.example.com | [d36 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [d37 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [d38 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d39 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d3a 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [d3b 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [d3c 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer0.org2.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer0.org2.example.com | [d3d 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer0.org2.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer0.org2.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer0.org2.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer0.org2.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer0.org2.example.com | [d3e 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [dbc 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dbd 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [dbe 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [dbf 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dc0 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dc1 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dc2 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc3 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [dc4 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc5 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [dc6 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [dc7 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer1.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer1.org2.example.com | [dc8 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer1.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer1.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer1.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer1.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer1.org2.example.com | [dc9 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [dca 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dcb 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [dcc 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer1.org2.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer1.org2.example.com | [dcd 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer1.org2.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer1.org2.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer1.org2.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer1.org2.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer1.org2.example.com | [dce 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dcf 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dd0 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dd1 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dd2 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [dd3 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [dd4 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [dd5 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dd6 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dd7 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dd8 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dd9 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dda 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ddb 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [ddc 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ddd 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [dde 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [ddf 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [de0 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [de1 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [de2 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [de3 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [de4 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [de5 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [de6 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [de7 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [de8 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [de9 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 gate 1602702082431411200 evaluation starts +peer1.org2.example.com | [dea 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [deb 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [dec 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ded 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 principal evaluation fails +peer1.org2.example.com | [dee 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036db750 gate 1602702082431411200 evaluation fails +peer1.org2.example.com | [def 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [df0 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [df1 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [df2 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 gate 1602702082432073300 evaluation starts +peer1.org2.example.com | [df3 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [df4 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [df5 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:01:58.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1109 Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +orderer0.example.com | "2020-10-14 19:01:58.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110a Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2020-10-14 19:01:58.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +orderer0.example.com | "2020-10-14 19:01:58.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.3µs " +orderer0.example.com | "2020-10-14 19:01:58.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:58.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2020-10-14 19:01:59.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.7µs " +orderer0.example.com | "2020-10-14 19:01:59.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1112 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +orderer0.example.com | "2020-10-14 19:01:59.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1113 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.2µs " +orderer0.example.com | "2020-10-14 19:01:59.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1115 Sending msg of 28 bytes to 3 on channel businesschannel took 215.3µs" +orderer0.example.com | "2020-10-14 19:01:59.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1116 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.3µs " +orderer0.example.com | "2020-10-14 19:01:59.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1117 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1118 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2020-10-14 19:01:59.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 628.8µs " +orderer0.example.com | "2020-10-14 19:01:59.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +orderer0.example.com | "2020-10-14 19:01:59.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111c Sending msg of 28 bytes to 3 on channel businesschannel took 32µs" +orderer0.example.com | "2020-10-14 19:01:59.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.7µs " +orderer0.example.com | "2020-10-14 19:01:59.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 299.5µs " +orderer0.example.com | "2020-10-14 19:01:59.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:01:59.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1120 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1121 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +orderer0.example.com | "2020-10-14 19:02:00.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.5µs " +orderer0.example.com | "2020-10-14 19:02:00.067 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1124 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:00.067 UTC [orderer.consensus.etcdraft] propose -> INFO 1125 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:00.068 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1126 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:00.070 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1127 Sending msg of 3106 bytes to 2 on channel businesschannel took 112.1µs" +orderer0.example.com | "2020-10-14 19:02:00.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1128 Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer1.example.com(orderer1.example.com:7050) took 115.7µs " +orderer0.example.com | "2020-10-14 19:02:00.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 3106 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2020-10-14 19:02:00.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer2.example.com(orderer2.example.com:7050) took 224.7µs " +orderer0.example.com | "2020-10-14 19:02:00.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" +orderer0.example.com | "2020-10-14 19:02:00.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112e Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:02:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.3µs " +peer0.org1.example.com | [b5f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b60 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b61 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b62 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b63 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b64 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b65 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 gate 1602702070994992300 evaluation starts +peer0.org1.example.com | [b66 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b67 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b68 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 principal matched by identity 0 +peer0.org1.example.com | [b69 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [b6a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [b6b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b6c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 gate 1602702070994992300 evaluation succeeds +peer0.org1.example.com | [b6d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b6f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b70 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b71 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b72 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b73 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b74 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b75 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b76 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b77 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b78 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 gate 1602702070995638000 evaluation starts +peer0.org1.example.com | [b79 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b7a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b7b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 principal matched by identity 0 +peer0.org1.example.com | [b7c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [b7d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [b7e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b7f 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 gate 1602702070995638000 evaluation succeeds +peer0.org1.example.com | [b80 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b81 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b82 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b83 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b84 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b85 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b86 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c23 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c24 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c25 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c26 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c27 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [c28 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c29 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c2b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c2c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > +peer1.org1.example.com | [c2d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [c2e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c2f 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c30 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c31 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [c32 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c33 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c34 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c35 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c36 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [c37 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [c38 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [c39 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [c3a 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [c3b 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [c3c 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c3d 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c3e 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c3f 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c40 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c41 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c42 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c43 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c44 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 gate 1602702078293235300 evaluation starts +peer1.org1.example.com | [c45 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c46 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [c47 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 principal matched by identity 0 +peer1.org1.example.com | [c48 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [c4a 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c4b 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [c4c 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c4d 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c4e 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [c4f 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c50 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c51 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b87 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [b88 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b8b 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b89 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b8c 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b8a 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b8d 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b8e 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b8f 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b90 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b91 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b92 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b93 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b94 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b95 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b96 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b97 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 gate 1602702071023132100 evaluation starts +peer0.org1.example.com | [b98 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b99 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [b9a 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 principal matched by identity 0 +peer0.org1.example.com | [b9b 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [b9c 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [b9d 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b9e 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 gate 1602702071023132100 evaluation succeeds +peer0.org1.example.com | [b9f 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [df6 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer1.org2.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer1.org2.example.com | [df7 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer1.org2.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer1.org2.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer1.org2.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer1.org2.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer1.org2.example.com | [df8 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [df9 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dbcc0 gate 1602702082432073300 evaluation succeeds +peer1.org2.example.com | [dfa 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dfb 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [dfc 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [dfd 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d3f 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [d40 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d41 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d42 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d43 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [d44 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [d45 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [d46 10-14 19:01:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d47 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [d48 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d49 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [d4a 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [d4b 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer0.org2.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer0.org2.example.com | [d4c 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer0.org2.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer0.org2.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer0.org2.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer0.org2.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer0.org2.example.com | [d4d 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [d4e 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 c3 64 87 1e 8d a9 25 f5 14 0e |0E.!...d....%...| +peer0.org2.example.com | 00000010 77 b6 ad 0f 06 36 e3 10 50 c2 71 f4 59 c1 3d f7 |w....6..P.q.Y.=.| +peer0.org2.example.com | 00000020 c0 20 24 17 ea 02 20 2b bf a0 fa 39 da 0c ed 9f |. $... +...9....| +peer0.org2.example.com | 00000030 be 2b 88 45 d0 93 e0 d7 a9 85 66 f2 e5 eb bf 8a |.+.E......f.....| +peer0.org2.example.com | 00000040 c3 9c 9e ca ef 2d 9d |.....-.| +peer0.org2.example.com | [d4f 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [ba0 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ba1 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ba2 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ba3 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ba4 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba5 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer0.org1.example.com | [ba6 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ba7 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer0.org1.example.com | [ba8 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [baa 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [bab 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba9 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [bac 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bad 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +peer0.org1.example.com | [bae 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [baf 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +peer0.org1.example.com | [bb0 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bb1 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bb2 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bb3 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bb4 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bb5 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bb6 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [bb7 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 gate 1602702071597897300 evaluation starts +peer0.org1.example.com | [bb8 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bb9 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [bba 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 principal matched by identity 0 +peer0.org1.example.com | [bbb 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer0.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org1.example.com | [bbc 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 84 74 89 0e 0c 32 c5 7e 7d 29 |0E.!...t...2.~})| +peer0.org1.example.com | 00000010 77 8d 28 4c 1e 80 db 91 b4 09 ea 5e 2d 8e c1 c8 |w.(L.......^-...| +peer0.org1.example.com | 00000020 48 75 9b 2b cd 02 20 15 59 9b c3 be 2f 33 f6 13 |Hu.+.. .Y.../3..| +peer0.org1.example.com | 00000030 ca 6f 46 a2 09 b7 8f 10 2b 8c 1a 16 84 2d 5c 3a |.oF.....+....-\:| +peer0.org1.example.com | 00000040 55 ef 26 08 6d aa fb |U.&.m..| +peer0.org1.example.com | [bbd 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [bbe 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 gate 1602702071597897300 evaluation succeeds +peer0.org1.example.com | [bbf 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bc0 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bc1 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [bc2 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [bc3 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bc5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +peer0.org1.example.com | [bc6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bc8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bca 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [bcb 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +peer0.org1.example.com | [bcc 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bcd 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [bce 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bcf 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [bd0 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bd1 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bd2 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [bd3 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bd4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [bd5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 gate 1602702071603061500 evaluation starts +peer0.org1.example.com | [bd6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bd7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [d50 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [d51 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [d52 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [d53 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [d54 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d55 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d56 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d57 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [d58 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d59 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d5a 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [d5b 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [d5c 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d5d 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [d5e 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d5f 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d60 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d61 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d62 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d63 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d64 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d65 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d66 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d67 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d68 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d69 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6a 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d6b 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [d6c 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d6d 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [d6e 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d6f 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [d70 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [d71 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dfe 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dff 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [e00 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e01 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e02 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [e03 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e04 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e05 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [e06 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e07 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e08 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e09 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e0a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: alive: +peer1.org2.example.com | [e0b 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0c 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e0d 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e0e 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0f 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e10 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e11 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e12 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e13 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e14 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e15 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e16 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [e17 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e18 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e19 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e1a 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e1b 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [e1c 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bd8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 principal matched by identity 0 +peer0.org1.example.com | [bd9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer0.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer0.org1.example.com | [bda 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f3 fb 62 7f 87 11 4b 34 63 d3 |0E.!....b...K4c.| +peer0.org1.example.com | 00000010 01 62 92 3f c2 b1 6a 9e d0 4f f1 b0 1a 5d 14 4e |.b.?..j..O...].N| +peer0.org1.example.com | 00000020 a8 c9 af 1f 14 02 20 65 85 bd 39 de 1a e7 83 71 |...... e..9....q| +peer0.org1.example.com | 00000030 d2 6a 00 2f 3f f8 77 35 68 a3 6d de c2 70 81 18 |.j./?.w5h.m..p..| +peer0.org1.example.com | 00000040 37 2e ac 89 e0 37 6b |7....7k| +peer0.org1.example.com | [bdb 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [bdc 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 gate 1602702071603061500 evaluation succeeds +peer0.org1.example.com | [bdd 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bde 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bdf 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [be0 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [be1 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be2 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [be3 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +peer0.org1.example.com | [be4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [be6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d72 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d73 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d74 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d75 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d76 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d77 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [d78 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 gate 1602702078427450700 evaluation starts +peer0.org2.example.com | [d79 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d7a 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [d7b 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 principal matched by identity 0 +peer0.org2.example.com | [d7c 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer0.org2.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer0.org2.example.com | [d7d 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer0.org2.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer0.org2.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer0.org2.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer0.org2.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer0.org2.example.com | [d7e 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d7f 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003830180 gate 1602702078427450700 evaluation succeeds +peer0.org2.example.com | [d80 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d81 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d82 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d83 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d84 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [d85 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [d86 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [d87 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [d88 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [d89 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d8a 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d8b 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d8c 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [d8d 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8e 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8f 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d90 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c52 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [c53 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [c49 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [c54 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c55 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d0e80 gate 1602702078293235300 evaluation succeeds +peer1.org1.example.com | [c56 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c57 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c58 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c59 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c5a 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c5b 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c5c 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c5d 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c5e 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c5f 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c60 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c61 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c62 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 gate 1602702078308209000 evaluation starts +peer1.org1.example.com | [c63 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c64 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [c65 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 principal matched by identity 0 +peer1.org1.example.com | [c66 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [c67 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [c68 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c69 10-14 19:01:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e00 gate 1602702078308209000 evaluation succeeds +peer1.org1.example.com | [c6a 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c6b 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c6c 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c6d 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c6e 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c6f 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c70 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c71 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [be7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [be8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [be9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +peer0.org1.example.com | [bea 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [beb 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41738 +peer0.org1.example.com | [bec 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002a7b270 +peer0.org1.example.com | [bed 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [bee 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [bef 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [bf0 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [bf1 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 74 3e 6b 00 3e 1b db 4d 4e 63 2a da 75 1f e4 |.t>k.>..MNc*.u..| +peer0.org1.example.com | 00000010 74 fe 1d d5 d4 71 25 5a a9 11 5c 83 2d 00 73 ec |t....q%Z..\.-.s.| +peer0.org1.example.com | [bf2 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 fe d7 25 17 ef 1e 70 0d c8 09 9e |0D. ...%...p....| +peer0.org1.example.com | 00000010 50 f7 79 9a 2f ec 57 5d b5 ec f6 d7 69 e6 2f b0 |P.y./.W]....i./.| +peer0.org1.example.com | 00000020 61 a6 db 13 02 20 31 23 06 fe 19 b8 81 38 fc ea |a.... 1#.....8..| +peer0.org1.example.com | 00000030 70 51 9f 06 99 2a 44 b5 d2 a3 bd 75 5c fb 80 16 |pQ...*D....u\...| +peer0.org1.example.com | 00000040 eb c0 ae ae 32 51 |....2Q| +peer0.org1.example.com | [bf3 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [bf4 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00019c460, header 0xc002a7b680 +peer0.org1.example.com | [bf5 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [bf6 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] processing txid: f66d801620d4932880fd17e7b603a0cc2fa4c20c1a0f661eff5c9df924e926aa +peer0.org1.example.com | [bf7 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] Entry chaincode: name:"lscc" +peer0.org1.example.com | [bf8 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [][f66d8016] Entry chaincode: name:"lscc" +peer0.org1.example.com | [bf9 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [bfa 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 74 3e 6b 00 3e 1b db 4d 4e 63 2a da 75 1f e4 |.t>k.>..MNc*.u..| +peer0.org1.example.com | 00000010 74 fe 1d d5 d4 71 25 5a a9 11 5c 83 2d 00 73 ec |t....q%Z..\.-.s.| +peer0.org1.example.com | [bfb 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 fe d7 25 17 ef 1e 70 0d c8 09 9e |0D. ...%...p....| +peer0.org1.example.com | 00000010 50 f7 79 9a 2f ec 57 5d b5 ec f6 d7 69 e6 2f b0 |P.y./.W]....i./.| +peer0.org1.example.com | 00000020 61 a6 db 13 02 20 31 23 06 fe 19 b8 81 38 fc ea |a.... 1#.....8..| +peer0.org1.example.com | 00000030 70 51 9f 06 99 2a 44 b5 d2 a3 bd 75 5c fb 80 16 |pQ...*D....u\...| +peer0.org1.example.com | 00000040 eb c0 ae ae 32 51 |....2Q| +peer0.org1.example.com | [bfc 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +orderer0.example.com | "2020-10-14 19:02:00.075 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1130 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:00.075 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1131 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2020-10-14 19:02:00.075 UTC [msp] GetDefaultSigningIdentity -> DEBU 1132 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:00.075 UTC [msp] GetDefaultSigningIdentity -> DEBU 1133 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:00.076 UTC [msp.identity] Sign -> DEBU 1134 Sign: plaintext: 0A020802120B0A090A03010203100418...EBE319D8E2A2E909F275A3FBB645C04B " +orderer0.example.com | "2020-10-14 19:02:00.076 UTC [msp.identity] Sign -> DEBU 1135 Sign: digest: 5988E8613F9D8FE63EC0B58E22CFEF29B1E3045E9157C4783230F691985791B6 " +orderer0.example.com | "2020-10-14 19:02:00.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.5µs " +orderer0.example.com | "2020-10-14 19:02:00.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1137 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.080 UTC [fsblkstorage] indexBlock -> DEBU 1138 Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +orderer0.example.com | txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:02:00.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.089 UTC [fsblkstorage] updateCheckpoint -> DEBU 113a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97389], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2020-10-14 19:02:00.089 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 113b [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2020-10-14 19:02:00.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +orderer0.example.com | "2020-10-14 19:02:00.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2020-10-14 19:02:00.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +orderer0.example.com | "2020-10-14 19:02:00.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.7µs " +orderer0.example.com | "2020-10-14 19:02:00.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-10-14 19:02:00.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1144 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.9µs " +orderer0.example.com | "2020-10-14 19:02:00.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.1µs " +orderer0.example.com | "2020-10-14 19:02:00.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1146 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2020-10-14 19:02:00.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1147 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-10-14 19:02:00.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1148 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +orderer0.example.com | "2020-10-14 19:02:00.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1149 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:00.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114c Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2020-10-14 19:02:01.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +orderer0.example.com | "2020-10-14 19:02:01.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114e Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +orderer0.example.com | "2020-10-14 19:02:01.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114f Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2020-10-14 19:02:01.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +orderer0.example.com | "2020-10-14 19:02:01.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1151 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 369.2µs " +orderer0.example.com | "2020-10-14 19:02:01.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1152 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1153 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1154 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1155 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +peer0.org2.example.com | [d91 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [d92 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [d93 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d94 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d95 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [d96 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d97 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d98 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d99 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d9a 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d9b 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d9c 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [d9d 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d9e 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [d9f 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [da0 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [da1 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [da2 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [da3 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [da4 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [da5 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [da6 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [da7 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [da8 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [da9 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 gate 1602702078574916300 evaluation starts +peer0.org2.example.com | [daa 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [dab 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [dac 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 principal matched by identity 0 +peer0.org2.example.com | [dad 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +peer0.org2.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +peer0.org2.example.com | [dae 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer0.org2.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer0.org2.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +peer0.org2.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +peer0.org2.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +peer0.org2.example.com | [daf 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [db0 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1e30 gate 1602702078574916300 evaluation succeeds +peer0.org2.example.com | [db1 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db2 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [db3 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [db4 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [db5 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [db6 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [db7 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [db8 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [db9 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [dba 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbb 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dbc 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [dbd 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dbe 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dbf 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dc0 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [dc1 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [dc2 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc3 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dc4 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dc5 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e1d 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e1e 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e1f 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e20 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e21 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e22 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e23 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 gate 1602702082589227000 evaluation starts +peer1.org2.example.com | [e24 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e25 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e26 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e27 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 principal evaluation fails +peer1.org2.example.com | [e28 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fdd90 gate 1602702082589227000 evaluation fails +peer1.org2.example.com | [e29 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e2a 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e2b 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e2c 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 gate 1602702082589873900 evaluation starts +peer1.org2.example.com | [e2d 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e2e 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e2f 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 principal matched by identity 0 +peer1.org2.example.com | [e30 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer1.org2.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer1.org2.example.com | [e31 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer1.org2.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer1.org2.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer1.org2.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer1.org2.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer1.org2.example.com | [e32 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [e33 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003722300 gate 1602702082589873900 evaluation succeeds +peer1.org2.example.com | [e34 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e35 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e36 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e37 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e38 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e39 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [e3a 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [bfd 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer0.org1.example.com | [bfe 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer0.org1.example.com | [bff 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a6b56eb8-967d-460f-befe-2e1c2716655b] +peer0.org1.example.com | [c00 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [c01 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a6b56eb8-967d-460f-befe-2e1c2716655b] +peer0.org1.example.com | [c02 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer0.org1.example.com | [c03 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org1.example.com | [c04 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f66d8016] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [c05 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f66d8016] notifying Txid:f66d801620d4932880fd17e7b603a0cc2fa4c20c1a0f661eff5c9df924e926aa, channelID: +peer0.org1.example.com | [c06 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [c07 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [][f66d8016] Exit chaincode: name:"lscc" (3ms) +peer0.org1.example.com | [c08 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] Exit +peer0.org1.example.com | [c09 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41738 +peer0.org1.example.com | [c0a 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41738 grpc.code=OK grpc.call_duration=7.6039ms +peer0.org1.example.com | [c0b 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [c0c 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [c0d 10-14 19:01:11.95 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]] +peer0.org1.example.com | [c0e 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [c0f 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 5e b7 d5 ad 4a 84 33 d2 33 fa 83 58 98 37 fe |.^...J.3.3..X.7.| +peer0.org1.example.com | 00000010 fe fa 6d 26 b7 3b ae c8 77 f9 ac 62 53 97 22 7a |..m&.;..w..bS."z| +peer0.org1.example.com | [c10 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 0d f8 79 f4 04 3c 1e 63 e9 6a |0E.!....y..<.c.j| +peer0.org1.example.com | 00000010 a5 b9 13 cd 3a 40 f9 c6 ad 46 20 7f 9c 92 ae c1 |....:@...F .....| +peer0.org1.example.com | 00000020 ed 48 99 ec e9 02 20 01 27 27 21 51 44 ac ed b5 |.H.... .''!QD...| +peer0.org1.example.com | 00000030 e6 a6 5f 27 53 aa ae de 16 22 a6 79 4d 17 49 11 |.._'S....".yM.I.| +peer0.org1.example.com | 00000040 9d 22 ed 2b e4 1d 92 |.".+...| +peer0.org1.example.com | [c11 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c12 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c13 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c14 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [c15 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [c16 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41754 +peer0.org1.example.com | [c17 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002baec30 +peer0.org1.example.com | [c18 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [c19 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [c1a 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [c1b 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c1d 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [c1c 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c1e 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c1f 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [c20 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c21 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c22 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c23 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c24 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [c25 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c26 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [c27 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [c28 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dc6 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dc7 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [dc8 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dc9 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dca 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dcb 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dcc 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [dcd 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [dce 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [dcf 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dd0 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dd1 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dd2 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [dd3 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dd4 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dd5 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [dd6 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [dd7 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [dd8 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 gate 1602702078633145800 evaluation starts +peer0.org2.example.com | [dd9 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [dda 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [ddb 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 principal matched by identity 0 +peer0.org2.example.com | [ddc 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [ddd 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [dde 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ddf 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c72 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c73 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c74 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 gate 1602702078312632400 evaluation starts +peer1.org1.example.com | [c75 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c76 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [c77 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 principal matched by identity 0 +peer1.org1.example.com | [c78 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [c79 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [c7a 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c7b 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f4940 gate 1602702078312632400 evaluation succeeds +peer1.org1.example.com | [c7c 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c7d 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c7e 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c7f 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c80 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c81 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [c82 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c83 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [c84 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [c85 10-14 19:01:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c86 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c87 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c88 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c89 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c8a 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c8b 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c8c 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c8d 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 gate 1602702078322377400 evaluation starts +peer1.org1.example.com | [c8e 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c8f 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [c90 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 principal matched by identity 0 +peer1.org1.example.com | [c91 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [de0 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [de1 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [de2 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [de3 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [de4 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [de5 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de6 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [de7 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003871e10 gate 1602702078633145800 evaluation succeeds +peer0.org2.example.com | [de8 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [de9 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [dea 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [deb 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [dec 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ded 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [dee 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [def 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [df0 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [df1 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [df2 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [df3 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [df4 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 gate 1602702078639687400 evaluation starts +peer0.org2.example.com | [df5 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [df6 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [df7 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 principal matched by identity 0 +peer0.org2.example.com | [df8 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [df9 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [dfa 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [dfb 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a6de0 gate 1602702078639687400 evaluation succeeds +peer0.org2.example.com | [dfc 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [dfd 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [dfe 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [dff 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e00 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [e01 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | [c29 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [c2a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [c2b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c2c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c2d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c2e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c2f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c30 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c31 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c32 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c33 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 gate 1602702073963976200 evaluation starts +peer0.org1.example.com | [c34 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c35 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [c36 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 principal matched by identity 0 +peer0.org1.example.com | [c37 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [c38 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [c39 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c3a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 gate 1602702073963976200 evaluation succeeds +peer0.org1.example.com | [c3b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c3c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c3d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c3e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c3f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c40 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c41 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +orderer0.example.com | "2020-10-14 19:02:01.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1156 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +orderer0.example.com | "2020-10-14 19:02:01.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1157 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2020-10-14 19:02:01.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-10-14 19:02:01.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1158 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.4µs " +orderer0.example.com | "2020-10-14 19:02:01.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266.2µs " +orderer0.example.com | "2020-10-14 19:02:01.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:01.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115e Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2020-10-14 19:02:02.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +orderer0.example.com | "2020-10-14 19:02:02.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1160 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2020-10-14 19:02:02.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1161 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-10-14 19:02:02.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1162 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151µs " +orderer0.example.com | "2020-10-14 19:02:02.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.6µs " +orderer0.example.com | "2020-10-14 19:02:02.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1164 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1165 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1166 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1167 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-10-14 19:02:02.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1168 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +orderer0.example.com | "2020-10-14 19:02:02.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1169 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +orderer0.example.com | "2020-10-14 19:02:02.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116a Sending msg of 28 bytes to 3 on channel businesschannel took 208.4µs" +orderer0.example.com | "2020-10-14 19:02:02.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +orderer0.example.com | "2020-10-14 19:02:02.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 286.6µs " +orderer0.example.com | "2020-10-14 19:02:02.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:02.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1170 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-10-14 19:02:03.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1171 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.4µs " +orderer0.example.com | "2020-10-14 19:02:03.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1172 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +orderer0.example.com | "2020-10-14 19:02:03.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1173 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +orderer0.example.com | "2020-10-14 19:02:03.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1174 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.4µs " +orderer0.example.com | "2020-10-14 19:02:03.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.7µs " +orderer0.example.com | "2020-10-14 19:02:03.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1176 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.128 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1177 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1178 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1179 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2020-10-14 19:02:03.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.9µs " +orderer0.example.com | "2020-10-14 19:02:03.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117b Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +orderer0.example.com | "2020-10-14 19:02:03.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2020-10-14 19:02:03.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74µs " +orderer0.example.com | "2020-10-14 19:02:03.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.6µs " +orderer0.example.com | "2020-10-14 19:02:03.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1180 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:03.843 UTC [orderer.common.server] Deliver -> DEBU 1181 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:03.843 UTC [common.deliver] Handle -> DEBU 1182 Starting new deliver loop for 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.844 UTC [common.deliver] Handle -> DEBU 1183 Attempting to read seek info message from 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1184 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1185 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1186 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.846 UTC [policies] Evaluate -> DEBU 1187 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:03.846 UTC [policies] Evaluate -> DEBU 1188 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.847 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" +orderer0.example.com | "2020-10-14 19:02:03.848 UTC [msp.identity] newIdentity -> DEBU 118a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:03.850 UTC [cauthdsl] func1 -> DEBU 118b 0xc001230de0 gate 1602702123850129700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118c 0xc001230de0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118d 0xc001230de0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118e 0xc001230de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:03.851 UTC [cauthdsl] func2 -> DEBU 118f 0xc001230de0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:03.851 UTC [cauthdsl] func1 -> DEBU 1190 0xc001230de0 gate 1602702123850129700 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:03.851 UTC [policies] Evaluate -> DEBU 1191 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:03.852 UTC [policies] Evaluate -> DEBU 1192 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:03.852 UTC [policies] Evaluate -> DEBU 1193 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.853 UTC [cauthdsl] func1 -> DEBU 1194 0xc001231fa0 gate 1602702123853211400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1195 0xc001231fa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1196 0xc001231fa0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1197 0xc001231fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:03.854 UTC [cauthdsl] func2 -> DEBU 1198 0xc001231fa0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:03.854 UTC [cauthdsl] func1 -> DEBU 1199 0xc001231fa0 gate 1602702123853211400 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:03.854 UTC [policies] Evaluate -> DEBU 119a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:03.854 UTC [policies] Evaluate -> DEBU 119b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:03.854 UTC [policies] func1 -> DEBU 119c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:03.856 UTC [cauthdsl] func1 -> DEBU 11a2 0xc0012a0cb0 gate 1602702123856061100 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:03.856 UTC [cauthdsl] func2 -> DEBU 11a3 0xc0012a0cb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:03.856 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0012a0cb0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:03.856 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a5 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:03.857 UTC [msp] Validate -> DEBU 11a6 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:02:03.857 UTC [msp] getCertificationChain -> DEBU 11a7 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:03.857 UTC [cauthdsl] func2 -> DEBU 11a8 0xc0012a0cb0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:03.858 UTC [msp.identity] Verify -> DEBU 11a9 Verify: digest = 00000000 9a 75 2e af c1 64 ed d2 b0 fc 46 ad 8d 6c e9 dc |.u...d....F..l..| +orderer0.example.com | 00000010 83 6c 63 a1 da ef e5 6d fc 1d 7b f5 85 d6 df f0 |.lc....m..{.....|" +orderer0.example.com | "2020-10-14 19:02:03.858 UTC [msp.identity] Verify -> DEBU 11aa Verify: sig = 00000000 30 44 02 20 76 a2 b2 91 ce fb bf e5 56 41 3b 76 |0D. v.......VA;v| +orderer0.example.com | 00000010 c4 75 c0 73 b0 e2 6c 7b 86 b2 55 72 b3 1c 15 0b |.u.s..l{..Ur....| +orderer0.example.com | 00000020 c3 14 a3 5d 02 20 0c 60 b7 f6 fd 05 84 43 9f 03 |...]. .`.....C..| +orderer0.example.com | 00000030 25 45 17 35 80 44 b2 7d e0 e3 fc c9 e9 a5 91 db |%E.5.D.}........| +orderer0.example.com | 00000040 87 1e 09 c8 fe 66 |.....f|" +orderer0.example.com | "2020-10-14 19:02:03.858 UTC [cauthdsl] func2 -> DEBU 11ab 0xc0012a0cb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:03.858 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0012a0cb0 gate 1602702123856061100 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11ad Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11ae == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11af Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:03.861 UTC [common.deliver] deliverBlocks -> DEBU 11b3 [channel: businesschannel] Received seekInfo (0xc0010a1d40) start: > stop: > from 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.862 UTC [fsblkstorage] Next -> DEBU 11b4 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:03.863 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +orderer0.example.com | "2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b6 Remaining bytes=[4009], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +orderer0.example.com | "2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 blockbytes [4007] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:03.865 UTC [common.deliver] deliverBlocks -> DEBU 11b9 [channel: businesschannel] Delivering block [5] for (0xc0010a1d40) for 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.865 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Done delivering to 172.18.0.9:40122 for (0xc0010a1d40)" +orderer0.example.com | "2020-10-14 19:02:03.866 UTC [common.deliver] Handle -> DEBU 11bb Waiting for new SeekInfo from 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.867 UTC [common.deliver] Handle -> DEBU 11bc Attempting to read seek info message from 172.18.0.9:40122" +orderer0.example.com | "2020-10-14 19:02:03.879 UTC [common.deliver] Handle -> WARN 11bd Error reading from 172.18.0.9:40122: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:03.879 UTC [orderer.common.server] func1 -> DEBU 11be Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:03.880 UTC [comm.grpc.server] 1 -> INFO 11bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40122 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.3919ms +orderer0.example.com | "2020-10-14 19:02:03.880 UTC [grpc] infof -> DEBU 11c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:04.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c2 Sending msg of 28 bytes to 3 on channel testchainid took 278.3µs" +orderer0.example.com | "2020-10-14 19:02:04.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 293µs " +orderer0.example.com | "2020-10-14 19:02:04.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +orderer0.example.com | "2020-10-14 19:02:04.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 103.2µs" +orderer0.example.com | "2020-10-14 19:02:04.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 507.3µs " +orderer0.example.com | "2020-10-14 19:02:04.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +orderer0.example.com | "2020-10-14 19:02:04.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.208 UTC [orderer.common.server] Deliver -> DEBU 11ca Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:04.209 UTC [common.deliver] Handle -> DEBU 11cb Starting new deliver loop for 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.209 UTC [common.deliver] Handle -> DEBU 11cc Attempting to read seek info message from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.209 UTC [policies] Evaluate -> DEBU 11cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.210 UTC [cauthdsl] func1 -> DEBU 11d2 0xc0012afe60 gate 1602702124210833200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d3 0xc0012afe60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d4 0xc0012afe60 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0012afe60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d6 0xc0012afe60 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [cauthdsl] func1 -> DEBU 11d7 0xc0012afe60 gate 1602702124210833200 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.211 UTC [policies] Evaluate -> DEBU 11d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [e02 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [e03 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [e04 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e05 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [e06 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e07 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e08 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e09 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e0a 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e0b 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e0c 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e0d 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e0e 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 gate 1602702078647419100 evaluation starts +peer0.org2.example.com | [e0f 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e10 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [e11 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 principal matched by identity 0 +peer0.org2.example.com | [e12 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [e13 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [e14 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e15 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4f60 gate 1602702078647419100 evaluation succeeds +peer0.org2.example.com | [e16 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e17 10-14 19:01:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e18 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e19 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e1a 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [e1b 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [e1c 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [c43 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [c45 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c47 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [c46 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [c44 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c49 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c4a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [c42 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c48 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 64 4e 6c a0 25 06 15 5d 50 09 ad 23 ea 3f 59 |.dNl.%..]P..#.?Y| +peer0.org1.example.com | 00000010 d6 61 3f 5d 37 d9 5c 22 cb 23 26 0e 7c c2 27 1f |.a?]7.\".#&.|.'.| +peer0.org1.example.com | [c4b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c4e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c4f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c4c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c50 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer0.org1.example.com | [c51 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c52 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c53 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c54 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c55 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c56 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 gate 1602702073968395700 evaluation starts +peer0.org1.example.com | [c57 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c58 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [c59 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 principal matched by identity 0 +peer0.org1.example.com | [c5a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [c5b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [c5c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c5d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 gate 1602702073968395700 evaluation succeeds +peer0.org1.example.com | [c5e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c5f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c60 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c61 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c62 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c63 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [c64 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [c65 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [c66 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [c67 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [c4d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 85 da 50 4c 5d 24 ee 3e f1 e0 1e |0D. ...PL]$.>...| +peer0.org1.example.com | 00000010 15 86 8f c9 00 03 4d 82 1e e3 6e d9 78 2c bc b3 |......M...n.x,..| +peer0.org1.example.com | 00000020 e4 2e f5 a1 02 20 2e 26 dc 6c 47 3c 5e 2c 87 05 |..... .&.lG<^,..| +peer0.org1.example.com | 00000030 ba a6 a7 bd da 69 58 13 9e fc 0f a6 16 73 87 51 |.....iX......s.Q| +peer0.org1.example.com | 00000040 1a fb 5e 5e 52 7a |..^^Rz| +peer0.org1.example.com | [c68 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c69 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c6a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [c6b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e0a10, header 0xc002baf130 +peer0.org1.example.com | [c6c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [c6d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c6e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c6f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] processing txid: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 +peer0.org1.example.com | [c70 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org1.example.com | [c71 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c72 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c73 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [c74 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c75 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org1.example.com | [c77 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [c76 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c78 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [c79 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 gate 1602702073972923100 evaluation starts +peer0.org1.example.com | [c7a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [c7b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c7c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [c7d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [c7e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling GET_STATE from chaincode +peer0.org1.example.com | [c7f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 principal matched by identity 0 +peer0.org1.example.com | [c80 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [c81 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [c82 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [c83 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [c84 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] No state associated with key: exp02. Sending RESPONSE with an empty payload +peer0.org1.example.com | [c85 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c86 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [c87 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 gate 1602702073972923100 evaluation succeeds +peer0.org1.example.com | [c88 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c89 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c8a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [c8b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c8c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c8d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c8e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 gate 1602702073973721800 evaluation starts +peer0.org1.example.com | [c8f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [c90 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c91 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c92 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [c93 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [c94 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [c95 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [c96 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c97 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | [c92 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [c93 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c94 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a14480 gate 1602702078322377400 evaluation succeeds +peer1.org1.example.com | [c95 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c96 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c97 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c98 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c99 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c9a 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c9b 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c9c 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c9d 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c9e 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c9f 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ca0 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ca1 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 gate 1602702078326584600 evaluation starts +peer1.org1.example.com | [ca2 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ca3 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [ca4 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 principal matched by identity 0 +peer1.org1.example.com | [ca5 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [ca6 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [ca7 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ca8 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a15680 gate 1602702078326584600 evaluation succeeds +peer1.org1.example.com | [ca9 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [caa 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cab 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cac 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [cad 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cae 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [caf 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb0 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cb1 10-14 19:01:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [cb2 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e3b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e3c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [e3d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e40 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [e41 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e42 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e43 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e44 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e45 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > alive: alive: +peer1.org2.example.com | [e46 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e47 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e48 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e49 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4a 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e4b 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e4c 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e4d 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4e 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4f 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [e50 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [e51 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e52 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e53 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e54 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [e55 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e57 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e58 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e59 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e56 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [e5a 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e5b 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [e5c 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [e5d 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e5e 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e5f 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [e60 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e61 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e62 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e63 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e64 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e65 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e66 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e67 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 gate 1602702082958568600 evaluation starts +peer1.org2.example.com | [e68 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e69 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e6a 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e6b 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 principal evaluation fails +peer1.org2.example.com | [e6c 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003746ef0 gate 1602702082958568600 evaluation fails +peer1.org2.example.com | [e6d 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e6e 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e6f 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e70 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 gate 1602702082960138200 evaluation starts +peer1.org2.example.com | [e71 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e72 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e73 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 principal matched by identity 0 +peer1.org2.example.com | [e74 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [e75 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [e76 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [c98 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [c99 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [c9a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [c9b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal matched by identity 0 +peer0.org1.example.com | [c9d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 64 4e 6c a0 25 06 15 5d 50 09 ad 23 ea 3f 59 |.dNl.%..]P..#.?Y| +peer0.org1.example.com | 00000010 d6 61 3f 5d 37 d9 5c 22 cb 23 26 0e 7c c2 27 1f |.a?]7.\".#&.|.'.| +peer0.org1.example.com | [c9e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 85 da 50 4c 5d 24 ee 3e f1 e0 1e |0D. ...PL]$.>...| +peer0.org1.example.com | 00000010 15 86 8f c9 00 03 4d 82 1e e3 6e d9 78 2c bc b3 |......M...n.x,..| +peer0.org1.example.com | 00000020 e4 2e f5 a1 02 20 2e 26 dc 6c 47 3c 5e 2c 87 05 |..... .&.lG<^,..| +peer0.org1.example.com | 00000030 ba a6 a7 bd da 69 58 13 9e fc 0f a6 16 73 87 51 |.....iX......s.Q| +peer0.org1.example.com | 00000040 1a fb 5e 5e 52 7a |..^^Rz| +peer0.org1.example.com | [c9c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [c9f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [ca0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ca1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb3 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [cb4 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [cb5 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [cb6 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [cb7 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb8 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cb9 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [cba 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [cbb 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [cbc 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [cbd 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [cbe 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [cbf 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 gate 1602702078335218600 evaluation starts +peer1.org1.example.com | [cc0 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [cc1 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [cc2 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 principal matched by identity 0 +peer1.org1.example.com | [cc3 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [cc4 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [cc5 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [cc6 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2fb00 gate 1602702078335218600 evaluation succeeds +peer1.org1.example.com | [cc7 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cc8 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cc9 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cca 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ccb 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ccc 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e1d 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [e1e 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e1f 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [e20 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e21 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e22 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e23 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e24 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e25 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e26 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e27 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e28 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e29 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 gate 1602702078654967000 evaluation starts +peer0.org2.example.com | [e2a 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e2b 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [e2c 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 principal matched by identity 0 +peer0.org2.example.com | [e2d 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [e2e 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [e2f 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e30 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5190 gate 1602702078654967000 evaluation succeeds +peer0.org2.example.com | [e31 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e32 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e33 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e34 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e35 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e36 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ca2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ca3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ca4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ca5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ca6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ca7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ca8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 gate 1602702073976857400 evaluation starts +peer0.org1.example.com | [ca9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [caa 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [cab 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 principal matched by identity 0 +peer0.org1.example.com | [cac 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [cad 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [cae 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [caf 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 gate 1602702073976857400 evaluation succeeds +peer0.org1.example.com | [cb0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cb1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cb2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cb3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cb4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [cb7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cb8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cb9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [cba 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [cbb 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cbc 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 gate 1602702073977594200 evaluation starts +peer0.org1.example.com | [cbd 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cbe 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [cbf 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 principal matched by identity 0 +peer0.org1.example.com | [cc0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [cc1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | [e77 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003747460 gate 1602702082960138200 evaluation succeeds +peer1.org2.example.com | [e78 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e79 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e7a 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e7b 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e7c 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7d 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e7e 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e7f 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e80 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e81 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e82 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e83 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e84 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 gate 1602702082964604500 evaluation starts +peer1.org2.example.com | [e85 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e86 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e87 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e88 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 principal evaluation fails +peer1.org2.example.com | [e89 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774660 gate 1602702082964604500 evaluation fails +peer1.org2.example.com | [e8a 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]] +peer1.org2.example.com | [e8b 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e8c 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e8d 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e8e 10-14 19:01:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 gate 1602702082968165300 evaluation starts +peer1.org2.example.com | [e8f 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e90 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [e91 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 principal matched by identity 0 +peer1.org2.example.com | [e92 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [e93 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [e94 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [e95 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003774bd0 gate 1602702082968165300 evaluation succeeds +peer1.org2.example.com | [e96 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e97 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e98 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e99 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e9a 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [e9b 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [cc2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [cc3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 gate 1602702073977594200 evaluation succeeds +peer0.org1.example.com | [cc4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cc5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cc6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cc7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cc8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cc9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +peer0.org1.example.com | [cca 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +peer0.org1.example.com | [ccb 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ccc 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ccd 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [cce 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 skipping identity 0 because it has already been used +peer0.org1.example.com | [ccf 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal evaluation fails +peer0.org1.example.com | [cd0 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 gate 1602702073973721800 evaluation succeeds +peer0.org1.example.com | [cd1 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [cd2 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +peer0.org1.example.com | [cd3 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [cd4 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +peer0.org1.example.com | [cd5 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [cd6 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] notifying Txid:7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, channelID:businesschannel +peer0.org1.example.com | [cd7 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [cd8 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [cd9 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +peer0.org1.example.com | [cda 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [cdb 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [cdc 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org1.example.com | [cdd 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org1.example.com | [cde 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [cdf 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ce0 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [ce1 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ce2 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [ce3 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [ce4 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [ce5 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [ce6 10-14 19:01:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.21 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.9" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.21" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.9 +peer0.org1.example.com | [ce7 10-14 19:01:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [ce8 10-14 19:01:14.01 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [ce9 10-14 19:01:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:1.4 +peer0.org1.example.com | [cea 10-14 19:01:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [ceb 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e9c 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [e9d 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [e9e 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e9f 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [ea0 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea1 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea2 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea3 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ea4 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ea5 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ea7 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ea8 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ea6 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea9 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eaa 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [eab 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eac 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ead 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eae 10-14 19:01:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [eaf 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eb0 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [eb1 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 gate 1602702082980620800 evaluation starts +peer1.org2.example.com | [eb2 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [eb3 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [eb4 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [eb5 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [eb6 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 principal evaluation fails +peer1.org2.example.com | [eb7 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003792e00 gate 1602702082980620800 evaluation fails +peer1.org2.example.com | [eb8 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [eb9 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [eba 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ebb 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 gate 1602702082987800600 evaluation starts +peer1.org2.example.com | [ebc 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ebd 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [ebe 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 principal matched by identity 0 +peer1.org2.example.com | [ebf 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [ec0 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [ec1 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ec2 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003793370 gate 1602702082987800600 evaluation succeeds +peer1.org2.example.com | [ec3 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ec4 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ec5 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ec6 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ec7 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ec8 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ec9 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [eca 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ecb 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ecc 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ecd 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ece 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ecf 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 gate 1602702082993828900 evaluation starts +peer1.org2.example.com | [ed0 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ed1 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [ed2 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ed3 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 principal evaluation fails +peer1.org2.example.com | [ed4 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6570 gate 1602702082993828900 evaluation fails +peer1.org2.example.com | [ed5 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ed6 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ed7 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ed8 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 gate 1602702082995224700 evaluation starts +peer1.org2.example.com | [ed9 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [eda 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [edb 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 principal matched by identity 0 +peer1.org2.example.com | [edc 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [edd 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +orderer0.example.com | "2020-10-14 19:02:04.212 UTC [policies] Evaluate -> DEBU 11d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.212 UTC [policies] Evaluate -> DEBU 11da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.212 UTC [cauthdsl] func1 -> DEBU 11db 0xc0012ee6a0 gate 1602702124212492900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.212 UTC [cauthdsl] func2 -> DEBU 11dc 0xc0012ee6a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.212 UTC [cauthdsl] func2 -> DEBU 11dd 0xc0012ee6a0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.213 UTC [cauthdsl] func2 -> DEBU 11de 0xc0012ee6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.213 UTC [cauthdsl] func2 -> DEBU 11df 0xc0012ee6a0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.213 UTC [cauthdsl] func1 -> DEBU 11e0 0xc0012ee6a0 gate 1602702124212492900 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.213 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.213 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.214 UTC [policies] func1 -> DEBU 11e3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e4 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.215 UTC [policies] Evaluate -> DEBU 11e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.215 UTC [policies] Evaluate -> DEBU 11e8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.215 UTC [cauthdsl] func1 -> DEBU 11e9 0xc0012ef390 gate 1602702124215487100 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.215 UTC [cauthdsl] func2 -> DEBU 11ea 0xc0012ef390 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.215 UTC [cauthdsl] func2 -> DEBU 11eb 0xc0012ef390 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.216 UTC [cauthdsl] func2 -> DEBU 11ec 0xc0012ef390 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:04.216 UTC [msp.identity] Verify -> DEBU 11ed Verify: digest = 00000000 45 e5 46 79 10 3c 68 da 86 2a 99 d6 ad 40 34 7b |E.Fy. DEBU 11ee Verify: sig = 00000000 30 45 02 21 00 ee 66 76 9d c2 a5 58 78 67 25 f1 |0E.!..fv...Xxg%.| +orderer0.example.com | 00000010 44 42 93 3d ed 90 5b 6b 07 1e 6e 7c 49 2f c1 01 |DB.=..[k..n|I/..| +orderer0.example.com | 00000020 58 27 d9 91 61 02 20 72 f9 d5 de 03 bf 74 0f 04 |X'..a. r.....t..| +orderer0.example.com | 00000030 1a 22 cd 6d 5f 8f 10 ea 43 02 5c 9c a4 54 5f e8 |.".m_...C.\..T_.| +orderer0.example.com | 00000040 96 33 1b 7a 88 7d 58 |.3.z.}X|" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [cauthdsl] func2 -> DEBU 11ef 0xc0012ef390 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [cauthdsl] func1 -> DEBU 11f0 0xc0012ef390 gate 1602702124215487100 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f3 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.218 UTC [policies] Evaluate -> DEBU 11f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.218 UTC [common.deliver] deliverBlocks -> DEBU 11f7 [channel: businesschannel] Received seekInfo (0xc0012a6680) start: > stop: > from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.218 UTC [fsblkstorage] Next -> DEBU 11f8 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:04.218 UTC [fsblkstorage] newBlockfileStream -> DEBU 11f9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +orderer0.example.com | "2020-10-14 19:02:04.223 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fa Remaining bytes=[4009], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:04.227 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fb Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +orderer0.example.com | "2020-10-14 19:02:04.227 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fc blockbytes [4007] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:04.227 UTC [common.deliver] deliverBlocks -> DEBU 11fd [channel: businesschannel] Delivering block [5] for (0xc0012a6680) for 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.228 UTC [common.deliver] deliverBlocks -> DEBU 11fe [channel: businesschannel] Done delivering to 172.18.0.9:40124 for (0xc0012a6680)" +orderer0.example.com | "2020-10-14 19:02:04.228 UTC [common.deliver] Handle -> DEBU 11ff Waiting for new SeekInfo from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.228 UTC [common.deliver] Handle -> DEBU 1200 Attempting to read seek info message from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.230 UTC [policies] Evaluate -> DEBU 1201 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.230 UTC [policies] Evaluate -> DEBU 1202 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1203 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1204 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1205 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.231 UTC [cauthdsl] func1 -> DEBU 1206 0xc000c8b1d0 gate 1602702124231586900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.231 UTC [cauthdsl] func2 -> DEBU 1207 0xc000c8b1d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 1208 0xc000c8b1d0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 1209 0xc000c8b1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | [cec 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [ced 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [cee 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cef 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf0 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf1 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf2 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf3 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf4 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [cf5 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cf6 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cf7 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cf8 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cf9 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [cfa 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [cfb 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cfc 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [cfd 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cfe 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cff 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d00 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d01 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d02 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 gate 1602702074164126700 evaluation starts +peer0.org1.example.com | [d03 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d04 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [d05 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 principal matched by identity 0 +peer0.org1.example.com | [d06 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer0.org1.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer0.org1.example.com | [d07 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [ede 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [edf 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b6ae0 gate 1602702082995224700 evaluation succeeds +peer1.org2.example.com | [ee0 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ee1 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ee2 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ee3 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ee4 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [ee5 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [ee6 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [ee7 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [ee8 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee9 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [eea 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eeb 10-14 19:01:22.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eec 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [eed 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [eee 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [eef 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ef0 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ef1 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [ef2 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 gate 1602702083001104100 evaluation starts +peer1.org2.example.com | [ef3 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ef4 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [ef5 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ef6 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 principal evaluation fails +peer1.org2.example.com | [ef7 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d4c60 gate 1602702083001104100 evaluation fails +peer1.org2.example.com | [ef8 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ef9 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [efa 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [efb 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 gate 1602702083002483900 evaluation starts +orderer0.example.com | "2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 120a 0xc000c8b1d0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.233 UTC [cauthdsl] func1 -> DEBU 120b 0xc000c8b1d0 gate 1602702124231586900 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.234 UTC [cauthdsl] func1 -> DEBU 120f 0xc0009c8030 gate 1602702124234130400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1210 0xc0009c8030 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1211 0xc0009c8030 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1212 0xc0009c8030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.235 UTC [cauthdsl] func2 -> DEBU 1213 0xc0009c8030 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.235 UTC [cauthdsl] func1 -> DEBU 1214 0xc0009c8030 gate 1602702124234130400 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.235 UTC [policies] Evaluate -> DEBU 1215 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1216 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] func1 -> DEBU 1217 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1218 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1219 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 121a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 121b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.237 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.238 UTC [cauthdsl] func1 -> DEBU 121d 0xc0009c8ee0 gate 1602702124238273600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.238 UTC [cauthdsl] func2 -> DEBU 121e 0xc0009c8ee0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.238 UTC [cauthdsl] func2 -> DEBU 121f 0xc0009c8ee0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.239 UTC [cauthdsl] func2 -> DEBU 1220 0xc0009c8ee0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:04.239 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 67 6d ee 9a 46 c2 1a 09 7f 77 d3 ab 4d 4e 2b e1 |gm..F....w..MN+.| +orderer0.example.com | 00000010 96 14 0f 8e eb ce 79 75 c6 bb aa 8a f5 1d a2 12 |......yu........|" +orderer0.example.com | "2020-10-14 19:02:04.239 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 9e ce 11 d3 0d 93 d5 86 2a 11 7a |0E.!.........*.z| +orderer0.example.com | 00000010 c5 42 e9 42 61 d3 81 4d 2e b0 b3 9d 47 bc e3 d1 |.B.Ba..M....G...| +orderer0.example.com | 00000020 14 3e aa b0 db 02 20 58 4d 24 52 80 f0 63 42 dd |.>.... XM$R..cB.| +orderer0.example.com | 00000030 90 3f 3e 76 16 4f 2f 28 5f ce 96 94 c2 69 40 ab |.?>v.O/(_....i@.| +orderer0.example.com | 00000040 a4 3f 62 10 99 d5 02 |.?b....|" +orderer0.example.com | "2020-10-14 19:02:04.239 UTC [cauthdsl] func2 -> DEBU 1223 0xc0009c8ee0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:04.240 UTC [cauthdsl] func1 -> DEBU 1224 0xc0009c8ee0 gate 1602702124238273600 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.241 UTC [policies] Evaluate -> DEBU 1229 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.241 UTC [policies] Evaluate -> DEBU 122a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.241 UTC [common.deliver] deliverBlocks -> DEBU 122b [channel: businesschannel] Received seekInfo (0xc00132a280) start: > stop: > from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.241 UTC [fsblkstorage] Next -> DEBU 122c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:04.242 UTC [fsblkstorage] newBlockfileStream -> DEBU 122d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +orderer0.example.com | "2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e Remaining bytes=[40748], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122f Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +orderer0.example.com | "2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1230 blockbytes [28172] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:04.243 UTC [common.deliver] deliverBlocks -> DEBU 1231 [channel: businesschannel] Delivering block [2] for (0xc00132a280) for 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.243 UTC [common.deliver] deliverBlocks -> DEBU 1232 [channel: businesschannel] Done delivering to 172.18.0.9:40124 for (0xc00132a280)" +orderer0.example.com | "2020-10-14 19:02:04.243 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.243 UTC [common.deliver] Handle -> DEBU 1234 Attempting to read seek info message from 172.18.0.9:40124" +orderer0.example.com | "2020-10-14 19:02:04.257 UTC [common.deliver] Handle -> WARN 1235 Error reading from 172.18.0.9:40124: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:04.257 UTC [orderer.common.server] func1 -> DEBU 1236 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:04.257 UTC [comm.grpc.server] 1 -> INFO 1237 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40124 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.7313ms +orderer0.example.com | "2020-10-14 19:02:04.259 UTC [grpc] infof -> DEBU 1238 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:04.399 UTC [orderer.common.server] Deliver -> DEBU 1239 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:04.399 UTC [common.deliver] Handle -> DEBU 123a Starting new deliver loop for 172.18.0.9:40126" +orderer0.example.com | "2020-10-14 19:02:04.399 UTC [common.deliver] Handle -> DEBU 123b Attempting to read seek info message from 172.18.0.9:40126" +peer0.org2.example.com | [e37 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e38 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e39 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e3a 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e3b 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e3c 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e3d 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 gate 1602702078657188200 evaluation starts +peer0.org2.example.com | [e3e 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e3f 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [e40 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 principal matched by identity 0 +peer0.org2.example.com | [e41 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [e42 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [e43 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e44 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fe390 gate 1602702078657188200 evaluation succeeds +peer0.org2.example.com | [e45 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e46 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e47 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e48 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e49 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [e4a 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [e4b 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [e4c 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [e4d 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4e 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e4f 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e50 10-14 19:01:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e51 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [e52 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 52 62 ff 12 1f cb 1d c3 2f 9a 31 f9 20 26 c9 |.Rb....../.1. &.| +peer0.org2.example.com | 00000010 2c e8 c0 01 8d a7 7e 5c de f0 04 be 56 12 03 b5 |,.....~\....V...| +peer0.org2.example.com | [e53 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a1 97 92 67 b5 30 2b e7 b4 8e fe |0D. ~...g.0+....| +peer0.org2.example.com | 00000010 64 4f d0 33 e3 81 1d eb 7c 35 a4 06 05 61 a0 a9 |dO.3....|5...a..| +peer0.org2.example.com | 00000020 2e 29 06 b1 02 20 17 ee 7d d0 8a 2f 8c 7b c5 99 |.)... ..}../.{..| +peer0.org2.example.com | 00000030 b8 3b ea 14 6b 57 93 10 01 31 cd 56 3b a8 ec 58 |.;..kW...1.V;..X| +peer0.org2.example.com | 00000040 35 e5 c7 b4 74 ae |5...t.| +peer0.org2.example.com | [e54 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e55 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e56 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.401 UTC [cauthdsl] func1 -> DEBU 1241 0xc000d4e8e0 gate 1602702124401135800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.401 UTC [cauthdsl] func2 -> DEBU 1242 0xc000d4e8e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.401 UTC [cauthdsl] func2 -> DEBU 1243 0xc000d4e8e0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.402 UTC [cauthdsl] func2 -> DEBU 1244 0xc000d4e8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.402 UTC [cauthdsl] func2 -> DEBU 1245 0xc000d4e8e0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.402 UTC [cauthdsl] func1 -> DEBU 1246 0xc000d4e8e0 gate 1602702124401135800 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.402 UTC [policies] Evaluate -> DEBU 1247 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.403 UTC [policies] Evaluate -> DEBU 1248 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.403 UTC [policies] Evaluate -> DEBU 1249 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.403 UTC [cauthdsl] func1 -> DEBU 124a 0xc000d81080 gate 1602702124403894200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124b 0xc000d81080 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124c 0xc000d81080 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124d 0xc000d81080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124e 0xc000d81080 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [cauthdsl] func1 -> DEBU 124f 0xc000d81080 gate 1602702124403894200 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1250 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1251 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [policies] func1 -> DEBU 1252 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1253 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1255 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1256 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1257 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [cauthdsl] func1 -> DEBU 1258 0xc000d81ff0 gate 1602702124406621400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [cauthdsl] func2 -> DEBU 1259 0xc000d81ff0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.406 UTC [cauthdsl] func2 -> DEBU 125a 0xc000d81ff0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.407 UTC [cauthdsl] func2 -> DEBU 125b 0xc000d81ff0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:04.407 UTC [msp.identity] Verify -> DEBU 125c Verify: digest = 00000000 fc a5 8d ed 42 96 b3 6a b7 62 4f b9 13 a9 bd ce |....B..j.bO.....| +orderer0.example.com | 00000010 13 59 82 e4 05 74 9b 80 5e 3e 83 0c ba 8a 2c 26 |.Y...t..^>....,&|" +orderer0.example.com | "2020-10-14 19:02:04.407 UTC [msp.identity] Verify -> DEBU 125d Verify: sig = 00000000 30 45 02 21 00 a4 61 1c 68 bc ef c0 25 20 3d f0 |0E.!..a.h...% =.| +orderer0.example.com | 00000010 5a f4 64 8e 48 b6 b5 c4 c9 e0 51 ad 4c 2b cc 72 |Z.d.H.....Q.L+.r| +orderer0.example.com | 00000020 f1 50 93 2d 9e 02 20 11 7c 21 3b b0 bf 4d ce cb |.P.-.. .|!;..M..| +orderer0.example.com | 00000030 9b 0b e0 9b f3 b8 a7 23 87 2c 63 51 39 74 83 a2 |.......#.,cQ9t..| +orderer0.example.com | 00000040 9e 8f 66 35 3a b1 01 |..f5:..|" +orderer0.example.com | "2020-10-14 19:02:04.408 UTC [cauthdsl] func2 -> DEBU 125e 0xc000d81ff0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:04.408 UTC [cauthdsl] func1 -> DEBU 125f 0xc000d81ff0 gate 1602702124406621400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:04.408 UTC [policies] Evaluate -> DEBU 1260 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.408 UTC [policies] Evaluate -> DEBU 1261 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1262 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1263 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1264 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.409 UTC [common.deliver] deliverBlocks -> DEBU 1266 [channel: businesschannel] Received seekInfo (0xc00132a5c0) start: > stop: > from 172.18.0.9:40126" +orderer0.example.com | "2020-10-14 19:02:04.410 UTC [fsblkstorage] Next -> DEBU 1267 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:04.410 UTC [fsblkstorage] newBlockfileStream -> DEBU 1268 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:04.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1269 Remaining bytes=[97389], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:04.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126a Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:04.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126b blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:04.411 UTC [common.deliver] deliverBlocks -> DEBU 126c [channel: businesschannel] Delivering block [0] for (0xc00132a5c0) for 172.18.0.9:40126" +peer1.org1.example.com | [ccd 10-14 19:01:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [cce 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ccf 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [cd1 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [cd2 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [cd3 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [cd0 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [cd4 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [cd5 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [cd6 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610041801 +peer1.org1.example.com | [cd7 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D1DB0D9A09C45985A25936E6A5D7499DB8EA732041D9FFD9C70B816323023C6B +peer1.org1.example.com | [cd8 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [cd9 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 gate 1602702078345733200 evaluation starts +peer1.org1.example.com | [cda 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [cdb 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [cdc 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 principal matched by identity 0 +peer1.org1.example.com | [cdd 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [cde 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [cdf 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ce0 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ed00 gate 1602702078345733200 evaluation succeeds +peer1.org1.example.com | [ce1 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ce2 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ce3 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ce4 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ce5 10-14 19:01:18.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ce6 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce7 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce8 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ce9 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cea 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [ceb 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cec 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ced 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [cee 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cef 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [cf0 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cf1 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [cf3 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cf4 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-10-14 19:02:04.412 UTC [common.deliver] deliverBlocks -> DEBU 126d [channel: businesschannel] Done delivering to 172.18.0.9:40126 for (0xc00132a5c0)" +orderer0.example.com | "2020-10-14 19:02:04.412 UTC [common.deliver] Handle -> DEBU 126e Waiting for new SeekInfo from 172.18.0.9:40126" +orderer0.example.com | "2020-10-14 19:02:04.412 UTC [common.deliver] Handle -> DEBU 126f Attempting to read seek info message from 172.18.0.9:40126" +orderer0.example.com | "2020-10-14 19:02:04.421 UTC [common.deliver] Handle -> WARN 1270 Error reading from 172.18.0.9:40126: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:04.421 UTC [orderer.common.server] func1 -> DEBU 1271 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:04.421 UTC [comm.grpc.server] 1 -> INFO 1272 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40126 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.6929ms +orderer0.example.com | "2020-10-14 19:02:04.422 UTC [grpc] infof -> DEBU 1273 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:04.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1274 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1275 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-10-14 19:02:04.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1276 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +orderer0.example.com | "2020-10-14 19:02:04.597 UTC [orderer.common.server] Deliver -> DEBU 1277 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:04.597 UTC [common.deliver] Handle -> DEBU 1278 Starting new deliver loop for 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.597 UTC [common.deliver] Handle -> DEBU 1279 Attempting to read seek info message from 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.598 UTC [cauthdsl] func1 -> DEBU 127f 0xc000ccc030 gate 1602702124598965400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1280 0xc000ccc030 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1281 0xc000ccc030 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1282 0xc000ccc030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1283 0xc000ccc030 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.600 UTC [cauthdsl] func1 -> DEBU 1284 0xc000ccc030 gate 1602702124598965400 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1285 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1286 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1287 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.602 UTC [cauthdsl] func1 -> DEBU 1288 0xc000cccb90 gate 1602702124602155300 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.602 UTC [cauthdsl] func2 -> DEBU 1289 0xc000cccb90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.602 UTC [cauthdsl] func2 -> DEBU 128a 0xc000cccb90 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.603 UTC [cauthdsl] func2 -> DEBU 128b 0xc000cccb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.603 UTC [cauthdsl] func2 -> DEBU 128c 0xc000cccb90 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.603 UTC [cauthdsl] func1 -> DEBU 128d 0xc000cccb90 gate 1602702124602155300 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 128e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 128f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.604 UTC [policies] func1 -> DEBU 1290 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 1291 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.606 UTC [cauthdsl] func1 -> DEBU 1296 0xc000ccdab0 gate 1602702124606120200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1297 0xc000ccdab0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1298 0xc000ccdab0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1299 0xc000ccdab0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:04.607 UTC [msp.identity] Verify -> DEBU 129a Verify: digest = 00000000 2d 8e 4e e4 39 25 dd 6d ff 2a 1d 86 9a 81 57 44 |-.N.9%.m.*....WD| +orderer0.example.com | 00000010 8e 71 b4 69 6e 3b 58 82 af 4b 5e 56 4a 32 34 79 |.q.in;X..K^VJ24y|" +orderer0.example.com | "2020-10-14 19:02:04.607 UTC [msp.identity] Verify -> DEBU 129b Verify: sig = 00000000 30 44 02 20 37 db 91 58 94 0d d4 75 49 d3 12 cb |0D. 7..X...uI...| +orderer0.example.com | 00000010 93 22 f6 58 22 01 28 9f 40 6c 77 39 f0 80 27 be |.".X".(.@lw9..'.| +orderer0.example.com | 00000020 be 33 32 1c 02 20 7a 7d e4 7c ce 4e 57 c3 fb 03 |.32.. z}.|.NW...| +orderer0.example.com | 00000030 b3 5c fa fa a4 a5 ba 17 f2 7f f4 96 05 7d b0 01 |.\...........}..| +orderer0.example.com | 00000040 a3 5b 30 ba 89 64 |.[0..d|" +orderer0.example.com | "2020-10-14 19:02:04.607 UTC [cauthdsl] func2 -> DEBU 129c 0xc000ccdab0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [cauthdsl] func1 -> DEBU 129d 0xc000ccdab0 gate 1602702124606120200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 129e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer0.org1.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer0.org1.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer0.org1.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer0.org1.example.com | [d08 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d09 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 gate 1602702074164126700 evaluation succeeds +peer0.org1.example.com | [d0a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d0b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d0c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d0d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d0e 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d0f 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [d10 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d11 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d12 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [d13 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d14 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d15 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d16 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [d17 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d18 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d19 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d1a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d1b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [d1c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [d1d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d1e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [d1f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [d20 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [d21 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d22 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d23 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d24 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d25 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d26 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d27 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [d28 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf6 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [cf2 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cf5 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [cf8 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf9 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [cfc 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cf7 10-14 19:01:18.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cfa 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cfb 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [cfd 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cfe 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [cff 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d00 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [d01 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [d02 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d03 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [d04 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [d05 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d06 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d07 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161019 +peer1.org1.example.com | [d08 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 45FC8B3FC88496DF9997400E6A9B26D52F7C31E1D2CB6861D5B9E64E13602D50 +peer1.org1.example.com | [d09 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d0a 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [d0b 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.609 UTC [policies] Evaluate -> DEBU 12a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.609 UTC [common.deliver] deliverBlocks -> DEBU 12a4 [channel: businesschannel] Received seekInfo (0xc00132aa00) start: > stop: > from 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.609 UTC [fsblkstorage] Next -> DEBU 12a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:04.609 UTC [fsblkstorage] newBlockfileStream -> DEBU 12a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +orderer0.example.com | "2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a7 Remaining bytes=[68915], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a8 Returning blockbytes - length=[28164], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +orderer0.example.com | "2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a9 blockbytes [28164] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:04.610 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Delivering block [1] for (0xc00132aa00) for 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.611 UTC [common.deliver] deliverBlocks -> DEBU 12ab [channel: businesschannel] Done delivering to 172.18.0.9:40128 for (0xc00132aa00)" +orderer0.example.com | "2020-10-14 19:02:04.612 UTC [common.deliver] Handle -> DEBU 12ac Waiting for new SeekInfo from 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.612 UTC [common.deliver] Handle -> DEBU 12ad Attempting to read seek info message from 172.18.0.9:40128" +orderer0.example.com | "2020-10-14 19:02:04.620 UTC [common.deliver] Handle -> WARN 12ae Error reading from 172.18.0.9:40128: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:04.621 UTC [orderer.common.server] func1 -> DEBU 12b0 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:04.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b2 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-10-14 19:02:04.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b3 Sending msg of 28 bytes to 3 on channel businesschannel took 81.6µs" +orderer0.example.com | "2020-10-14 19:02:04.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.7µs " +orderer0.example.com | "2020-10-14 19:02:04.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +orderer0.example.com | "2020-10-14 19:02:04.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:04.622 UTC [comm.grpc.server] 1 -> INFO 12b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40128 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1538ms +orderer0.example.com | "2020-10-14 19:02:04.621 UTC [grpc] infof -> DEBU 12af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:04.805 UTC [orderer.common.server] Deliver -> DEBU 12b8 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:04.805 UTC [common.deliver] Handle -> DEBU 12b9 Starting new deliver loop for 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.805 UTC [common.deliver] Handle -> DEBU 12ba Attempting to read seek info message from 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.807 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.807 UTC [cauthdsl] func1 -> DEBU 12c0 0xc0003db140 gate 1602702124807332600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c1 0xc0003db140 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c2 0xc0003db140 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003db140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.808 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003db140 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.808 UTC [cauthdsl] func1 -> DEBU 12c5 0xc0003db140 gate 1602702124807332600 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.808 UTC [policies] Evaluate -> DEBU 12c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [policies] Evaluate -> DEBU 12c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003dbe10 gate 1602702124809159200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12ca 0xc0003dbe10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12cb 0xc0003dbe10 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12cc 0xc0003dbe10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [cauthdsl] func2 -> DEBU 12cd 0xc0003dbe10 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [cauthdsl] func1 -> DEBU 12ce 0xc0003dbe10 gate 1602702124809159200 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12cf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [policies] func1 -> DEBU 12d1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12d2 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [cauthdsl] func1 -> DEBU 12d7 0xc00004ec80 gate 1602702124811471000 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00004ec80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:04.811 UTC [cauthdsl] func2 -> DEBU 12d9 0xc00004ec80 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:04.812 UTC [cauthdsl] func2 -> DEBU 12da 0xc00004ec80 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:04.812 UTC [msp.identity] Verify -> DEBU 12db Verify: digest = 00000000 d9 ec ad d4 fb 06 bf 53 5c cb b4 59 a3 1d 9c 43 |.......S\..Y...C| +orderer0.example.com | 00000010 59 45 af d8 c3 4f 88 dc e4 cc ec d7 07 5d 77 c2 |YE...O.......]w.|" +orderer0.example.com | "2020-10-14 19:02:04.812 UTC [msp.identity] Verify -> DEBU 12dc Verify: sig = 00000000 30 44 02 20 6e 9d 90 11 63 9a e0 ea 7c 7c a9 2c |0D. n...c...||.,| +orderer0.example.com | 00000010 e0 f4 c6 63 a8 7e e4 77 c3 fb 4e bf e7 35 ef f9 |...c.~.w..N..5..| +orderer0.example.com | 00000020 ff 1b 8f f9 02 20 53 2f 04 50 df 30 22 13 81 97 |..... S/.P.0"...| +orderer0.example.com | 00000030 97 cb 12 26 e7 6f e6 b0 f5 ef cf 57 f7 40 e9 03 |...&.o.....W.@..| +orderer0.example.com | 00000040 22 58 34 01 f0 4b |"X4..K|" +orderer0.example.com | "2020-10-14 19:02:04.812 UTC [cauthdsl] func2 -> DEBU 12dd 0xc00004ec80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:04.812 UTC [cauthdsl] func1 -> DEBU 12de 0xc00004ec80 gate 1602702124811471000 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12df Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e1 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e3 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.814 UTC [policies] Evaluate -> DEBU 12e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:04.814 UTC [common.deliver] deliverBlocks -> DEBU 12e5 [channel: businesschannel] Received seekInfo (0xc000cb0b00) start: > stop: > from 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.814 UTC [fsblkstorage] Next -> DEBU 12e6 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:04.814 UTC [fsblkstorage] newBlockfileStream -> DEBU 12e7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +orderer0.example.com | "2020-10-14 19:02:04.814 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e8 Remaining bytes=[40748], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:04.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e9 Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +orderer0.example.com | "2020-10-14 19:02:04.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ea blockbytes [28172] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:04.815 UTC [common.deliver] deliverBlocks -> DEBU 12eb [channel: businesschannel] Delivering block [2] for (0xc000cb0b00) for 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.816 UTC [common.deliver] deliverBlocks -> DEBU 12ec [channel: businesschannel] Done delivering to 172.18.0.9:40130 for (0xc000cb0b00)" +orderer0.example.com | "2020-10-14 19:02:04.816 UTC [common.deliver] Handle -> DEBU 12ed Waiting for new SeekInfo from 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.816 UTC [common.deliver] Handle -> DEBU 12ee Attempting to read seek info message from 172.18.0.9:40130" +orderer0.example.com | "2020-10-14 19:02:04.824 UTC [common.deliver] Handle -> WARN 12ef Error reading from 172.18.0.9:40130: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:04.824 UTC [grpc] infof -> DEBU 12f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:04.824 UTC [orderer.common.server] func1 -> DEBU 12f1 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:04.824 UTC [comm.grpc.server] 1 -> INFO 12f2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40130 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.4216ms +orderer0.example.com | "2020-10-14 19:02:05.007 UTC [orderer.common.server] Deliver -> DEBU 12f3 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:05.008 UTC [common.deliver] Handle -> DEBU 12f4 Starting new deliver loop for 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.009 UTC [common.deliver] Handle -> DEBU 12f5 Attempting to read seek info message from 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.011 UTC [cauthdsl] func1 -> DEBU 12fb 0xc0002ac040 gate 1602702125011020900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fc 0xc0002ac040 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fd 0xc0002ac040 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fe 0xc0002ac040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.012 UTC [cauthdsl] func2 -> DEBU 12ff 0xc0002ac040 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.012 UTC [cauthdsl] func1 -> DEBU 1300 0xc0002ac040 gate 1602702125011020900 evaluation fails" +peer1.org1.example.com | [d0c 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d0d 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d0e 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d0f 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [d10 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d11 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d12 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [d13 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d14 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d15 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [d16 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d17 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d18 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d19 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d1a 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [d1b 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [d1c 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d1d 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d1e 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e57 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [e58 10-14 19:01:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [e59 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5a 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5b 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e5c 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e5d 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5e 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5f 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [e60 10-14 19:01:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e61 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e62 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161013 +peer0.org2.example.com | [e63 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 78532DA9C162A6DACEFF814B775C1D2A9E671EDABF596BB6B65F0FF784FF8B61 +peer0.org2.example.com | [e64 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e65 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [e66 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [e67 10-14 19:01:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [e68 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e69 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e6a 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e6b 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [e6c 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e6d 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6e 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [e6f 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e70 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e72 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e71 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [e73 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e74 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e75 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e76 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e77 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e78 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [e79 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fe 91 fe 25 81 61 1b 0d 27 ca d9 26 40 dd c0 |\...%.a..'..&@..| +peer0.org2.example.com | 00000010 b6 8e 07 d7 12 1c a3 60 d3 99 89 d0 a1 3f a8 1e |.......`.....?..| +peer0.org2.example.com | [e7a 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 f1 a2 60 87 53 92 03 5e 85 01 |0E.!....`.S..^..| +peer0.org2.example.com | 00000010 4a 00 5b 6a bb c8 28 67 11 ca 2b 7c e8 89 5b 43 |J.[j..(g..+|..[C| +peer0.org2.example.com | 00000020 39 2e 4f 75 98 02 20 22 78 44 ea 40 06 52 73 8d |9.Ou.. "xD.@.Rs.| +peer0.org2.example.com | 00000030 cb 65 a9 80 06 03 94 0f 2c 87 6b 8a 95 46 ec c8 |.e......,.k..F..| +peer0.org2.example.com | 00000040 ce 56 20 8f b7 fa 0d |.V ....| +orderer0.example.com | "2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1301 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1303 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func1 -> DEBU 1304 0xc0002ad190 gate 1602702125013066000 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1305 0xc0002ad190 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1306 0xc0002ad190 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1307 0xc0002ad190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1308 0xc0002ad190 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.013 UTC [cauthdsl] func1 -> DEBU 1309 0xc0002ad190 gate 1602702125013066000 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.014 UTC [policies] func1 -> DEBU 130c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 130e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 130f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 1310 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.016 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.016 UTC [cauthdsl] func1 -> DEBU 1312 0xc0001b4ce0 gate 1602702125016260200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.016 UTC [cauthdsl] func2 -> DEBU 1313 0xc0001b4ce0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.016 UTC [cauthdsl] func2 -> DEBU 1314 0xc0001b4ce0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.018 UTC [cauthdsl] func2 -> DEBU 1315 0xc0001b4ce0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:05.019 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 21 91 21 1f 06 2b dd 19 e5 8d 2b 2c 9f 2b 96 ed |!.!..+....+,.+..| +orderer0.example.com | 00000010 37 46 74 8f 48 5d 87 28 8e 0a 40 1e 22 f1 20 80 |7Ft.H].(..@.". .|" +orderer0.example.com | "2020-10-14 19:02:05.019 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 45 02 21 00 db 92 75 18 d5 05 68 78 0d 5c 3c |0E.!...u...hx.\<| +orderer0.example.com | 00000010 57 36 15 3b 24 c9 f7 00 7b b3 8c 6e 9a e3 ec 7c |W6.;$...{..n...|| +orderer0.example.com | 00000020 9d 0e ed be ce 02 20 17 bf f4 56 70 d3 4c 6e 36 |...... ...Vp.Ln6| +orderer0.example.com | 00000030 93 dc 81 d8 66 cb 9b 83 0e 39 0e be 15 cf ac fa |....f....9......| +orderer0.example.com | 00000040 de fa 8a 0a 78 e1 10 |....x..|" +orderer0.example.com | "2020-10-14 19:02:05.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1318 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:05.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +orderer0.example.com | "2020-10-14 19:02:05.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +orderer0.example.com | "2020-10-14 19:02:05.020 UTC [cauthdsl] func2 -> DEBU 1319 0xc0001b4ce0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:05.021 UTC [cauthdsl] func1 -> DEBU 131c 0xc0001b4ce0 gate 1602702125016260200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:05.021 UTC [policies] Evaluate -> DEBU 131d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 131f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 1320 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.023 UTC [policies] Evaluate -> DEBU 1321 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.023 UTC [policies] Evaluate -> DEBU 1322 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.023 UTC [common.deliver] deliverBlocks -> DEBU 1323 [channel: businesschannel] Received seekInfo (0xc00132b200) start: > stop: > from 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.023 UTC [fsblkstorage] Next -> DEBU 1324 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:05.024 UTC [fsblkstorage] newBlockfileStream -> DEBU 1325 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84816]" +orderer0.example.com | "2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1326 Remaining bytes=[12573], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1327 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84816], bytesOffset=[84818]}" +orderer0.example.com | "2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1328 blockbytes [4550] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:05.025 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: businesschannel] Delivering block [3] for (0xc00132b200) for 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.025 UTC [common.deliver] deliverBlocks -> DEBU 132a [channel: businesschannel] Done delivering to 172.18.0.9:40132 for (0xc00132b200)" +orderer0.example.com | "2020-10-14 19:02:05.026 UTC [common.deliver] Handle -> DEBU 132b Waiting for new SeekInfo from 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.026 UTC [common.deliver] Handle -> DEBU 132c Attempting to read seek info message from 172.18.0.9:40132" +orderer0.example.com | "2020-10-14 19:02:05.032 UTC [common.deliver] Handle -> WARN 132d Error reading from 172.18.0.9:40132: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:05.033 UTC [orderer.common.server] func1 -> DEBU 132f Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:05.033 UTC [comm.grpc.server] 1 -> INFO 1330 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40132 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.5752ms +peer1.org1.example.com | [d1f 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d20 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d21 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d22 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d23 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 gate 1602702078437157600 evaluation starts +peer1.org1.example.com | [d24 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d25 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [d26 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 principal matched by identity 0 +peer1.org1.example.com | [d27 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer1.org1.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer1.org1.example.com | [d28 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer1.org1.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer1.org1.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer1.org1.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer1.org1.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer1.org1.example.com | [d29 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [d2a 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [d2b 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d2c 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9a050 gate 1602702078437157600 evaluation succeeds +peer1.org1.example.com | [d2d 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d2e 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d2f 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d30 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d31 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d32 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d33 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [d34 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer1.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer1.org1.example.com | [d35 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer1.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer1.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer1.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer1.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer1.org1.example.com | [d36 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d37 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d38 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d39 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3a 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [d3b 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [d3c 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d3d 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer1.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer1.org1.example.com | [d3e 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer1.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer1.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +orderer0.example.com | "2020-10-14 19:02:05.033 UTC [grpc] infof -> DEBU 132e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:05.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1331 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2020-10-14 19:02:05.129 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1332 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2020-10-14 19:02:05.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1333 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174µs " +orderer0.example.com | "2020-10-14 19:02:05.130 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1334 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.5µs " +orderer0.example.com | "2020-10-14 19:02:05.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1335 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:05.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1336 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:05.268 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:05.269 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.269 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.271 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.273 UTC [cauthdsl] func1 -> DEBU 133f 0xc0003626d0 gate 1602702125273228700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1340 0xc0003626d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1341 0xc0003626d0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1342 0xc0003626d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [cauthdsl] func2 -> DEBU 1343 0xc0003626d0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [cauthdsl] func1 -> DEBU 1344 0xc0003626d0 gate 1602702125273228700 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1345 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1346 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.274 UTC [cauthdsl] func1 -> DEBU 1348 0xc000362fe0 gate 1602702125274882200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 1349 0xc000362fe0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134a 0xc000362fe0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134b 0xc000362fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134c 0xc000362fe0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.275 UTC [cauthdsl] func1 -> DEBU 134d 0xc000362fe0 gate 1602702125274882200 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 134e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 134f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.276 UTC [policies] func1 -> DEBU 1350 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 1351 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 1352 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.277 UTC [policies] Evaluate -> DEBU 1353 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.277 UTC [policies] Evaluate -> DEBU 1354 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.278 UTC [policies] Evaluate -> DEBU 1355 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.278 UTC [cauthdsl] func1 -> DEBU 1356 0xc000363cd0 gate 1602702125278178400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1357 0xc000363cd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1358 0xc000363cd0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1359 0xc000363cd0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:05.279 UTC [msp.identity] Verify -> DEBU 135a Verify: digest = 00000000 c5 91 88 57 83 e7 1b df 9c fc 6e 4e 1b ed 13 a2 |...W......nN....| +orderer0.example.com | 00000010 d3 92 c4 0f b2 d2 44 e7 e4 b4 82 44 0b 07 50 76 |......D....D..Pv|" +orderer0.example.com | "2020-10-14 19:02:05.279 UTC [msp.identity] Verify -> DEBU 135b Verify: sig = 00000000 30 44 02 20 73 d4 5a 2f 50 e2 52 ea e9 36 e4 14 |0D. s.Z/P.R..6..| +orderer0.example.com | 00000010 43 0b 55 48 15 e0 c2 59 2d 4d ed 33 b6 77 b9 af |C.UH...Y-M.3.w..| +orderer0.example.com | 00000020 eb c6 ab 1a 02 20 73 91 ec 8d 0c 5e be 2b 6e 1c |..... s....^.+n.| +orderer0.example.com | 00000030 62 2c c9 f0 52 d4 d7 4d fb 29 26 74 fc 86 9f 3b |b,..R..M.)&t...;| +orderer0.example.com | 00000040 6f 00 71 0f 50 3d |o.q.P=|" +orderer0.example.com | "2020-10-14 19:02:05.279 UTC [cauthdsl] func2 -> DEBU 135c 0xc000363cd0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:05.279 UTC [cauthdsl] func1 -> DEBU 135d 0xc000363cd0 gate 1602702125278178400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:05.279 UTC [policies] Evaluate -> DEBU 135e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1360 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [d29 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2a 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2b 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d2c 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d2d 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [d2e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d2f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d30 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d31 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d32 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d33 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d34 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d35 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 gate 1602702074287536200 evaluation starts +peer0.org1.example.com | [d36 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d37 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [d38 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 principal matched by identity 0 +peer0.org1.example.com | [d39 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +peer0.org1.example.com | 00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +peer0.org1.example.com | [d3a 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +peer0.org1.example.com | 00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +peer0.org1.example.com | 00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +peer1.org2.example.com | [efc 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [efd 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [efe 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 principal matched by identity 0 +peer1.org2.example.com | [eff 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [f00 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [f01 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f02 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d51d0 gate 1602702083002483900 evaluation succeeds +peer1.org2.example.com | [f03 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f04 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f05 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f06 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f07 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f08 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f09 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f0a 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f0b 10-14 19:01:23.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f0c 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f0d 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f0e 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f0f 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 gate 1602702083011754600 evaluation starts +peer1.org2.example.com | [f10 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f11 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [f12 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f13 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 principal evaluation fails +peer1.org2.example.com | [f14 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f23d0 gate 1602702083011754600 evaluation fails +peer1.org2.example.com | [f15 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f16 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f17 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f18 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 gate 1602702083013819400 evaluation starts +peer1.org2.example.com | [f19 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f1a 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [f1b 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 principal matched by identity 0 +peer1.org2.example.com | [f1c 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [f1d 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [f1e 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f1f 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f2940 gate 1602702083013819400 evaluation succeeds +peer1.org2.example.com | [f20 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f21 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f22 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f23 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f24 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [f25 10-14 19:01:23.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [f26 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [f27 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [f28 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f29 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [f2a 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [f2b 10-14 19:01:23.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f2c 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [f2d 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [f2e 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [f2f 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610051801 +peer1.org2.example.com | [f30 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88BCBF38BA39A9EB5DDB48F31086C05EEA0B20E5121C7C9F927D2EF3C28EE2AE +peer1.org2.example.com | [f31 10-14 19:01:23.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [f32 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f33 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f34 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f35 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f36 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f37 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f38 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f39 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [f3a 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f3b 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f3c 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f3d 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f3e 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f3f 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [f40 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8b df ea 54 a6 bb 22 09 a9 13 89 fd e0 61 06 |....T.."......a.| +peer1.org2.example.com | 00000010 c4 c2 e7 26 61 00 c4 f8 48 8d 3c 11 6d d7 d2 18 |...&a...H.<.m...| +peer0.org1.example.com | 00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +peer0.org1.example.com | 00000040 a5 3c 20 be c1 72 dc |.< ..r.| +peer0.org1.example.com | [d3b 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [d3c 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 gate 1602702074287536200 evaluation succeeds +peer0.org1.example.com | [d3d 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d40 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d41 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [d42 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [d43 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d44 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d45 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [d46 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d47 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d48 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d49 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [d4a 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4b 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4c 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4d 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d4e 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:5\350\245< \276\301r\334" > alive: +peer0.org1.example.com | [d4f 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [d50 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d51 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [d52 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d53 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d54 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d55 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [d56 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [d57 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [d58 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d59 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d5a 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1361 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1362 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1363 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.281 UTC [common.deliver] deliverBlocks -> DEBU 1364 [channel: businesschannel] Received seekInfo (0xc00132b900) start: > stop: > from 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.281 UTC [fsblkstorage] Next -> DEBU 1365 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:05.281 UTC [fsblkstorage] newBlockfileStream -> DEBU 1366 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89368]" +orderer0.example.com | "2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1367 Remaining bytes=[8021], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1368 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89368], bytesOffset=[89370]}" +orderer0.example.com | "2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1369 blockbytes [4010] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:05.283 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: businesschannel] Delivering block [4] for (0xc00132b900) for 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.283 UTC [common.deliver] deliverBlocks -> DEBU 136b [channel: businesschannel] Done delivering to 172.18.0.9:40134 for (0xc00132b900)" +orderer0.example.com | "2020-10-14 19:02:05.285 UTC [common.deliver] Handle -> DEBU 136c Waiting for new SeekInfo from 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.285 UTC [common.deliver] Handle -> DEBU 136d Attempting to read seek info message from 172.18.0.9:40134" +orderer0.example.com | "2020-10-14 19:02:05.295 UTC [common.deliver] Handle -> WARN 136e Error reading from 172.18.0.9:40134: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:05.297 UTC [orderer.common.server] func1 -> DEBU 1370 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:05.297 UTC [comm.grpc.server] 1 -> INFO 1371 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40134 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6387ms +orderer0.example.com | "2020-10-14 19:02:05.296 UTC [grpc] infof -> DEBU 136f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:05.507 UTC [orderer.common.server] Deliver -> DEBU 1372 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:05.507 UTC [common.deliver] Handle -> DEBU 1373 Starting new deliver loop for 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.508 UTC [common.deliver] Handle -> DEBU 1374 Attempting to read seek info message from 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.508 UTC [policies] Evaluate -> DEBU 1375 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1376 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1377 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1378 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.510 UTC [cauthdsl] func1 -> DEBU 137a 0xc000541fd0 gate 1602702125510303600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.510 UTC [cauthdsl] func2 -> DEBU 137b 0xc000541fd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.510 UTC [cauthdsl] func2 -> DEBU 137c 0xc000541fd0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.511 UTC [cauthdsl] func2 -> DEBU 137d 0xc000541fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.511 UTC [cauthdsl] func2 -> DEBU 137e 0xc000541fd0 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.511 UTC [cauthdsl] func1 -> DEBU 137f 0xc000541fd0 gate 1602702125510303600 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.511 UTC [policies] Evaluate -> DEBU 1380 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.512 UTC [policies] Evaluate -> DEBU 1381 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.512 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.512 UTC [cauthdsl] func1 -> DEBU 1383 0xc000554a70 gate 1602702125512531800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.512 UTC [cauthdsl] func2 -> DEBU 1384 0xc000554a70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1385 0xc000554a70 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1386 0xc000554a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1387 0xc000554a70 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.513 UTC [cauthdsl] func1 -> DEBU 1388 0xc000554a70 gate 1602702125512531800 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:05.514 UTC [policies] Evaluate -> DEBU 1389 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.514 UTC [policies] Evaluate -> DEBU 138a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:05.514 UTC [policies] func1 -> DEBU 138b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.516 UTC [policies] Evaluate -> DEBU 138f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.516 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.518 UTC [cauthdsl] func1 -> DEBU 1392 0xc000555a00 gate 1602702125518070200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.519 UTC [cauthdsl] func2 -> DEBU 1393 0xc000555a00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1391 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [d5b 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [d5c 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d5d 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [d5e 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d5f 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [d60 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [d61 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +peer0.org1.example.com | 00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +peer0.org1.example.com | [d62 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +peer0.org1.example.com | 00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +peer0.org1.example.com | 00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +peer0.org1.example.com | 00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +peer0.org1.example.com | 00000040 a9 45 ea e8 63 24 |.E..c$| +peer0.org1.example.com | [d63 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [d64 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 22 35 72 4f fe 0a 9e 19 ef 33 53 |0D. T"5rO.....3S| +peer0.org1.example.com | 00000010 44 f3 f6 7a 71 4c 82 31 ce 1e 97 1a 17 1f 2a 6e |D..zqL.1......*n| +peer0.org1.example.com | 00000020 a4 b1 43 bf 02 20 18 14 9c 2b 99 34 f1 f8 40 00 |..C.. ...+.4..@.| +peer0.org1.example.com | 00000030 4f e4 be 28 06 50 ed d5 97 d8 6e 56 f4 31 5b 8b |O..(.P....nV.1[.| +peer0.org1.example.com | 00000040 ea 78 40 f1 bf 4b |.x@..K| +peer0.org1.example.com | [d65 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [d66 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [d67 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [d68 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [d69 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [d6a 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d6b 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d6c 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d6d 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [d6e 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d6f 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d70 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e7b 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e7c 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [e7d 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e7e 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e7f 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e80 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e81 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e82 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e83 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e84 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e85 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e86 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [e87 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e88 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [e89 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e8a 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e8b 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e8c 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e8d 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e8e 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e8f 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e90 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e91 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e92 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e93 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e94 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e95 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e96 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e97 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [e98 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [e99 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d71 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [d72 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [d73 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d74 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [d75 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d76 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [d77 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d78 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [d79 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d7a 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [d7b 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d7c 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [d7d 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d7e 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [d7f 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d80 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [d82 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [d83 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [d84 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d81 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [d85 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [d86 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [d87 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d88 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [d89 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161013 +peer0.org1.example.com | [d8a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 60D636B51EF43016D027BE3249580B44A7074DB1464612F02862B9C2E7F9A8E8 +peer0.org1.example.com | [d8b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [d8c 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [d8d 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [d8e 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d8f 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d90 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d91 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d92 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d93 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d94 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d95 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [d96 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d97 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [d98 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d99 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer0.org1.example.com | [d9a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer0.org1.example.com | [d9b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d9c 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer0.org1.example.com | [d9d 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [d9e 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d9f 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [da0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [da1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [da2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [da3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [da4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [da5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 gate 1602702074610726300 evaluation starts +peer0.org1.example.com | [da6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [da7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [da8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 principal matched by identity 0 +peer0.org1.example.com | [da9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +peer0.org1.example.com | 00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +peer0.org1.example.com | [daa 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +peer1.org2.example.com | [f41 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 45 05 fc ae 4f cc a6 43 49 71 |0E.!..E...O..CIq| +peer1.org2.example.com | 00000010 9e f8 de 5c 99 b4 5f c7 df de cd 44 6c 34 c2 16 |...\.._....Dl4..| +peer1.org2.example.com | 00000020 2b 26 c7 76 40 02 20 7e f2 87 1a 5a ae ae f3 77 |+&.v@. ~...Z...w| +peer1.org2.example.com | 00000030 34 37 75 02 a4 97 1a 64 6a d3 6e 98 28 a6 63 9e |47u....dj.n.(.c.| +peer1.org2.example.com | 00000040 04 62 ab 88 93 cf 2f |.b..../| +peer1.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer1.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer1.org1.example.com | [d3f 10-14 19:01:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [d41 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 74 dc 00 fd a7 40 4e 8c 83 0e 8d |0D. .t....@N....| +peer1.org1.example.com | 00000010 64 51 be 70 fa a4 67 10 12 c3 7a f4 1d ac b7 23 |dQ.p..g...z....#| +peer1.org1.example.com | 00000020 d2 f9 30 7d 02 20 52 bd ad c0 40 23 5c a1 81 26 |..0}. R...@#\..&| +peer1.org1.example.com | 00000030 ae 5b 30 46 fa 3b fb 92 04 92 63 72 a8 30 40 2c |.[0F.;....cr.0@,| +peer1.org1.example.com | 00000040 3b 1c 10 e5 08 52 |;....R| +peer1.org1.example.com | [d40 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [d42 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [d43 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [d44 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d45 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d46 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [d47 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [d48 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d49 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d4b 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d4c 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d4d 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d4e 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d4a 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d4f 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d50 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 gate 1602702078456006200 evaluation starts +peer1.org1.example.com | [d51 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d52 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [d53 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 principal matched by identity 0 +peer1.org1.example.com | [d54 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org1.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org1.example.com | [d55 10-14 19:01:18.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org1.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org1.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org1.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org1.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org1.example.com | [d56 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d57 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003abb0f0 gate 1602702078456006200 evaluation succeeds +peer1.org1.example.com | [d58 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d59 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:05.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1394 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2020-10-14 19:02:05.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1395 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.5µs " +orderer0.example.com | "2020-10-14 19:02:05.519 UTC [cauthdsl] func2 -> DEBU 1396 0xc000555a00 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.522 UTC [cauthdsl] func2 -> DEBU 1397 0xc000555a00 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:05.522 UTC [msp.identity] Verify -> DEBU 1398 Verify: digest = 00000000 fb 50 23 26 db 77 7b 92 01 e5 45 4f e8 5c e9 b8 |.P#&.w{...EO.\..| +orderer0.example.com | 00000010 86 fa bd 7c 91 8d 2c 58 0e 2d 67 42 3e e0 2a f9 |...|..,X.-gB>.*.|" +orderer0.example.com | "2020-10-14 19:02:05.523 UTC [msp.identity] Verify -> DEBU 1399 Verify: sig = 00000000 30 44 02 20 08 1d 93 b3 0c 11 70 9d 31 fe 20 bb |0D. ......p.1. .| +orderer0.example.com | 00000010 57 ed 2a 97 9e b0 7a 64 20 3e 9a 2e 3e 8f 84 2e |W.*...zd >..>...| +orderer0.example.com | 00000020 a3 28 8c ba 02 20 22 57 0b c5 04 bd 20 4c 19 36 |.(... "W.... L.6| +orderer0.example.com | 00000030 85 5f 85 e7 70 ab be 6c cd 76 64 d4 a9 0e d6 c9 |._..p..l.vd.....| +orderer0.example.com | 00000040 6a 98 d9 09 75 77 |j...uw|" +orderer0.example.com | "2020-10-14 19:02:05.523 UTC [cauthdsl] func2 -> DEBU 139a 0xc000555a00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:05.523 UTC [cauthdsl] func1 -> DEBU 139b 0xc000555a00 gate 1602702125518070200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:05.523 UTC [policies] Evaluate -> DEBU 139c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.523 UTC [policies] Evaluate -> DEBU 139d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 139e Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 139f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 13a0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 13a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [common.deliver] deliverBlocks -> DEBU 13a2 [channel: businesschannel] Received seekInfo (0xc000d2a000) start: > stop: > from 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.524 UTC [fsblkstorage] Next -> DEBU 13a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-10-14 19:02:05.525 UTC [fsblkstorage] newBlockfileStream -> DEBU 13a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +orderer0.example.com | "2020-10-14 19:02:05.525 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a5 Remaining bytes=[4009], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:05.525 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a6 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +orderer0.example.com | "2020-10-14 19:02:05.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a7 blockbytes [4007] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:05.526 UTC [common.deliver] deliverBlocks -> DEBU 13a8 [channel: businesschannel] Delivering block [5] for (0xc000d2a000) for 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.526 UTC [common.deliver] deliverBlocks -> DEBU 13a9 [channel: businesschannel] Done delivering to 172.18.0.9:40136 for (0xc000d2a000)" +orderer0.example.com | "2020-10-14 19:02:05.527 UTC [common.deliver] Handle -> DEBU 13aa Waiting for new SeekInfo from 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.527 UTC [common.deliver] Handle -> DEBU 13ab Attempting to read seek info message from 172.18.0.9:40136" +orderer0.example.com | "2020-10-14 19:02:05.534 UTC [common.deliver] Handle -> WARN 13ac Error reading from 172.18.0.9:40136: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:05.534 UTC [orderer.common.server] func1 -> DEBU 13ad Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:05.534 UTC [comm.grpc.server] 1 -> INFO 13ae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40136 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3998ms +orderer0.example.com | "2020-10-14 19:02:05.534 UTC [grpc] infof -> DEBU 13af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:05.626 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b0 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2020-10-14 19:02:05.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b2 Sending msg of 28 bytes to 3 on channel businesschannel took 75.1µs" +orderer0.example.com | "2020-10-14 19:02:05.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2020-10-14 19:02:05.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.9µs " +orderer0.example.com | "2020-10-14 19:02:05.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:05.630 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:05.771 UTC [orderer.common.server] Deliver -> DEBU 13b6 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:05.772 UTC [common.deliver] Handle -> DEBU 13b7 Starting new deliver loop for 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.772 UTC [common.deliver] Handle -> DEBU 13b8 Attempting to read seek info message from 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.774 UTC [policies] Evaluate -> DEBU 13bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:05.774 UTC [policies] Evaluate -> DEBU 13bd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:05.775 UTC [msp] DeserializeIdentity -> DEBU 13be Obtaining identity" +orderer0.example.com | "2020-10-14 19:02:05.776 UTC [msp.identity] newIdentity -> DEBU 13bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +peer0.org2.example.com | [e9a 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e9b 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e9c 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e9d 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e9e 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e9f 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ea0 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 gate 1602702080423370800 evaluation starts +peer0.org2.example.com | [ea1 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ea2 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [ea3 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 principal matched by identity 0 +peer0.org2.example.com | [ea4 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 98 6a 73 ad 11 1f 61 55 7b a4 8d 05 12 40 98 |&.js...aU{....@.| +peer0.org2.example.com | 00000010 a1 1b 7b f7 97 22 e0 a8 26 ed 5c e3 ee 97 06 a1 |..{.."..&.\.....| +peer0.org2.example.com | [ea5 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 ae 61 d1 8e 26 59 34 d1 33 53 |0E.!...a..&Y4.3S| +peer0.org2.example.com | 00000010 ef de 72 88 57 64 62 c9 1d 36 2f 0d a3 cc a1 c4 |..r.Wdb..6/.....| +peer0.org2.example.com | 00000020 fa 5c 7a 27 ce 02 20 0d 41 38 b4 35 b4 ce 7c ec |.\z'.. .A8.5..|.| +peer0.org2.example.com | 00000030 0e 6b e9 ff c0 31 53 18 6d bd 2c 51 ed 6d 35 f5 |.k...1S.m.,Q.m5.| +peer0.org2.example.com | 00000040 2a d3 02 53 28 96 e7 |*..S(..| +peer0.org2.example.com | [ea6 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ea7 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003929d30 gate 1602702080423370800 evaluation succeeds +peer0.org2.example.com | [ea8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ea9 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [eaa 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [eab 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [eac 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ead 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [eae 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [eaf 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [eb0 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [eb1 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb2 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb3 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb4 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [eb5 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb6 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [eb7 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb8 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eb9 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eba 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ebb 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d5a 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d5b 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d5c 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d5d 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d5e 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [d5f 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer1.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer1.org1.example.com | [d60 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer1.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer1.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer1.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer1.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer1.org1.example.com | [d61 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d62 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d63 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d64 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [d65 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d66 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d67 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d68 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d69 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d6a 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d6b 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d6c 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 gate 1602702078465597700 evaluation starts +peer1.org1.example.com | [d6d 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d6e 10-14 19:01:18.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [d6f 10-14 19:01:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 principal matched by identity 0 +peer1.org1.example.com | [d70 10-14 19:01:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 c5 71 33 78 22 52 e5 c4 d9 dc bd 25 69 5d d6 |..q3x"R.....%i].| +peer1.org1.example.com | 00000010 22 71 df 0f 19 d7 14 4d 8f 83 16 2d fe 7e 57 fc |"q.....M...-.~W.| +peer1.org1.example.com | [d71 10-14 19:01:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 cc 1d 62 d3 47 ee 80 4c 95 71 33 |0D. ...b.G..L.q3| +peer1.org1.example.com | 00000010 23 53 74 b1 81 38 82 34 da cb 71 c1 bc 95 0e e8 |#St..8.4..q.....| +peer1.org1.example.com | 00000020 42 47 c4 0f 02 20 77 b4 1d 60 1a ae 6d c1 b9 26 |BG... w..`..m..&| +peer1.org1.example.com | 00000030 5b 5c a8 f9 1f 17 f3 c5 a6 5f d1 17 58 37 01 55 |[\......._..X7.U| +peer1.org1.example.com | 00000040 f8 fe db b4 43 1d |....C.| +peer1.org1.example.com | [d72 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d73 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4db0 gate 1602702078465597700 evaluation succeeds +peer1.org1.example.com | [d74 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d75 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d76 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d77 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d78 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d79 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1602702050267080900, 18 but got ts: inc_num:1602702050267080900 seq_num:17 +peer1.org1.example.com | [d7a 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d7b 10-14 19:01:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d7c 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [d7d 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:05.777 UTC [cauthdsl] func1 -> DEBU 13c0 0xc00056d8b0 gate 1602702125777222400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:05.777 UTC [cauthdsl] func2 -> DEBU 13c1 0xc00056d8b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:05.777 UTC [cauthdsl] func2 -> DEBU 13c2 0xc00056d8b0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:05.777 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13c3 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:05.777 UTC [msp] Validate -> DEBU 13c4 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:02:05.778 UTC [msp] getCertificationChain -> DEBU 13c5 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:05.778 UTC [cauthdsl] func2 -> DEBU 13c6 0xc00056d8b0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:05.778 UTC [msp.identity] Verify -> DEBU 13c7 Verify: digest = 00000000 81 5b 43 c2 4c 39 25 7c 7b 6a c7 b3 6e aa eb 11 |.[C.L9%|{j..n...| +orderer0.example.com | 00000010 b2 97 6e a3 e0 88 82 fb 09 0e 68 33 88 53 e0 5c |..n.......h3.S.\|" +orderer0.example.com | "2020-10-14 19:02:05.779 UTC [msp.identity] Verify -> DEBU 13c8 Verify: sig = 00000000 30 45 02 21 00 94 52 9e 5a 3e 6f 49 ba 2c af 18 |0E.!..R.Z>oI.,..| +orderer0.example.com | 00000010 d4 ba da a7 bd df d9 3a 90 fa ce 57 0c 8f 80 dc |.......:...W....| +orderer0.example.com | 00000020 17 2e ae 91 c1 02 20 76 22 33 44 91 82 ed 9a 68 |...... v"3D....h| +orderer0.example.com | 00000030 77 f7 51 2c 8c ac 2f aa 63 c0 fa b4 9f c4 db 4d |w.Q,../.c......M| +orderer0.example.com | 00000040 8a 58 70 eb e4 59 3c |.Xp..Y<|" +orderer0.example.com | "2020-10-14 19:02:05.779 UTC [cauthdsl] func2 -> DEBU 13c9 0xc00056d8b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:05.780 UTC [cauthdsl] func1 -> DEBU 13ca 0xc00056d8b0 gate 1602702125777222400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:05.781 UTC [policies] Evaluate -> DEBU 13cf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.781 UTC [policies] Evaluate -> DEBU 13d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:05.781 UTC [common.deliver] deliverBlocks -> DEBU 13d1 [channel: testchainid] Received seekInfo (0xc000cb1a40) start: > stop: > from 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.781 UTC [fsblkstorage] Next -> DEBU 13d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:05.782 UTC [fsblkstorage] newBlockfileStream -> DEBU 13d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d4 Remaining bytes=[30408], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d5 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d6 blockbytes [30405] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:05.783 UTC [common.deliver] deliverBlocks -> DEBU 13d7 [channel: testchainid] Delivering block [1] for (0xc000cb1a40) for 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.783 UTC [common.deliver] deliverBlocks -> DEBU 13d8 [channel: testchainid] Done delivering to 172.18.0.9:40138 for (0xc000cb1a40)" +orderer0.example.com | "2020-10-14 19:02:05.784 UTC [common.deliver] Handle -> DEBU 13d9 Waiting for new SeekInfo from 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.784 UTC [common.deliver] Handle -> DEBU 13da Attempting to read seek info message from 172.18.0.9:40138" +orderer0.example.com | "2020-10-14 19:02:05.793 UTC [common.deliver] Handle -> WARN 13db Error reading from 172.18.0.9:40138: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:05.794 UTC [orderer.common.server] func1 -> DEBU 13dd Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:05.793 UTC [grpc] infof -> DEBU 13dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:05.796 UTC [comm.grpc.server] 1 -> INFO 13de streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40138 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.6265ms +orderer0.example.com | "2020-10-14 19:02:06.016 UTC [orderer.common.server] Deliver -> DEBU 13df Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:06.018 UTC [common.deliver] Handle -> DEBU 13e1 Starting new deliver loop for 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.018 UTC [common.deliver] Handle -> DEBU 13e2 Attempting to read seek info message from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e3 Sending msg of 28 bytes to 3 on channel testchainid took 60µs" +orderer0.example.com | "2020-10-14 19:02:06.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +orderer0.example.com | "2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.022 UTC [cauthdsl] func1 -> DEBU 13ea 0xc0009a7960 gate 1602702126022146900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13eb 0xc0009a7960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13ec 0xc0009a7960 processing identity 0 with bytes of fe2870" +peer0.org1.example.com | 00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +peer0.org1.example.com | 00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +peer0.org1.example.com | 00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +peer0.org1.example.com | 00000040 92 68 95 c5 36 a8 69 |.h..6.i| +peer0.org1.example.com | [dab 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [dac 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 gate 1602702074610726300 evaluation succeeds +peer0.org1.example.com | [dad 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [dae 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [daf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [db0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [db1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [db2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [db4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer0.org1.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer0.org1.example.com | [db5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer0.org1.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer0.org1.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer0.org1.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer0.org1.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer0.org1.example.com | [db6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [db7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [db8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [dba 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dbb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [dbc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dbd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dbe 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [dbf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [dc0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [dc1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 gate 1602702074617202400 evaluation starts +peer0.org1.example.com | [dc2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [dc3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [dc4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 principal matched by identity 0 +peer0.org1.example.com | [dc5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 97 90 39 ff 62 20 6e e9 99 1b 26 dc e0 99 a7 |;..9.b n...&....| +peer0.org1.example.com | 00000010 80 94 8c 81 c6 91 e0 f2 a0 4f ad c1 4e 92 57 df |.........O..N.W.| +peer0.org1.example.com | [dc6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 cd 8f a0 a1 0b 26 2b 6d a5 45 |0E.!.......&+m.E| +peer0.org1.example.com | 00000010 f0 76 84 90 50 0b 25 66 b3 c2 71 85 c0 07 6c db |.v..P.%f..q...l.| +peer0.org1.example.com | 00000020 43 ad 33 e4 41 02 20 50 83 58 0d a0 77 a9 4f ac |C.3.A. P.X..w.O.| +peer0.org1.example.com | 00000030 89 9d fd a4 f7 9b 66 35 71 4c 46 ef e0 12 5b 19 |......f5qLF...[.| +peer0.org1.example.com | 00000040 ee a6 1d c6 e9 dd 5b |......[| +peer0.org1.example.com | [dc7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [dc8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 gate 1602702074617202400 evaluation succeeds +peer0.org1.example.com | [dc9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [dca 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [dcb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [dcc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [dcd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dce 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1602702050267080900, 16 but got ts: inc_num:1602702050267080900 seq_num:14 +peer0.org1.example.com | [dcf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [dd2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [dd3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dd4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [dd5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [dd6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dd7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [dd8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dd9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dda 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ddb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ddc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ddd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 gate 1602702074618560600 evaluation starts +peer0.org1.example.com | [dde 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ddf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [de0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 principal matched by identity 0 +peer0.org1.example.com | [de1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +peer0.org1.example.com | 00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +peer0.org1.example.com | [de2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +peer0.org1.example.com | 00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +peer0.org1.example.com | 00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +peer0.org1.example.com | 00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +peer0.org1.example.com | 00000040 a5 3c 20 be c1 72 dc |.< ..r.| +peer0.org1.example.com | [de3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f42 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f43 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [f44 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f45 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f46 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [f47 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f48 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f49 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f4a 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4b 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4c 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4d 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [f4e 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4f 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [f50 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f52 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f51 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f53 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f54 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f55 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f56 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f57 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f58 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f59 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f5a 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f5b 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f5c 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f5d 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [f5e 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161015 +peer1.org2.example.com | [f5f 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D2F1D87221843661F6C6DCFA5A792C28D8999F1AB80043DC380BB6027E299F22 +peer1.org2.example.com | [f60 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [f61 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [f62 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [f63 10-14 19:01:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [f64 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f65 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f66 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [f67 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f68 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [f69 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6a 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f6b 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f6c 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f6d 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f6e 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f6f 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f70 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f71 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f72 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f73 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f74 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f75 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [f76 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f77 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f78 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f79 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [f7a 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f7b 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f7c 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f7d 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 gate 1602702085418438300 evaluation starts +peer1.org2.example.com | [f7e 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f7f 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [f80 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f81 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 principal evaluation fails +peer1.org2.example.com | [f82 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856650 gate 1602702085418438300 evaluation fails +peer1.org2.example.com | [f83 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f84 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f85 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [f86 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 gate 1602702085424070000 evaluation starts +peer1.org2.example.com | [f87 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f88 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [f89 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 principal matched by identity 0 +peer1.org2.example.com | [f8a 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 93 01 12 a9 a0 f9 b7 66 2d 1a c5 72 5c 81 c5 |........f-..r\..| +peer1.org2.example.com | 00000010 89 a3 8e af 23 6d 2c 59 97 c6 dd ab d3 ca 57 ee |....#m,Y......W.| +peer1.org2.example.com | [f8b 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a ea eb f7 65 a5 be a5 71 d5 09 c1 |0D. ....e...q...| +peer1.org2.example.com | 00000010 b7 10 6f 3b ce 9b f4 76 1f fc d1 6b 72 c7 c3 3c |..o;...v...kr..<| +peer1.org2.example.com | 00000020 c8 e7 a0 82 02 20 19 15 c0 19 84 79 47 95 42 e2 |..... .....yG.B.| +peer1.org2.example.com | 00000030 bb ee 7a 25 ff 21 c5 ab 0a a4 bb 32 64 56 91 64 |..z%.!.....2dV.d| +peer1.org2.example.com | 00000040 a6 d6 72 5d 60 28 |..r]`(| +peer1.org2.example.com | [f8c 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f8d 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003856bc0 gate 1602702085424070000 evaluation succeeds +peer1.org2.example.com | [f8e 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f8f 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f90 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f91 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f92 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f93 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [f94 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f95 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [f96 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [f97 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f98 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f99 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9a 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9b 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9c 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9d 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9e 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9f 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [fa0 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fa1 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ebc 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ebd 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ebe 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ebf 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ec0 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ec1 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ec2 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec3 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec4 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec5 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec6 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec7 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec8 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ec9 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eca 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ecb 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ecc 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ecd 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [ece 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ecf 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ed0 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ed1 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ed2 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ed3 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ed4 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ed5 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 gate 1602702080606201800 evaluation starts +peer0.org2.example.com | [ed6 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ed7 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [ed8 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 principal matched by identity 0 +peer0.org2.example.com | [ed9 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 05 db 90 5a 92 b5 98 46 f3 e2 93 5c 4e 13 82 |Q...Z...F...\N..| +peer0.org2.example.com | 00000010 a4 26 4b 87 8b 63 54 cb f2 eb 0c 33 28 ad 05 0d |.&K..cT....3(...| +peer0.org2.example.com | [eda 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 84 5a bf ad c5 f4 3b ee 43 96 |0E.!...Z....;.C.| +peer0.org2.example.com | 00000010 34 09 8d e6 2a d5 03 89 b0 d8 95 e5 38 da 1d 84 |4...*.......8...| +peer0.org2.example.com | 00000020 95 1e 31 26 a5 02 20 49 4a f9 55 3a 45 cb e8 a7 |..1&.. IJ.U:E...| +peer0.org2.example.com | 00000030 35 9d 45 c3 65 4d 96 ec e3 20 99 e7 f0 c7 91 7f |5.E.eM... ......| +peer0.org2.example.com | 00000040 67 5e 2a 56 c5 09 f2 |g^*V...| +peer0.org2.example.com | [edb 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [edc 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003998070 gate 1602702080606201800 evaluation succeeds +peer0.org2.example.com | [edd 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ede 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [edf 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ee0 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ee1 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ee2 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [ee3 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ee4 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [ee5 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [ee6 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ee7 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ee8 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ee9 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eea 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eeb 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eec 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eed 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eee 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eef 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ef0 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ef1 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ef2 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [ef3 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ef4 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef5 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ef6 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef7 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ef8 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef9 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [efa 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [efb 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [efc 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 gate 1602702074618560600 evaluation succeeds +peer0.org1.example.com | [de5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [de6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [de7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [de8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [de9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dea 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [deb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [dec 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +peer0.org1.example.com | 00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +peer0.org1.example.com | [ded 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +peer0.org1.example.com | 00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +peer0.org1.example.com | 00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +peer0.org1.example.com | 00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +peer0.org1.example.com | 00000040 a9 45 ea e8 63 24 |.E..c$| +peer0.org1.example.com | [dee 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [def 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [df0 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [df1 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer0.org1.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer0.org1.example.com | [df2 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer0.org1.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer0.org1.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer0.org1.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer0.org1.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer0.org1.example.com | [df3 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [df4 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [df5 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [df6 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [df7 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [df8 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [df9 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dfa 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [dfb 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dfc 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [dfd 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [dfe 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +peer0.org1.example.com | 00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +peer1.org1.example.com | [d7e 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [d7f 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [d80 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d81 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [d82 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [d83 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d84 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [d85 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [d86 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +peer1.org1.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +peer1.org1.example.com | [d87 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer1.org1.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer1.org1.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +peer1.org1.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +peer1.org1.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +peer1.org1.example.com | [d88 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [d89 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f ca 80 f8 3d 1c 35 0e 05 c7 c0 ed |0D. ....=.5.....| +peer1.org1.example.com | 00000010 1c 03 56 ad 3a af 73 91 8f 83 ea aa 20 2c 38 27 |..V.:.s..... ,8'| +peer1.org1.example.com | 00000020 9f 68 8f 71 02 20 58 4c d8 b0 2f 33 8d ba 47 0a |.h.q. XL../3..G.| +peer1.org1.example.com | 00000030 be 83 97 2a 0c b0 cb 74 b6 be ed 17 1f ae b5 4a |...*...t.......J| +peer1.org1.example.com | 00000040 84 c9 72 56 62 1f |..rVb.| +peer1.org1.example.com | [d8a 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [d8b 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [d8c 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [efd 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [efe 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eff 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f00 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f01 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f02 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f03 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f04 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [f05 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f06 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [f08 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f07 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [f09 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f0a 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [f0c 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f0b 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [f0d 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f0e 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [f0f 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f10 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [f11 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [f12 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f13 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [f14 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [f15 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [f16 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161014 +peer0.org2.example.com | [f18 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2942533CC59E1496513DBB12E59808E9BA38C8281D6D4C51554A2235AB8467B9 +peer0.org2.example.com | [f19 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [f1a 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [f1b 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [f1c 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f17 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f1d 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [fa2 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fa3 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa4 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa5 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa6 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa7 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa8 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fa9 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [faa 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fab 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fac 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [fae 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fad 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [faf 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [fb0 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb1 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fb2 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb3 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fb4 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [fb5 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fb6 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [fb7 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fb8 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fb9 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fba 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [fbb 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [fbc 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 gate 1602702085605142700 evaluation starts +peer1.org2.example.com | [fbd 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fbe 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [fbf 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [fc0 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 principal evaluation fails +peer1.org2.example.com | [fc1 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003879050 gate 1602702085605142700 evaluation fails +peer1.org2.example.com | [fc2 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fc3 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fc4 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [fc5 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 gate 1602702085606775700 evaluation starts +peer1.org2.example.com | [fc6 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fc7 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [fc8 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 principal matched by identity 0 +peer1.org2.example.com | [fc9 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 03 12 73 8d a0 ec 50 83 9e 84 e9 f9 b9 f5 0f |g..s...P........| +peer1.org2.example.com | 00000010 eb e3 68 4c 59 71 f0 4d 3f 19 a0 87 83 9f 60 76 |..hLYq.M?.....`v| +peer1.org2.example.com | [fca 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d1 c2 2c e0 47 0d 69 36 f9 41 |0E.!....,.G.i6.A| +peer1.org2.example.com | 00000010 a1 b4 8e 83 02 ec be 66 5b a1 6d 86 4c 2c c4 2f |.......f[.m.L,./| +peer1.org2.example.com | 00000020 27 39 72 aa 72 02 20 09 ce 6b 31 b3 37 7e c6 a4 |'9r.r. ..k1.7~..| +peer1.org2.example.com | 00000030 23 42 58 0f a7 63 28 85 1e d9 09 92 34 d5 b3 d8 |#BX..c(.....4...| +peer1.org2.example.com | 00000040 d4 36 12 db d0 78 f2 |.6...x.| +peer1.org2.example.com | [fcb 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [fcc 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038795c0 gate 1602702085606775700 evaluation succeeds +peer1.org2.example.com | [fcd 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fce 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [fcf 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [fd0 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [fd1 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fd2 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fd3 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fd4 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [fd5 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [fd6 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [fd7 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [fd8 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fd9 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fda 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fdb 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fdd 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fdc 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fde 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fdf 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe0 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe1 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe2 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe3 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe4 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe5 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fe6 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe7 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fe8 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fe9 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fea 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [feb 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fec 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f1f 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f20 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f1e 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [f23 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [f24 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [f25 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f22 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" secret_envelope:\375\243\227\000\225\311m\224\350\246i\017\274\341\364\366\002 ?\3144\243\351X>\270\271\312_\023C\273c\001\322\007\257\2052\030$k\250Y\361\373\261\2300\027" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f26 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f21 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f27 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [f28 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f29 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f2a 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [f2b 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f2c 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [f2d 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [f2e 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer0.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer0.org2.example.com | [f2f 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer0.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer0.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer0.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer0.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer0.org2.example.com | [f30 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [f31 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [f32 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f33 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f34 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [f35 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13ed 0xc0009a7960 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:06.022 UTC [msp.identity] Verify -> DEBU 13ee Verify: digest = 00000000 9d bf cd 72 97 62 d8 33 37 5c 54 f8 71 c8 4a 76 |...r.b.37\T.q.Jv| +orderer0.example.com | 00000010 6f 9d 0f 15 f0 5d 05 64 62 73 a2 9f 65 5e 59 24 |o....].dbs..e^Y$|" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [msp.identity] Verify -> DEBU 13ef Verify: sig = 00000000 30 45 02 21 00 fa b9 3b bf fa 02 f3 39 f4 0b 4b |0E.!...;....9..K| +orderer0.example.com | 00000010 bf bd c2 58 84 5e 0a 0b 18 6e 82 db 40 b1 8d 4c |...X.^...n..@..L| +orderer0.example.com | 00000020 81 92 70 18 90 02 20 76 38 1b de 8b ae a5 2e 93 |..p... v8.......| +orderer0.example.com | 00000030 0a 23 0d 45 49 1e 39 e7 b1 95 4d 3a eb 7e 12 51 |.#.EI.9...M:.~.Q| +orderer0.example.com | 00000040 26 d1 99 4c 3f 6c 8e |&..L?l.|" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [cauthdsl] func2 -> DEBU 13f0 0xc0009a7960 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [cauthdsl] func1 -> DEBU 13f1 0xc0009a7960 gate 1602702126022146900 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.025 UTC [common.deliver] deliverBlocks -> DEBU 13f8 [channel: testchainid] Received seekInfo (0xc000cb1f40) start: > stop: > from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.025 UTC [fsblkstorage] Next -> DEBU 13f9 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:06.025 UTC [fsblkstorage] newBlockfileStream -> DEBU 13fa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fb Remaining bytes=[30408], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fc Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fd blockbytes [30405] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:06.027 UTC [common.deliver] deliverBlocks -> DEBU 13fe [channel: testchainid] Delivering block [1] for (0xc000cb1f40) for 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.027 UTC [common.deliver] deliverBlocks -> DEBU 13ff [channel: testchainid] Done delivering to 172.18.0.9:40140 for (0xc000cb1f40)" +orderer0.example.com | "2020-10-14 19:02:06.027 UTC [common.deliver] Handle -> DEBU 1400 Waiting for new SeekInfo from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.028 UTC [common.deliver] Handle -> DEBU 1401 Attempting to read seek info message from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.030 UTC [policies] Evaluate -> DEBU 1402 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1403 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [cauthdsl] func1 -> DEBU 1407 0xc0004b6b90 gate 1602702126031583800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [cauthdsl] func2 -> DEBU 1408 0xc0004b6b90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:06.031 UTC [cauthdsl] func2 -> DEBU 1409 0xc0004b6b90 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [cauthdsl] func2 -> DEBU 140a 0xc0004b6b90 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [msp.identity] Verify -> DEBU 140b Verify: digest = 00000000 1b 6f 05 9f ed 2e 83 1f b9 16 0f 7c 9f e4 51 d3 |.o.........|..Q.| +orderer0.example.com | 00000010 6a 08 dc 52 35 46 ff 5f c8 ab 94 f4 e6 1a 69 5b |j..R5F._......i[|" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [msp.identity] Verify -> DEBU 140c Verify: sig = 00000000 30 45 02 21 00 bf 89 37 76 62 b7 42 8b 58 73 64 |0E.!...7vb.B.Xsd| +orderer0.example.com | 00000010 b3 ef ba a0 4a da 84 87 32 f2 9a 75 d9 2b de 3e |....J...2..u.+.>| +orderer0.example.com | 00000020 0f ba 3d bc 67 02 20 02 76 18 59 85 ed b1 20 71 |..=.g. .v.Y... q| +orderer0.example.com | 00000030 ba 97 9c f0 44 ca bc 8c e0 dd 14 6c ab d9 45 32 |....D......l..E2| +orderer0.example.com | 00000040 3b 42 1a 98 25 9d 87 |;B..%..|" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [cauthdsl] func2 -> DEBU 140d 0xc0004b6b90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [cauthdsl] func1 -> DEBU 140e 0xc0004b6b90 gate 1602702126031583800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 1411 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1413 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.033 UTC [common.deliver] deliverBlocks -> DEBU 1415 [channel: testchainid] Received seekInfo (0xc000d2ad80) start: > stop: > from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.033 UTC [fsblkstorage] Next -> DEBU 1416 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:06.034 UTC [fsblkstorage] newBlockfileStream -> DEBU 1417 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:06.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1418 Remaining bytes=[53338], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:06.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1419 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:06.035 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 141a blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:06.035 UTC [common.deliver] deliverBlocks -> DEBU 141b [channel: testchainid] Delivering block [0] for (0xc000d2ad80) for 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.035 UTC [common.deliver] deliverBlocks -> DEBU 141c [channel: testchainid] Done delivering to 172.18.0.9:40140 for (0xc000d2ad80)" +orderer0.example.com | "2020-10-14 19:02:06.036 UTC [common.deliver] Handle -> DEBU 141d Waiting for new SeekInfo from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.036 UTC [common.deliver] Handle -> DEBU 141e Attempting to read seek info message from 172.18.0.9:40140" +orderer0.example.com | "2020-10-14 19:02:06.043 UTC [common.deliver] Handle -> WARN 141f Error reading from 172.18.0.9:40140: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:06.043 UTC [orderer.common.server] func1 -> DEBU 1420 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:06.044 UTC [comm.grpc.server] 1 -> INFO 1422 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7701ms +orderer0.example.com | "2020-10-14 19:02:06.044 UTC [grpc] infof -> DEBU 1421 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:06.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1423 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +orderer0.example.com | "2020-10-14 19:02:06.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1424 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +orderer0.example.com | "2020-10-14 19:02:06.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1425 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.2µs " +orderer0.example.com | "2020-10-14 19:02:06.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.7µs " +orderer0.example.com | "2020-10-14 19:02:06.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1427 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1428 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.240 UTC [orderer.common.server] Deliver -> DEBU 1429 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:06.240 UTC [common.deliver] Handle -> DEBU 142a Starting new deliver loop for 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.241 UTC [common.deliver] Handle -> DEBU 142b Attempting to read seek info message from 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [policies] Evaluate -> DEBU 142f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [cauthdsl] func1 -> DEBU 1431 0xc000c70b80 gate 1602702126242457900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1432 0xc000c70b80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1433 0xc000c70b80 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1434 0xc000c70b80 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:06.243 UTC [msp.identity] Verify -> DEBU 1435 Verify: digest = 00000000 4b df 64 a5 7c af 33 01 65 e6 e1 46 15 93 a4 16 |K.d.|.3.e..F....| +orderer0.example.com | 00000010 b4 77 b3 ae 88 f7 8c 02 40 7d c4 ad f7 de c3 7d |.w......@}.....}|" +orderer0.example.com | "2020-10-14 19:02:06.243 UTC [msp.identity] Verify -> DEBU 1436 Verify: sig = 00000000 30 44 02 20 2c 13 91 e5 d4 bd 10 98 83 4f d8 88 |0D. ,........O..| +orderer0.example.com | 00000010 7f 9a 93 9b d3 a6 88 d4 ae 0c 6a 20 e9 0f f0 d9 |..........j ....| +orderer0.example.com | 00000020 f3 6f f1 52 02 20 59 ad a4 16 6a 61 b9 48 04 9c |.o.R. Y...ja.H..| +orderer0.example.com | 00000030 67 f0 db 62 d5 32 83 7b 63 b9 e6 46 e2 36 54 e7 |g..b.2.{c..F.6T.| +orderer0.example.com | 00000040 26 75 c8 74 05 bf |&u.t..|" +orderer0.example.com | "2020-10-14 19:02:06.243 UTC [cauthdsl] func2 -> DEBU 1437 0xc000c70b80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:06.243 UTC [cauthdsl] func1 -> DEBU 1438 0xc000c70b80 gate 1602702126242457900 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 1439 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.245 UTC [common.deliver] deliverBlocks -> DEBU 143f [channel: testchainid] Received seekInfo (0xc00030b140) start: > stop: > from 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.245 UTC [fsblkstorage] Next -> DEBU 1440 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:06.255 UTC [fsblkstorage] newBlockfileStream -> DEBU 1441 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:06.256 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1442 Remaining bytes=[53338], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:06.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1443 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:06.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1444 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:06.263 UTC [common.deliver] deliverBlocks -> DEBU 1445 [channel: testchainid] Delivering block [0] for (0xc00030b140) for 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.263 UTC [common.deliver] deliverBlocks -> DEBU 1446 [channel: testchainid] Done delivering to 172.18.0.9:40142 for (0xc00030b140)" +orderer0.example.com | "2020-10-14 19:02:06.266 UTC [common.deliver] Handle -> DEBU 1447 Waiting for new SeekInfo from 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.267 UTC [common.deliver] Handle -> DEBU 1448 Attempting to read seek info message from 172.18.0.9:40142" +orderer0.example.com | "2020-10-14 19:02:06.283 UTC [common.deliver] Handle -> WARN 1449 Error reading from 172.18.0.9:40142: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:06.285 UTC [orderer.common.server] func1 -> DEBU 144b Closing Deliver stream" +peer1.org1.example.com | [d8d 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [d8e 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [d8f 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d90 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d91 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d92 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [d93 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d94 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d95 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [d96 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > +peer1.org1.example.com | [d97 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [d98 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d99 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d9a 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [d9b 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9c 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9d 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d9e 10-14 19:01:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d9f 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [da0 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da1 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da2 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da3 10-14 19:01:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da4 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da5 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da6 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da7 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [da8 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [da9 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fed 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fee 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fef 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ff0 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ff1 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff2 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff3 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff4 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ff5 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ff6 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff7 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff8 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [ff9 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [ffa 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ffb 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [ffc 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [ffd 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ffe 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [fff 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1000 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer1.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer1.org2.example.com | [1001 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer1.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer1.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer1.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer1.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer1.org2.example.com | [1002 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1003 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa d3 bf 26 b7 d8 58 86 21 ad c5 |0E.!....&..X.!..| +peer1.org2.example.com | 00000010 57 c0 c7 4e c2 cd 37 15 df ca a7 e8 55 ce ba c3 |W..N..7.....U...| +peer1.org2.example.com | 00000020 13 70 e2 d3 d1 02 20 29 75 0f 8d 86 4c 4c 42 0d |.p.... )u...LLB.| +peer1.org2.example.com | 00000030 a5 9a 42 07 d2 8e 40 f2 be 5c 28 f8 96 e5 6c ec |..B...@..\(...l.| +peer1.org2.example.com | 00000040 32 93 1f 15 09 b6 6e |2.....n| +peer1.org2.example.com | [1004 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [f36 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [f37 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [f38 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer0.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer0.org2.example.com | [f39 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer0.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer0.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer0.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer0.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer0.org2.example.com | [f3a 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [f3b 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 cc 57 f9 86 b6 a7 51 9d c8 c5 |0E.!...W....Q...| +peer0.org2.example.com | 00000010 2f 41 16 45 3e fd a3 97 00 95 c9 6d 94 e8 a6 69 |/A.E>......m...i| +peer0.org2.example.com | 00000020 0f bc e1 f4 f6 02 20 3f cc 34 a3 e9 58 3e b8 b9 |...... ?.4..X>..| +peer0.org2.example.com | 00000030 ca 5f 13 43 bb 63 01 d2 07 af 85 32 18 24 6b a8 |._.C.c.....2.$k.| +peer0.org2.example.com | 00000040 59 f1 fb b1 98 30 17 |Y....0.| +peer0.org2.example.com | [f3c 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [f3d 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [f3e 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f3f 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f40 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [f41 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f42 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [f43 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [f44 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer0.org2.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer0.org2.example.com | [f45 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer0.org2.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer0.org2.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer0.org2.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer0.org2.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer0.org2.example.com | [f46 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [f47 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [f48 10-14 19:01:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f49 10-14 19:01:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f4a 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [f4b 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [f4c 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [f4d 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f4e 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f4f 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [daa 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [dab 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dac 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dad 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [dae 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [daf 10-14 19:01:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [db0 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 gate 1602702080140212800 evaluation starts +peer1.org1.example.com | [db1 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [db2 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [db3 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 principal matched by identity 0 +peer1.org1.example.com | [db4 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 53 2d a9 c1 62 a6 da ce ff 81 4b 77 5c 1d 2a |xS-..b.....Kw\.*| +peer1.org1.example.com | 00000010 9e 67 1e da bf 59 6b b6 b6 5f 0f f7 84 ff 8b 61 |.g...Yk.._.....a| +peer1.org1.example.com | [db5 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 3c a8 cb af 76 21 f8 70 ca bd 13 |0D. ><...v!.p...| +peer1.org1.example.com | 00000010 7e 29 48 45 2c 07 10 0b a5 d0 69 22 42 4d 18 4e |~)HE,.....i"BM.N| +peer1.org1.example.com | 00000020 eb f8 f1 8a 02 20 35 e1 2e 6e 0f b3 ba 21 26 93 |..... 5..n...!&.| +peer1.org1.example.com | 00000030 66 9e 95 9c ce f5 d5 4e 91 70 55 a8 53 60 ab b3 |f......N.pU.S`..| +peer1.org1.example.com | 00000040 51 36 82 bf 95 43 |Q6...C| +peer1.org1.example.com | [db6 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [db7 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24920 gate 1602702080140212800 evaluation succeeds +peer1.org1.example.com | [db8 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [db9 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [dba 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [dbb 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [dbc 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dbd 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [dbe 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [dbf 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [dc0 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [dc1 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dc2 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dc3 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dc4 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc5 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc6 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc7 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc8 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dc9 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dca 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dcb 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [dcc 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dcd 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [dce 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dcf 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd0 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd1 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd2 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd3 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd4 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd5 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd6 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd7 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dd8 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd9 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [dda 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddb 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ddc 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddd 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dde 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [ddf 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de0 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [de1 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [de2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [de3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [de6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [de4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [de5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [de7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [de8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [de9 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 gate 1602702080270171100 evaluation starts +peer1.org1.example.com | [dea 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [deb 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [dec 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 principal matched by identity 0 +peer1.org1.example.com | [ded 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fe 91 fe 25 81 61 1b 0d 27 ca d9 26 40 dd c0 |\...%.a..'..&@..| +peer1.org1.example.com | 00000010 b6 8e 07 d7 12 1c a3 60 d3 99 89 d0 a1 3f a8 1e |.......`.....?..| +peer1.org1.example.com | [dee 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 f1 a2 60 87 53 92 03 5e 85 01 |0E.!....`.S..^..| +peer1.org1.example.com | 00000010 4a 00 5b 6a bb c8 28 67 11 ca 2b 7c e8 89 5b 43 |J.[j..(g..+|..[C| +peer1.org1.example.com | 00000020 39 2e 4f 75 98 02 20 22 78 44 ea 40 06 52 73 8d |9.Ou.. "xD.@.Rs.| +peer1.org1.example.com | 00000030 cb 65 a9 80 06 03 94 0f 2c 87 6b 8a 95 46 ec c8 |.e......,.k..F..| +peer1.org2.example.com | [1005 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1006 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1007 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1008 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1009 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [100a 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [100b 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [100c 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [100d 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [100e 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [100f 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1010 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1011 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1012 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1013 10-14 19:01:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1014 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1015 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1016 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1017 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1018 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1019 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [101a 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [101b 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [101c 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [101d 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [101e 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [101f 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1020 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1021 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1022 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1023 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1024 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1025 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1026 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1027 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1028 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1029 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102a 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [102b 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161016 +peer1.org2.example.com | [102c 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F248B10158B3E7855FA60A3CDBC16F9BF427D109B24DA40FB2CF436230C4DD9C +peer1.org2.example.com | [102d 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [102e 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [102f 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1030 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1031 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1032 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1033 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1034 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1035 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1036 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:06.285 UTC [comm.grpc.server] 1 -> INFO 144c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40142 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.0195ms +orderer0.example.com | "2020-10-14 19:02:06.284 UTC [grpc] infof -> DEBU 144a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:06.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144e Sending msg of 28 bytes to 3 on channel testchainid took 100.1µs" +orderer0.example.com | "2020-10-14 19:02:06.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.8µs " +orderer0.example.com | "2020-10-14 19:02:06.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1450 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2020-10-14 19:02:06.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2020-10-14 19:02:06.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143µs " +orderer0.example.com | "2020-10-14 19:02:06.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1451 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.7µs " +orderer0.example.com | "2020-10-14 19:02:06.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1455 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:06.657 UTC [orderer.common.server] Deliver -> DEBU 1456 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:06.657 UTC [common.deliver] Handle -> DEBU 1457 Starting new deliver loop for 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.657 UTC [common.deliver] Handle -> DEBU 1458 Attempting to read seek info message from 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.659 UTC [policies] Evaluate -> DEBU 1459 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.659 UTC [policies] Evaluate -> DEBU 145a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.660 UTC [policies] Evaluate -> DEBU 145b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.660 UTC [policies] Evaluate -> DEBU 145c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:06.661 UTC [policies] Evaluate -> DEBU 145d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:06.662 UTC [cauthdsl] func1 -> DEBU 145e 0xc000e2e150 gate 1602702126662097000 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:06.662 UTC [cauthdsl] func2 -> DEBU 145f 0xc000e2e150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:06.663 UTC [cauthdsl] func2 -> DEBU 1460 0xc000e2e150 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:06.663 UTC [cauthdsl] func2 -> DEBU 1461 0xc000e2e150 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:06.663 UTC [msp.identity] Verify -> DEBU 1462 Verify: digest = 00000000 77 ad cd 89 14 8c 53 3a 9e 2f ab fc 9e e9 51 d2 |w.....S:./....Q.| +orderer0.example.com | 00000010 28 4b ba cf e4 89 e7 24 24 b7 7b 5a d5 e4 32 01 |(K.....$$.{Z..2.|" +orderer0.example.com | "2020-10-14 19:02:06.664 UTC [msp.identity] Verify -> DEBU 1463 Verify: sig = 00000000 30 45 02 21 00 c1 8c 65 8c 38 6c c8 b9 3b 08 ad |0E.!...e.8l..;..| +orderer0.example.com | 00000010 b8 c7 61 22 0d 2d 1a 0e 52 af fe 45 df df af 7b |..a".-..R..E...{| +orderer0.example.com | 00000020 a0 db f1 c4 27 02 20 15 cf 38 1a 9f f2 fc ce e9 |....'. ..8......| +orderer0.example.com | 00000030 3b 34 65 5c c4 ba 8a db 6d d6 7d f4 4e e4 b3 ea |;4e\....m.}.N...| +orderer0.example.com | 00000040 17 b9 1d 66 dc 37 27 |...f.7'|" +orderer0.example.com | "2020-10-14 19:02:06.667 UTC [cauthdsl] func2 -> DEBU 1464 0xc000e2e150 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:06.667 UTC [cauthdsl] func1 -> DEBU 1465 0xc000e2e150 gate 1602702126662097000 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1466 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1468 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.669 UTC [policies] Evaluate -> DEBU 1469 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:06.670 UTC [policies] Evaluate -> DEBU 146a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.670 UTC [policies] Evaluate -> DEBU 146b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:06.671 UTC [common.deliver] deliverBlocks -> DEBU 146c [channel: testchainid] Received seekInfo (0xc000d2b780) start: > stop: > from 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.672 UTC [fsblkstorage] Next -> DEBU 146d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:06.672 UTC [fsblkstorage] newBlockfileStream -> DEBU 146e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 146f Remaining bytes=[30408], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1470 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1471 blockbytes [30405] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:06.674 UTC [common.deliver] deliverBlocks -> DEBU 1472 [channel: testchainid] Delivering block [1] for (0xc000d2b780) for 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.674 UTC [common.deliver] deliverBlocks -> DEBU 1473 [channel: testchainid] Done delivering to 172.18.0.9:40144 for (0xc000d2b780)" +orderer0.example.com | "2020-10-14 19:02:06.675 UTC [common.deliver] Handle -> DEBU 1474 Waiting for new SeekInfo from 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.676 UTC [common.deliver] Handle -> DEBU 1475 Attempting to read seek info message from 172.18.0.9:40144" +orderer0.example.com | "2020-10-14 19:02:06.693 UTC [common.deliver] Handle -> WARN 1476 Error reading from 172.18.0.9:40144: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:06.693 UTC [orderer.common.server] func1 -> DEBU 1477 Closing Deliver stream" +peer0.org2.example.com | [f50 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f51 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [f52 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer0.org2.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer0.org2.example.com | [f53 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer0.org2.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer0.org2.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer0.org2.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer0.org2.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer0.org2.example.com | [f54 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [f55 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 e9 ef db fe ae be bf 22 51 2e 4c |0D. ........"Q.L| +peer0.org2.example.com | 00000010 f1 99 a9 d9 a4 f8 1a 34 9f e2 a3 8a c8 4c 53 7f |.......4.....LS.| +peer0.org2.example.com | 00000020 f4 2e 09 36 02 20 75 98 04 4b 20 80 77 4a db 89 |...6. u..K .wJ..| +peer0.org2.example.com | 00000030 47 fd 2c 27 cb 49 54 2a ec 6a 73 6e 37 1d 44 61 |G.,'.IT*.jsn7.Da| +peer0.org2.example.com | 00000040 4f d1 71 25 5d cb |O.q%].| +peer0.org2.example.com | [f56 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [f57 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [f58 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [f59 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [f5a 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [f5b 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f5c 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f5d 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f5e 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [f5f 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f60 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f61 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f62 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:<\250\313\257v!\370p\312\275\023~)HE,\007\020\013\245\320i\"BM\030N\353\370\361\212\002 5\341.n\017\263\272!&\223f\236\225\234\316\365\325N\221pU\250S`\253\263Q6\202\277\225C" > +peer0.org2.example.com | [f63 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [f64 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f65 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f66 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f67 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f68 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f69 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f6a 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [f6b 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [f6c 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f6d 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f6e 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f6f 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dff 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +peer0.org1.example.com | 00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +peer0.org1.example.com | 00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +peer0.org1.example.com | 00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +peer0.org1.example.com | 00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +peer0.org1.example.com | [e00 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [e01 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 4e 44 2e 0e 53 df e8 21 3f 3e |0E.!..ND..S..!?>| +peer0.org1.example.com | 00000010 e6 90 f1 1f 6d 1e 69 9b b0 ce 5f cc 93 18 a0 dc |....m.i..._.....| +peer0.org1.example.com | 00000020 92 16 32 bd 4a 02 20 1a 07 4f 29 b5 4f 88 d3 55 |..2.J. ..O).O..U| +peer0.org1.example.com | 00000030 9e a9 32 e4 81 ad b5 35 cb b9 c1 d9 42 0a d6 df |..2....5....B...| +peer0.org1.example.com | 00000040 82 4f f1 43 fb c6 f1 |.O.C...| +peer0.org1.example.com | [e02 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [e03 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [e04 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e05 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e06 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e07 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e08 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e09 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e0a 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e0b 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e0c 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e0d 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [e0e 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e0f 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e10 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e11 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e12 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e13 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e14 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e15 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e16 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [e17 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e18 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [e19 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e1a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e1b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e1c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e1d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [e1e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 gate 1602702075174406600 evaluation starts +peer0.org1.example.com | [e1f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e20 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [e21 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 principal matched by identity 0 +peer0.org1.example.com | [e22 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 09 0f b2 6b f0 90 6e 95 04 c2 3d 31 ed 64 80 |t...k..n...=1.d.| +peer0.org1.example.com | 00000010 15 be ae ba 14 0d d5 db f2 de 32 4d 1f 87 4f c1 |..........2M..O.| +peer0.org1.example.com | [e23 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d fc 9e e0 54 0d 5d 78 c5 f5 12 d4 |0D. M...T.]x....| +peer0.org1.example.com | 00000010 e0 46 8b 24 2f 4f 32 03 06 53 ee 39 7e 39 8a 25 |.F.$/O2..S.9~9.%| +peer0.org1.example.com | 00000020 8a 65 89 45 02 20 28 a4 fe 61 55 7c 72 e6 2a 76 |.e.E. (..aU|r.*v| +peer0.org1.example.com | 00000030 94 43 04 53 64 b5 75 68 f1 96 d4 d0 f9 6d ee cc |.C.Sd.uh.....m..| +peer0.org1.example.com | 00000040 25 f5 a8 78 7c 24 |%..x|$| +peer0.org1.example.com | [e24 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [e25 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 gate 1602702075174406600 evaluation succeeds +peer0.org1.example.com | [e26 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e27 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e28 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [e29 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e2a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e2b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [e2c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e2d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e2e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e2f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e30 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e31 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e32 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e33 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e34 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e35 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e36 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e37 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e38 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e39 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3a 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3b 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3c 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1037 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1039 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1038 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [103a 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [103b 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [103c 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [103d 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [103e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [103f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer1.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer1.org2.example.com | [1040 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer1.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer1.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer1.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer1.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer1.org2.example.com | [1041 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1042 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1043 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1044 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer1.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org2.example.com | [1045 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer1.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer1.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer1.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer1.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1047 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1048 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1049 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [104a 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [104b 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [104c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [104d 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [104e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [104f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1050 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer1.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org2.example.com | [1051 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer1.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer1.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer1.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer1.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1053 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 cf 2a a8 50 b3 72 38 6d cd 31 |0E.!...*.P.r8m.1| +peer1.org2.example.com | 00000010 c1 f1 8f 52 aa 02 93 b9 0f 0b 6d 5d 78 d2 90 30 |...R......m]x..0| +peer1.org2.example.com | 00000020 d3 72 0d 4e 59 02 20 06 bc 63 bb fd a1 17 0e 0d |.r.NY. ..c......| +peer1.org2.example.com | 00000030 53 d6 5f 53 bd 7e 87 e0 af 67 68 06 51 fe 9c b6 |S._S.~...gh.Q...| +peer1.org2.example.com | 00000040 8d 1a 79 f5 a7 1f fe |..y....| +peer1.org1.example.com | 00000040 ce 56 20 8f b7 fa 0d |.V ....| +peer1.org1.example.com | [def 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [df0 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b4b0e0 gate 1602702080270171100 evaluation succeeds +peer1.org1.example.com | [df1 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [df2 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [df3 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [df4 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [df5 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [df6 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [df7 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [df8 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [df9 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [dfa 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dfb 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dfc 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dfd 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dfe 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dff 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e00 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e01 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e02 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e03 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e04 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e05 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e06 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e07 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e08 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e09 10-14 19:01:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0a 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0b 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1054 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1055 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1056 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1057 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1058 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1059 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [105a 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [105b 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [105c 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [105e 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [105f 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer1.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer1.org2.example.com | [1060 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer1.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer1.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer1.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer1.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer1.org2.example.com | [105d 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1061 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1063 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1064 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1062 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1065 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1066 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1067 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer1.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org2.example.com | [1068 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer1.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer1.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer1.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer1.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [106a 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [106b 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [106c 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [106d 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [106e 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [106f 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1070 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1071 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1072 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1073 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1074 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1075 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1076 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1077 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f70 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f71 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f72 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [f73 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f74 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [f75 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f76 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [f77 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [f78 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f79 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f7a 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f7b 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f7c 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f7d 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f7e 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f7f 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 gate 1602702082429134300 evaluation starts +peer0.org2.example.com | [f80 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f81 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [f82 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 principal matched by identity 0 +peer0.org2.example.com | [f83 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer0.org2.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer0.org2.example.com | [f84 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer0.org2.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer0.org2.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer0.org2.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer0.org2.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer0.org2.example.com | [f85 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f86 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a13cb0 gate 1602702082429134300 evaluation succeeds +peer0.org2.example.com | [f87 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f88 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f89 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f8a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1078 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1079 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [107a 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [107b 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [107c 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [107d 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [107e 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [107f 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1080 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1081 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1082 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1083 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 gate 1602702086438723600 evaluation starts +peer1.org2.example.com | [1084 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1085 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1086 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1087 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 principal evaluation fails +peer1.org2.example.com | [1088 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394eba0 gate 1602702086438723600 evaluation fails +peer1.org2.example.com | [1089 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [108a 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [108b 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [108c 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 gate 1602702086440994100 evaluation starts +peer1.org2.example.com | [108d 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [108e 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [108f 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 principal matched by identity 0 +peer1.org2.example.com | [1090 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer1.org2.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer1.org2.example.com | [1091 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer1.org2.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer1.org2.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer1.org2.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer1.org2.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org1.example.com | [e3d 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e3e 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e3f 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e40 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e41 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e42 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e43 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e44 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e45 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e46 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e47 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e48 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e49 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [e4a 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [e4b 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [e4c 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e4d 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e4e 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [e4f 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e50 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e51 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e52 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e53 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [e54 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1092 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1093 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00394f110 gate 1602702086440994100 evaluation succeeds +peer1.org2.example.com | [1094 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1095 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1096 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1097 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1098 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1099 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [109a 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [109b 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [109c 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [109d 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [109e 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [109f 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10a0 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [10a1 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10a2 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10a3 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10a4 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [10a5 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [10a6 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [10a7 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10a8 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10a9 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [10aa 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [10ab 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ac 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ad 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ae 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10af 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10b0 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10b1 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [10b2 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b3 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [e0c 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0d 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e0e 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e0f 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e10 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e11 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e12 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e13 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101A +peer1.org1.example.com | [e14 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 26986A73AD111F61557BA48D05124098A11B7BF79722E0A826ED5CE3EE9706A1 +peer1.org1.example.com | [e15 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e16 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [e17 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [e18 10-14 19:01:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [e19 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1a 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1b 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1c 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e1d 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e1e 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e1f 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e20 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e21 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e22 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e23 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e24 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e25 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e26 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e27 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e28 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e29 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e2a 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [e2b 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 05 db 90 5a 92 b5 98 46 f3 e2 93 5c 4e 13 82 |Q...Z...F...\N..| +peer1.org1.example.com | 00000010 a4 26 4b 87 8b 63 54 cb f2 eb 0c 33 28 ad 05 0d |.&K..cT....3(...| +peer1.org1.example.com | [e2c 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 84 5a bf ad c5 f4 3b ee 43 96 |0E.!...Z....;.C.| +peer1.org1.example.com | 00000010 34 09 8d e6 2a d5 03 89 b0 d8 95 e5 38 da 1d 84 |4...*.......8...| +peer1.org1.example.com | 00000020 95 1e 31 26 a5 02 20 49 4a f9 55 3a 45 cb e8 a7 |..1&.. IJ.U:E...| +peer1.org1.example.com | 00000030 35 9d 45 c3 65 4d 96 ec e3 20 99 e7 f0 c7 91 7f |5.E.eM... ......| +peer1.org1.example.com | 00000040 67 5e 2a 56 c5 09 f2 |g^*V...| +peer1.org1.example.com | [e2d 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:06.694 UTC [comm.grpc.server] 1 -> INFO 1478 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40144 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1175ms +orderer0.example.com | "2020-10-14 19:02:06.695 UTC [grpc] infof -> DEBU 1479 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:07.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2020-10-14 19:02:07.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +orderer0.example.com | "2020-10-14 19:02:07.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147d Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +orderer0.example.com | "2020-10-14 19:02:07.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147e Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2020-10-14 19:02:07.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +orderer0.example.com | "2020-10-14 19:02:07.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " +orderer0.example.com | "2020-10-14 19:02:07.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:07.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1482 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:07.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1483 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:07.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2020-10-14 19:02:07.521 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1485 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +orderer0.example.com | "2020-10-14 19:02:07.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1486 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2020-10-14 19:02:07.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1487 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2020-10-14 19:02:07.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1488 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.7µs " +orderer0.example.com | "2020-10-14 19:02:07.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 339.5µs " +orderer0.example.com | "2020-10-14 19:02:07.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:07.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2020-10-14 19:02:08.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.7µs " +orderer0.example.com | "2020-10-14 19:02:08.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148f Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +orderer0.example.com | "2020-10-14 19:02:08.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1490 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2020-10-14 19:02:08.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1491 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.9µs " +orderer0.example.com | "2020-10-14 19:02:08.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.7µs " +orderer0.example.com | "2020-10-14 19:02:08.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1494 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1495 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +orderer0.example.com | "2020-10-14 19:02:08.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1497 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.9µs " +orderer0.example.com | "2020-10-14 19:02:08.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1498 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +orderer0.example.com | "2020-10-14 19:02:08.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1499 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2020-10-14 19:02:08.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.4µs " +orderer0.example.com | "2020-10-14 19:02:08.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.6µs " +orderer0.example.com | "2020-10-14 19:02:08.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:08.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [e2e 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [e2f 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [e30 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [e31 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [e32 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e33 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e34 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e35 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e36 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e37 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e38 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e39 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e3a 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [e3b 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e3c 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e3d 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e3e 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e3f 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e40 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e41 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e42 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e43 10-14 19:01:20.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e44 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e45 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e46 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e47 10-14 19:01:20.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e48 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e49 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4a 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e4b 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e4c 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e4d 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4e 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4f 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [e50 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [f8b 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [f8c 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [f8d 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [f8e 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [f8f 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [f90 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f91 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f92 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f93 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [f94 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f95 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f96 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f97 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f98 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:<\250\313\257v!\370p\312\275\023~)HE,\007\020\013\245\320i\"BM\030N\353\370\361\212\002 5\341.n\017\263\272!&\223f\236\225\234\316\365\325N\221pU\250S`\253\263Q6\202\277\225C" > +peer0.org2.example.com | [f99 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [f9a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f9b 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [f9c 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [f9d 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f9e 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f9f 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa0 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa1 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa2 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fa3 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [fa4 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fa5 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [fa6 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fa7 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [fa8 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [fa9 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e55 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [e56 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e57 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e58 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e59 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e5a 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [e5b 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 gate 1602702075289837300 evaluation starts +peer0.org1.example.com | [e5c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e5d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [e5e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 principal matched by identity 0 +peer0.org1.example.com | [e5f 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 c5 71 33 78 22 52 e5 c4 d9 dc bd 25 69 5d d6 |..q3x"R.....%i].| +peer0.org1.example.com | 00000010 22 71 df 0f 19 d7 14 4d 8f 83 16 2d fe 7e 57 fc |"q.....M...-.~W.| +peer0.org1.example.com | [e60 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 cc 1d 62 d3 47 ee 80 4c 95 71 33 |0D. ...b.G..L.q3| +peer0.org1.example.com | 00000010 23 53 74 b1 81 38 82 34 da cb 71 c1 bc 95 0e e8 |#St..8.4..q.....| +peer0.org1.example.com | 00000020 42 47 c4 0f 02 20 77 b4 1d 60 1a ae 6d c1 b9 26 |BG... w..`..m..&| +peer0.org1.example.com | 00000030 5b 5c a8 f9 1f 17 f3 c5 a6 5f d1 17 58 37 01 55 |[\......._..X7.U| +peer0.org1.example.com | 00000040 f8 fe db b4 43 1d |....C.| +peer0.org1.example.com | [e61 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [e62 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 gate 1602702075289837300 evaluation succeeds +peer0.org1.example.com | [e63 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e64 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e65 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [e66 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e67 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e68 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [e69 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e6a 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e6b 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [e6c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e6d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e6e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e6f 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e70 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e71 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e72 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e73 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e74 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e75 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e76 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e77 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e78 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e79 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e7a 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e7b 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e7c 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e7d 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [e7e 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e7f 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e80 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e81 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e82 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [e83 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [e84 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e85 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [e86 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e87 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e88 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e89 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [e8a 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 f3 3a 52 71 b5 a6 4d 6e 16 6d 9e 16 73 0d 0c |r.:Rq..Mn.m..s..| +peer0.org1.example.com | 00000010 31 37 fb e9 eb ac 19 8f 85 91 3e 92 e0 d4 64 ee |17........>...d.| +peer0.org1.example.com | [e8b 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 ce b6 43 3e a5 6e 4f 1a fc 74 |0E.!....C>.nO..t| +peer0.org1.example.com | 00000010 f3 b6 48 1e bf 1a 81 05 a3 78 ca 7e 58 ef 08 e8 |..H......x.~X...| +peer0.org1.example.com | 00000020 9e 64 d2 a7 e6 02 20 60 ce bf ae 18 d3 eb 4c 0c |.d.... `......L.| +peer0.org1.example.com | 00000030 40 97 d1 22 d0 34 2f f6 e9 af a1 16 db 58 19 6c |@..".4/......X.l| +peer0.org1.example.com | 00000040 e7 90 32 59 77 c3 15 |..2Yw..| +peer0.org1.example.com | [e8c 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e8d 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [e8e 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e8f 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e90 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [e91 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e92 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e93 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e51 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e52 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e53 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e54 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e55 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e56 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e57 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e58 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e59 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e5a 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e5b 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [e5c 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e5d 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [e5e 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [e5f 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e60 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [e61 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [e62 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e63 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e64 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e65 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e66 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e67 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e68 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e69 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 gate 1602702082145787000 evaluation starts +peer1.org1.example.com | [e6a 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e6b 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [e6c 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 principal matched by identity 0 +peer1.org2.example.com | [10b4 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10b5 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [10b6 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [10b7 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10b8 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10b9 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10ba 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10bb 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [10bc 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [10bd 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [10be 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 gate 1602702086597493200 evaluation starts +peer1.org2.example.com | [10bf 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10c0 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [10c1 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [10c2 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 principal evaluation fails +peer1.org2.example.com | [10c3 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393ba60 gate 1602702086597493200 evaluation fails +peer1.org2.example.com | [10c4 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10c5 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10c6 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10c7 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 gate 1602702086599308400 evaluation starts +peer1.org2.example.com | [10c8 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10c9 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [10ca 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 principal matched by identity 0 +peer1.org2.example.com | [10cb 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer1.org2.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer1.org2.example.com | [10cc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer1.org2.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer1.org2.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer1.org2.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer1.org2.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer1.org2.example.com | [10cd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [10ce 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393bfd0 gate 1602702086599308400 evaluation succeeds +peer1.org2.example.com | [10cf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10d0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10d1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [10d2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e94 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e95 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e96 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e97 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [e98 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e99 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [e9a 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e9b 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e9c 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e9d 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e9e 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e9f 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ea0 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ea1 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ea2 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ea3 10-14 19:01:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [ea4 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [ea5 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161014 +peer0.org1.example.com | [ea6 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CBED99ADF2F02FF5393FE8F15C3B0195AD918AAA509F61E03CD79EB8E9F35E20 +peer0.org1.example.com | [ea7 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [ea8 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [ea9 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [eaa 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [eab 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eac 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ead 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [eae 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eaf 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [eb0 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [eb2 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eb3 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [eb4 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [eb5 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eb6 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [eb7 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eb1 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eb8 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eb9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eba 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [ebb 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ebc 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ebd 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ebe 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ebf 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec0 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ec1 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec2 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec3 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ec4 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [ec5 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [ec6 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [ec7 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ec8 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ec9 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [eca 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ecb 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ecc 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ecd 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ece 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ecf 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 gate 1602702077966302800 evaluation starts +peer0.org1.example.com | [ed0 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ed1 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [ed2 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 principal matched by identity 0 +peer0.org1.example.com | [ed3 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [ed4 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [ed5 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ed6 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 gate 1602702077966302800 evaluation succeeds +peer0.org1.example.com | [ed7 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ed8 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ed9 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edb 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edc 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [edd 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ede 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eda 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [edf 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ee1 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee2 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee0 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ee3 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ee4 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ee5 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ee6 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ee7 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ee8 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ee9 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [eea 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [eeb 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 gate 1602702077976163300 evaluation starts +peer0.org1.example.com | [eec 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [eed 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [eee 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 principal matched by identity 0 +peer0.org1.example.com | [eef 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [ef0 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [ef1 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ef2 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 gate 1602702077976163300 evaluation succeeds +peer0.org1.example.com | [ef3 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ef4 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ef5 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ef6 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ef7 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef8 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [efa 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [efb 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [efc 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [efd 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [efe 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eff 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f00 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f01 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f02 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f03 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f04 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f05 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 gate 1602702077957476100 evaluation starts +peer0.org1.example.com | [f06 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f07 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [f08 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 principal matched by identity 0 +peer0.org1.example.com | [f09 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [f0a 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [f0b 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f0c 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 gate 1602702077957476100 evaluation succeeds +peer0.org1.example.com | [f0d 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f0e 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f0f 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f10 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f11 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f12 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f13 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f14 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [f15 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [f16 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [f17 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | [10d3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [10d4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [10d5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [10d6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [10d7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [10d8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10d9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10da 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10db 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [10dc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10dd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10de 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10df 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [10e0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [10e1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10e2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: alive: +peer1.org2.example.com | [10e3 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [10e4 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [10e5 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e6 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10e7 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10e8 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [10e9 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [10ea 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [10eb 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [10ec 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10ed 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ee 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10ef 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [10f0 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [10f2 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f3 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [10f4 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e6d 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer1.org1.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer1.org1.example.com | [e6e 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer1.org1.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer1.org1.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer1.org1.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer1.org1.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer1.org1.example.com | [e6f 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e70 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95f70 gate 1602702082145787000 evaluation succeeds +peer1.org1.example.com | [e71 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e72 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e73 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e74 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [e75 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e76 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [e77 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [e78 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [e79 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [e7a 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e7b 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e7c 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e7d 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [e7e 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e7f 10-14 19:01:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e80 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e81 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e82 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [e83 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e84 10-14 19:01:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +peer1.org1.example.com | [e85 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e86 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e87 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e88 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e89 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e8a 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e8b 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e8c 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:09.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:09.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2020-10-14 19:02:09.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.9µs " +orderer0.example.com | "2020-10-14 19:02:09.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a1 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +orderer0.example.com | "2020-10-14 19:02:09.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a2 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +orderer0.example.com | "2020-10-14 19:02:09.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +orderer0.example.com | "2020-10-14 19:02:09.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.9µs " +orderer0.example.com | "2020-10-14 19:02:09.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:09.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:09.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:09.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +orderer0.example.com | "2020-10-14 19:02:09.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +orderer0.example.com | "2020-10-14 19:02:09.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14aa Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2020-10-14 19:02:09.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ab Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2020-10-14 19:02:09.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2020-10-14 19:02:09.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.6µs " +orderer0.example.com | "2020-10-14 19:02:09.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:09.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14af Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-10-14 19:02:10.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +orderer0.example.com | "2020-10-14 19:02:10.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +orderer0.example.com | "2020-10-14 19:02:10.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.3µs " +orderer0.example.com | "2020-10-14 19:02:10.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b5 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2020-10-14 19:02:10.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +orderer0.example.com | "2020-10-14 19:02:10.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-10-14 19:02:10.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +orderer0.example.com | "2020-10-14 19:02:10.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bc Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:02:10.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2020-10-14 19:02:10.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74µs " +orderer0.example.com | "2020-10-14 19:02:10.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.8µs " +orderer0.example.com | "2020-10-14 19:02:10.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:10.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2020-10-14 19:02:11.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.2µs " +orderer0.example.com | "2020-10-14 19:02:11.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c5 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +orderer0.example.com | "2020-10-14 19:02:11.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c6 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2020-10-14 19:02:11.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +orderer0.example.com | "2020-10-14 19:02:11.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +orderer0.example.com | "2020-10-14 19:02:11.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ca Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2020-10-14 19:02:11.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +orderer0.example.com | "2020-10-14 19:02:11.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ce Sending msg of 28 bytes to 2 on channel businesschannel took 23.8µs" +orderer0.example.com | "2020-10-14 19:02:11.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cf Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +orderer0.example.com | "2020-10-14 19:02:11.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +orderer0.example.com | "2020-10-14 19:02:11.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 694.6µs " +orderer0.example.com | "2020-10-14 19:02:11.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:11.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d5 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +orderer0.example.com | "2020-10-14 19:02:12.021 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.7µs " +orderer0.example.com | "2020-10-14 19:02:12.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-10-14 19:02:12.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2020-10-14 19:02:12.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +orderer0.example.com | "2020-10-14 19:02:12.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.3µs " +orderer0.example.com | "2020-10-14 19:02:12.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-10-14 19:02:12.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +orderer0.example.com | "2020-10-14 19:02:12.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +orderer0.example.com | "2020-10-14 19:02:12.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +peer1.org1.example.com | [e8d 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [e8e 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e8f 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e90 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e91 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e92 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [e93 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e94 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e95 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e96 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e97 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e98 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e99 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e9a 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 gate 1602702082273937800 evaluation starts +peer1.org1.example.com | [e9b 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e9c 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [e9d 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 principal matched by identity 0 +peer1.org1.example.com | [e9e 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer1.org1.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer1.org1.example.com | [e9f 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer1.org1.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer1.org1.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer1.org1.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer1.org1.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer1.org1.example.com | [ea0 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ea1 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb1580 gate 1602702082273937800 evaluation succeeds +peer1.org1.example.com | [ea2 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ea3 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ea4 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ea5 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ea6 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ea7 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [10f1 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [10f5 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10f6 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [10f9 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10fa 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10fb 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10fc 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10fd 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10fe 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [10ff 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1100 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1101 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [10f7 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [10f8 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1102 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 gate 1602702086956139300 evaluation starts +peer1.org2.example.com | [1103 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1104 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1105 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1106 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 principal evaluation fails +peer1.org2.example.com | [1107 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cc1a0 gate 1602702086956139300 evaluation fails +peer1.org2.example.com | [1108 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1109 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [110a 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [110b 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 gate 1602702086958005300 evaluation starts +peer1.org2.example.com | [110c 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [110d 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [110e 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 principal matched by identity 0 +peer1.org2.example.com | [110f 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1110 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1111 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1112 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00396fda0 gate 1602702086958005300 evaluation succeeds +peer1.org2.example.com | [1113 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1114 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1115 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [f18 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f19 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f1a 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f1b 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f1c 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f1d 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f1e 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f1f 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f20 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 gate 1602702077966492700 evaluation starts +peer0.org1.example.com | [f21 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f22 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [f23 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 principal matched by identity 0 +peer0.org1.example.com | [f24 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [f25 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [f26 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f27 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 gate 1602702077966492700 evaluation succeeds +peer0.org1.example.com | [f28 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f29 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f2a 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f2b 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f2c 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f2d 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:12.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +orderer0.example.com | "2020-10-14 19:02:12.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +orderer0.example.com | "2020-10-14 19:02:12.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:12.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 28 bytes to 3 on channel testchainid took 86.7µs" +orderer0.example.com | "2020-10-14 19:02:13.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.5µs " +orderer0.example.com | "2020-10-14 19:02:13.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2020-10-14 19:02:13.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ea Sending msg of 28 bytes to 3 on channel businesschannel took 7.5µs" +orderer0.example.com | "2020-10-14 19:02:13.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.5µs " +orderer0.example.com | "2020-10-14 19:02:13.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 304.9µs " +orderer0.example.com | "2020-10-14 19:02:13.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ed Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ee Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.519 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ef Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.521 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 3 on channel testchainid took 25.6µs" +orderer0.example.com | "2020-10-14 19:02:13.522 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 543.4µs " +orderer0.example.com | "2020-10-14 19:02:13.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f2 Sending msg of 28 bytes to 2 on channel businesschannel took 72.4µs" +orderer0.example.com | "2020-10-14 19:02:13.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-10-14 19:02:13.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " +orderer0.example.com | "2020-10-14 19:02:13.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +orderer0.example.com | "2020-10-14 19:02:13.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:13.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f9 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +orderer0.example.com | "2020-10-14 19:02:14.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +orderer0.example.com | "2020-10-14 19:02:14.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fb Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2020-10-14 19:02:14.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fc Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +orderer0.example.com | "2020-10-14 19:02:14.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.3µs " +orderer0.example.com | "2020-10-14 19:02:14.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " +orderer0.example.com | "2020-10-14 19:02:14.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ff Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1500 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1501 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1502 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2020-10-14 19:02:14.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1503 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +orderer0.example.com | "2020-10-14 19:02:14.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1504 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +orderer0.example.com | "2020-10-14 19:02:14.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1505 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2020-10-14 19:02:14.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1506 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.5µs " +orderer0.example.com | "2020-10-14 19:02:14.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1507 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +orderer0.example.com | "2020-10-14 19:02:14.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1508 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:14.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1509 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150b Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +orderer0.example.com | "2020-10-14 19:02:15.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +orderer0.example.com | "2020-10-14 19:02:15.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150d Sending msg of 28 bytes to 2 on channel businesschannel took 51.2µs" +orderer0.example.com | "2020-10-14 19:02:15.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150e Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-10-14 19:02:15.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1510 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2020-10-14 19:02:15.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1511 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " +orderer0.example.com | "2020-10-14 19:02:15.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1512 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1513 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1514 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +orderer0.example.com | "2020-10-14 19:02:15.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1515 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.5µs " +orderer0.example.com | "2020-10-14 19:02:15.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1516 Sending msg of 28 bytes to 2 on channel businesschannel took 70.8µs" +orderer0.example.com | "2020-10-14 19:02:15.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1517 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +orderer0.example.com | "2020-10-14 19:02:15.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1518 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +orderer0.example.com | "2020-10-14 19:02:15.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1519 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.3µs " +orderer0.example.com | "2020-10-14 19:02:15.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:15.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.1µs " +orderer0.example.com | "2020-10-14 19:02:16.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151e Sending msg of 28 bytes to 3 on channel testchainid took 99.1µs" +orderer0.example.com | "2020-10-14 19:02:16.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151f Sending msg of 28 bytes to 2 on channel businesschannel took 265.1µs" +orderer0.example.com | "2020-10-14 19:02:16.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1520 Sending msg of 28 bytes to 3 on channel businesschannel took 6.7µs" +orderer0.example.com | "2020-10-14 19:02:16.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1521 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.8µs " +orderer0.example.com | "2020-10-14 19:02:16.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1522 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +orderer0.example.com | "2020-10-14 19:02:16.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1523 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1524 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.217 UTC [orderer.common.server] Deliver -> DEBU 1525 Starting new Deliver handler" +peer1.org2.example.com | [1116 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1117 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1118 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1119 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [111a 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [111b 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [111c 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [111d 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [111e 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [111f 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 gate 1602702086961793400 evaluation starts +peer1.org2.example.com | [1120 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1121 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1122 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1123 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 principal evaluation fails +peer1.org2.example.com | [1124 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d6fa0 gate 1602702086961793400 evaluation fails +peer1.org2.example.com | [1125 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1126 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1127 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1128 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 gate 1602702086963192300 evaluation starts +peer1.org2.example.com | [1129 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [112a 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [112b 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 principal matched by identity 0 +peer1.org2.example.com | [112c 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [112d 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [112e 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [112f 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039d7510 gate 1602702086963192300 evaluation succeeds +peer1.org2.example.com | [1130 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1131 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1132 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1133 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1134 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1135 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [faa 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [fab 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fac 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [fad 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fae 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [faf 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [fb0 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 gate 1602702082578834500 evaluation starts +peer0.org2.example.com | [fb1 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fb2 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [fb3 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 principal matched by identity 0 +peer0.org2.example.com | [fb4 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer0.org2.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer0.org2.example.com | [fb5 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer0.org2.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer0.org2.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer0.org2.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer0.org2.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer0.org2.example.com | [fb6 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fb7 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6c370 gate 1602702082578834500 evaluation succeeds +peer0.org2.example.com | [fb8 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fb9 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fba 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fbb 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [fbc 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [fbd 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [fbe 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [fbf 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [fc0 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [fc1 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fc2 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fc3 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fc4 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [fc5 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fc6 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fc7 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fc8 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f2e 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [f2f 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f30 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f31 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f32 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f33 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f34 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 gate 1602702077973506700 evaluation starts +peer0.org1.example.com | [f35 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f36 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [f37 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 principal matched by identity 0 +peer0.org1.example.com | [f38 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [f39 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [f3a 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f3b 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 gate 1602702077973506700 evaluation succeeds +peer0.org1.example.com | [f3c 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f3d 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f3e 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f3f 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f40 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f41 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [f42 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [f43 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f44 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f45 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f46 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f47 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f48 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f49 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4a 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4b 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f4c 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.217 UTC [common.deliver] Handle -> DEBU 1526 Starting new deliver loop for 172.18.0.9:40146" +orderer0.example.com | "2020-10-14 19:02:16.217 UTC [common.deliver] Handle -> DEBU 1527 Attempting to read seek info message from 172.18.0.9:40146" +orderer0.example.com | "2020-10-14 19:02:16.233 UTC [orderer.common.server] Broadcast -> DEBU 1528 Starting new Broadcast handler" +orderer0.example.com | "2020-10-14 19:02:16.233 UTC [orderer.common.broadcast] Handle -> DEBU 1529 Starting new broadcast loop for 172.18.0.9:40148" +orderer0.example.com | "2020-10-14 19:02:16.234 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 152a [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:40148" +orderer0.example.com | "2020-10-14 19:02:16.235 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 152b Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 1530 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func1 -> DEBU 1531 0xc001298850 gate 1602702136237958300 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1532 0xc001298850 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1533 0xc001298850 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1534 0xc001298850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1535 0xc001298850 principal evaluation fails" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [cauthdsl] func1 -> DEBU 1536 0xc001298850 gate 1602702136237958300 evaluation fails" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [policies] Evaluate -> DEBU 1537 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.238 UTC [policies] Evaluate -> DEBU 1538 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] func1 -> DEBU 1539 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153a Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1136 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | [ea8 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [fc9 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > alive: alive: alive:<\250\313\257v!\370p\312\275\023~)HE,\007\020\013\245\320i\"BM\030N\353\370\361\212\002 5\341.n\017\263\272!&\223f\236\225\234\316\365\325N\221pU\250S`\253\263Q6\202\277\225C" > +peer0.org1.example.com | [f4d 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [ea9 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [fca 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [f4e 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [cauthdsl] func1 -> DEBU 153f 0xc001299540 gate 1602702136239495900 evaluation starts" +peer1.org2.example.com | [1137 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | [eaa 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [fcb 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f4f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1540 0xc001299540 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | [eab 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fcc 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f50 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1541 0xc001299540 processing identity 0 with bytes of fe2870" +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | [eac 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fcd 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f51 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1542 0xc001299540 principal matched by identity 0" +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | [ead 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fce 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [f52 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [msp.identity] Verify -> DEBU 1543 Verify: digest = 00000000 e0 e0 13 81 f4 de a2 97 82 d0 3d c5 74 cf 58 d5 |..........=.t.X.| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [eae 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [fcf 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f53 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | 00000010 04 2f 67 7f 1b b2 65 94 9e ff 55 9d 4c 6b 56 88 |./g...e...U.LkV.|" +peer1.org2.example.com | [1138 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [eaf 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fd1 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f54 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.239 UTC [msp.identity] Verify -> DEBU 1544 Verify: sig = 00000000 30 44 02 20 5d ee 7f ae 93 b4 86 4a a3 42 8c 17 |0D. ]......J.B..| +peer1.org2.example.com | [1139 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [eb0 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fd0 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [fd3 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fd2 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f55 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [eb1 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fd4 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f56 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 db 0e fa 26 b2 d7 39 bf d1 a6 fb ed 69 ac f7 18 |...&..9.....i...| +peer1.org2.example.com | [113a 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eb2 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [fd5 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f57 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000020 b6 35 27 4e 02 20 26 1a e1 a3 70 1c a5 fd f5 3a |.5'N. &...p....:| +peer1.org2.example.com | [113b 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eb3 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +peer0.org2.example.com | [fd6 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 ca 9f 03 91 e2 b5 3d 1f e0 68 6f b4 54 76 91 27 |......=..ho.Tv.'| +peer1.org2.example.com | [113c 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eb4 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [fd7 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000040 b1 c0 60 9c ae d1 |..`...|" +peer0.org1.example.com | [f58 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [113d 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [eb5 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fd8 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [cauthdsl] func2 -> DEBU 1545 0xc001299540 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [f59 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [113e 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eb6 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer0.org1.example.com:7051]] +peer1.org1.example.com | [eb7 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eb8 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f5a 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [113f 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [eb9 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [fd9 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [cauthdsl] func1 -> DEBU 1546 0xc001299540 gate 1602702136239495900 evaluation succeeds" +peer0.org1.example.com | [f5b 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 gate 1602702078124319800 evaluation starts +peer1.org1.example.com | [eba 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [fda 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1547 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [f5c 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f5d 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1140 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fdb 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1549 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer1.org2.example.com | [1141 10-14 19:01:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [fdc 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154b Signature set satisfies policy /Channel/Writers" +peer0.org1.example.com | [f5e 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 principal matched by identity 0 +peer1.org1.example.com | [ebb 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1142 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [fdd 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org1.example.com | [f5f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer1.org1.example.com | [ebc 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1143 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 gate 1602702086971517300 evaluation starts +peer0.org2.example.com | [fde 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154d Adding to config map: [Group] /Channel" +peer0.org1.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer1.org1.example.com | [ebd 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1144 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [fdf 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154e Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | [f60 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer1.org1.example.com | [ebe 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1145 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [fe0 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer1.org1.example.com | [ebf 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1146 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1550 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org2.example.com | [fe1 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer1.org1.example.com | [ec0 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1147 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 principal evaluation fails +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1551 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [fe2 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer1.org1.example.com | [ec1 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1148 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3740 gate 1602702086971517300 evaluation fails +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1552 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [fe3 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer1.org1.example.com | [ec2 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | [1149 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1553 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | [fe4 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f61 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [114a 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1554 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [fe5 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [f62 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 gate 1602702078124319800 evaluation succeeds +peer1.org1.example.com | [ec3 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | [114b 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1555 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | [fe6 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 gate 1602702082649998600 evaluation starts +peer0.org1.example.com | [f63 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | [114c 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 gate 1602702086972781200 evaluation starts +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1556 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | [fe7 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f64 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | [114d 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1557 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | [fe8 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [f65 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | [114e 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1558 Adding to config map: [Group] /Channel" +peer0.org2.example.com | [fe9 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 principal matched by identity 0 +peer0.org1.example.com | [f66 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [114f 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1559 Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | [fea 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | [f67 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ec4 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1150 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [f68 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155a Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [ec5 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [feb 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | [f69 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155b Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [ec6 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1151 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | [f6a 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155c Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org1.example.com | [ec7 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | [f6b 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org1.example.com | [ec8 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | [f6c 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org1.example.com | [ec9 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [f6d 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 155f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org1.example.com | [eca 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [fec 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f6e 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1560 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [ecb 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1152 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [fed 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aaa750 gate 1602702082649998600 evaluation succeeds +peer0.org1.example.com | [f6f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1561 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org1.example.com | [ecc 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 gate 1602702082293751700 evaluation starts +peer1.org2.example.com | [1153 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f3cb0 gate 1602702086972781200 evaluation succeeds +peer0.org2.example.com | [fee 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f70 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1562 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | [ecd 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1154 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [fef 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f71 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1563 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | [ece 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1155 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ff0 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f72 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1564 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org1.example.com | [ecf 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 principal matched by identity 0 +peer1.org2.example.com | [1156 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ff1 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f73 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1565 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1566 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [ff2 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | [f74 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1157 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org1.example.com | [ed0 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | [1158 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1159 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [115a 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | [f75 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f76 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > alive: +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 1569 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | [f77 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff3 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | [115b 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ed1 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 156a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [f78 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | [115c 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 156b Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | [f79 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | [115d 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [common.configtx] policyForItem -> DEBU 156c Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | [f7a 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | [115e 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156d Manager Channel looking up path []" +peer0.org1.example.com | [f7b 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [115f 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156e Manager Channel has managers Application" +peer0.org1.example.com | [f7c 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff4 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | [1160 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 gate 1602702086979430700 evaluation starts +peer1.org1.example.com | [ed2 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156f Manager Channel has managers Orderer" +peer0.org1.example.com | [f7d 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1161 10-14 19:01:26.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [ed3 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c34330 gate 1602702082293751700 evaluation succeeds +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1570 Manager Channel looking up path [Application]" +peer0.org1.example.com | [f7e 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff5 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | [1162 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [ed4 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1571 Manager Channel has managers Application" +peer0.org1.example.com | [f7f 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | [1163 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [ed5 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1572 Manager Channel has managers Orderer" +peer0.org1.example.com | [f80 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | [1165 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 principal evaluation fails +peer1.org1.example.com | [ed6 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1573 Manager Channel/Application looking up path []" +peer0.org1.example.com | [f81 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | [1166 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a10eb0 gate 1602702086979430700 evaluation fails +peer1.org1.example.com | [ed7 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1574 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | [f82 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1164 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed8 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [policies] Manager -> DEBU 1575 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | [f83 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1167 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ed9 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1576 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | [f84 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff6 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1168 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [eda 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1577 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [f85 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff7 10-14 19:01:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1169 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [edb 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1578 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | [f86 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [ff8 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [116a 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [edc 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [cauthdsl] deduplicate -> WARN 1579 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org1.example.com | [f87 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff9 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [116c 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [116b 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [116d 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 gate 1602702086981943300 evaluation starts +peer0.org2.example.com | [ffa 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f88 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [116e 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [cauthdsl] func1 -> DEBU 157a 0xc000c6cf90 gate 1602702136246565900 evaluation starts" +peer0.org2.example.com | [ffb 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ffc 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ffd 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [f89 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157b 0xc000c6cf90 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | [f8a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ffe 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 gate 1602702082662596100 evaluation starts +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157c 0xc000c6cf90 processing identity 0 with bytes of fe2870" +peer1.org2.example.com | [116f 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [edd 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f8b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [fff 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157d 0xc000c6cf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer1.org2.example.com | [1170 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1171 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [ede 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1000 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [edf 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f8c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1001 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:02:16.247 UTC [cauthdsl] func2 -> DEBU 157e 0xc000c6cf90 processing identity 1 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.247 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 157f Checking if identity has been named explicitly as an admin for Org2MSP" +peer1.org1.example.com | [ee0 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 gate 1602702082298828100 evaluation starts +orderer0.example.com | "2020-10-14 19:02:16.247 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1580 Checking if identity carries the admin ou for Org2MSP" +peer1.org1.example.com | [ee1 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f8d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1002 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +orderer0.example.com | "2020-10-14 19:02:16.247 UTC [msp] Validate -> DEBU 1581 MSP Org2MSP validating identity" +orderer0.example.com | "2020-10-14 19:02:16.247 UTC [msp] getCertificationChain -> DEBU 1582 MSP Org2MSP getting certification chain" +peer1.org1.example.com | [ee2 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [f8e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 gate 1602702078266409900 evaluation starts +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +orderer0.example.com | "2020-10-14 19:02:16.248 UTC [msp] hasOURole -> DEBU 1583 MSP Org2MSP checking if the identity is a client" +peer1.org2.example.com | [1172 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ee3 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f8f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1003 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +orderer0.example.com | "2020-10-14 19:02:16.248 UTC [msp] getCertificationChain -> DEBU 1584 MSP Org2MSP getting certification chain" +peer1.org2.example.com | [1173 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [ee4 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [ee5 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 principal matched by identity 0 +peer0.org1.example.com | [f90 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:02:16.248 UTC [cauthdsl] func2 -> DEBU 1585 0xc000c6cf90 principal matched by identity 1" +peer1.org1.example.com | [ee6 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f91 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 principal matched by identity 0 +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +orderer0.example.com | "2020-10-14 19:02:16.248 UTC [msp.identity] Verify -> DEBU 1586 Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +peer1.org2.example.com | [1174 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 principal matched by identity 0 +peer1.org1.example.com | [ee7 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | [f92 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +orderer0.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.|" +peer1.org2.example.com | [1176 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +orderer0.example.com | "2020-10-14 19:02:16.248 UTC [msp.identity] Verify -> DEBU 1587 Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +orderer0.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +peer1.org1.example.com | [ee8 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | [f93 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +orderer0.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +peer1.org2.example.com | [1175 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer0.org2.example.com | [1004 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer0.org2.example.com | [1005 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ace730 gate 1602702082662596100 evaluation succeeds +orderer0.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..|" +peer1.org2.example.com | [1177 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [cauthdsl] func2 -> DEBU 1588 0xc000c6cf90 principal evaluation succeeds for identity 1" +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | [ee9 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer0.org2.example.com | [1006 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [cauthdsl] func1 -> DEBU 1589 0xc000c6cf90 gate 1602702136246565900 evaluation succeeds" +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | [eea 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [f94 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f95 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 gate 1602702078266409900 evaluation succeeds +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | [eeb 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f96 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1007 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [eec 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f97 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1008 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1009 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer1.org1.example.com | [eed 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f98 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [100a 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1178 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [eee 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [f99 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [100b 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer1.org2.example.com | [1179 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a11420 gate 1602702086981943300 evaluation succeeds +peer1.org1.example.com | [eef 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f9a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [100c 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [100d 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [100e 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [100f 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1010 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1011 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1012 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1013 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1014 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1015 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 gate 1602702082667552800 evaluation starts +peer0.org2.example.com | [1016 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1017 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1018 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 principal matched by identity 0 +peer0.org2.example.com | [1019 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [101a 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [101b 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [101c 10-14 19:01:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acfb80 gate 1602702082667552800 evaluation succeeds +peer0.org2.example.com | [101d 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [101e 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [101f 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1020 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1021 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1022 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1023 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1024 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1025 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1026 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1027 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1028 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1029 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 gate 1602702082675582300 evaluation starts +peer0.org2.example.com | [102a 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [102b 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [102c 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 principal matched by identity 0 +peer0.org2.example.com | [102d 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [102e 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [102f 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1030 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d80 gate 1602702082675582300 evaluation succeeds +peer0.org2.example.com | [1031 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1032 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1033 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1034 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1035 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1036 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1037 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1038 10-14 19:01:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1039 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [103a 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [103b 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [103c 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [103d 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [103e 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103f 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1040 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1041 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1042 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1043 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1044 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1045 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1046 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1047 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 gate 1602702082683173100 evaluation starts +peer0.org2.example.com | [1048 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1049 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [104a 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 principal matched by identity 0 +peer0.org2.example.com | [104b 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [104c 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | [117a 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f9b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [f9c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [f9d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [f9e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [f9f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa0 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa1 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fa2 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [fa3 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fa4 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fa5 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fa6 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fa7 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > alive: +peer0.org1.example.com | [fa8 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [fa9 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [faa 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [fab 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fac 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fad 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fae 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [faf 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [fb0 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [fb1 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fb2 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [fb3 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 db 0d 9a 09 c4 59 85 a2 59 36 e6 a5 d7 49 9d |......Y..Y6...I.| +peer0.org1.example.com | 00000010 b8 ea 73 20 41 d9 ff d9 c7 0b 81 63 23 02 3c 6b |..s A......c#. DEBU Verify: sig = 00000000 30 44 02 20 0a e9 0e a3 83 63 3d 76 94 03 65 98 |0D. .....c=v..e.| +peer0.org1.example.com | 00000010 1c 8d da 82 89 10 c7 73 19 fc f7 9b 0b 33 83 83 |.......s.....3..| +peer0.org1.example.com | 00000020 cb 6c 51 84 02 20 44 8b fb 3a c4 f4 20 e1 41 f1 |.lQ.. D..:.. .A.| +peer0.org1.example.com | 00000030 32 53 ee a2 55 8c 41 7b 57 5b 53 1e 27 a8 25 e5 |2S..U.A{W[S.'.%.| +peer0.org1.example.com | 00000040 a4 1d fe 75 c8 6b |...u.k| +peer0.org1.example.com | [fb5 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fb6 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fb7 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fb8 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [fb9 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [fba 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [fbb 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [fbc 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [fbd 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [fbe 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [fbf 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [fc0 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fc1 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [fc2 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [104d 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [104e 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b05200 gate 1602702082683173100 evaluation succeeds +peer0.org2.example.com | [104f 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1050 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1051 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1052 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1053 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1054 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1055 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1056 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1057 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1058 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1059 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [105a 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [105b 10-14 19:01:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 gate 1602702082689353800 evaluation starts +peer0.org2.example.com | [105c 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [105d 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [105e 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 principal matched by identity 0 +peer0.org2.example.com | [105f 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1060 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1061 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1062 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b24400 gate 1602702082689353800 evaluation succeeds +peer0.org2.example.com | [1063 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1064 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1065 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1066 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1067 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1068 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1069 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [106a 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | [117b 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [117c 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [117d 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [117e 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [117f 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1180 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1181 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1182 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1183 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1184 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1185 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1186 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1187 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1188 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1189 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [118a 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [118b 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [118c 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 gate 1602702086993940600 evaluation starts +peer1.org2.example.com | [118d 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [118e 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [118f 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1190 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 principal evaluation fails +peer1.org2.example.com | [1191 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a395a0 gate 1602702086993940600 evaluation fails +peer1.org2.example.com | [1192 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1193 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1194 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1195 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 gate 1602702086995042200 evaluation starts +peer1.org2.example.com | [1196 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1197 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1198 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 principal matched by identity 0 +peer1.org2.example.com | [1199 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [fc3 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [fc4 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [fc5 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer0.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer0.org1.example.com | [fc6 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer0.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer0.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer0.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer0.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer0.org1.example.com | [fc7 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [fc8 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 74 dc 00 fd a7 40 4e 8c 83 0e 8d |0D. .t....@N....| +peer0.org1.example.com | 00000010 64 51 be 70 fa a4 67 10 12 c3 7a f4 1d ac b7 23 |dQ.p..g...z....#| +peer0.org1.example.com | 00000020 d2 f9 30 7d 02 20 52 bd ad c0 40 23 5c a1 81 26 |..0}. R...@#\..&| +peer0.org1.example.com | 00000030 ae 5b 30 46 fa 3b fb 92 04 92 63 72 a8 30 40 2c |.[0F.;....cr.0@,| +peer0.org1.example.com | 00000040 3b 1c 10 e5 08 52 |;....R| +peer0.org1.example.com | [fc9 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [fca 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [fcb 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [fcc 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [fcd 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [fce 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fcf 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd0 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd1 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [fd2 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd3 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd4 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fd5 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [fd6 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [fd7 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd8 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [fd9 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fda 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [fdb 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fdc 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [fdd 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fde 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [fdf 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ef0 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ef1 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c35530 gate 1602702082298828100 evaluation succeeds +peer1.org1.example.com | [ef2 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ef3 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ef4 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ef5 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ef7 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [ef8 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [ef9 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [efa 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [efb 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [efc 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [efd 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [efe 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [eff 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f00 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [119a 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [119b 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [119c 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b10 gate 1602702086995042200 evaluation succeeds +peer1.org2.example.com | [119d 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [119e 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [119f 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11a0 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11a1 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11a2 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11a3 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [11a4 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11a5 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11a6 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [11a7 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [11a8 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [11a9 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 gate 1602702086997366700 evaluation starts +peer1.org2.example.com | [11aa 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11ab 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [11ac 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11ad 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 principal evaluation fails +peer1.org2.example.com | [11ae 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a54d10 gate 1602702086997366700 evaluation fails +peer1.org2.example.com | [11af 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11b0 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11b1 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [11b2 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 gate 1602702086998267700 evaluation starts +peer1.org2.example.com | [11b3 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11b4 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [11b5 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 principal matched by identity 0 +peer1.org2.example.com | [11b6 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [11b7 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [11b8 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [11b9 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a55280 gate 1602702086998267700 evaluation succeeds +peer1.org2.example.com | [11ba 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11bb 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [106b 10-14 19:01:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [106c 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [106d 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106e 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106f 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1070 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1071 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1072 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1073 10-14 19:01:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1074 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1075 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 bc bf 38 ba 39 a9 eb 5d db 48 f3 10 86 c0 5e |...8.9..].H....^| +peer0.org2.example.com | 00000010 ea 0b 20 e5 12 1c 7c 9f 92 7d 2e f3 c2 8e e2 ae |.. ...|..}......| +peer0.org2.example.com | [1076 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c1 53 4e 88 f0 7c 5d 48 fa 8e 1e |0D. 7.SN..|]H...| +peer0.org2.example.com | 00000010 7d 96 fd 8f d2 09 b4 94 e1 84 d3 f1 14 27 93 9a |}............'..| +peer1.org1.example.com | [f01 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f02 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f03 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f04 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f05 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f06 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f07 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 gate 1602702082311018500 evaluation starts +peer1.org1.example.com | [ef6 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [f08 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f09 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [f0a 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 principal matched by identity 0 +peer1.org1.example.com | [f0b 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [f0c 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [f0d 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f0e 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5ddc0 gate 1602702082311018500 evaluation succeeds +peer1.org1.example.com | [f0f 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f10 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f11 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f12 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f13 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f14 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f15 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f16 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f17 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f18 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f19 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [11bc 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11bd 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11be 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [11bf 10-14 19:01:26.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [11c0 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [11c1 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [11c2 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c3 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11c4 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11c5 10-14 19:01:27.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c6 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [11c7 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [11c8 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [11c9 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610061801 +peer1.org2.example.com | [11ca 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B7AE41D37878EEA1EE2C229A320730C451670D7E7087FAC98FC53160219FFB5 +peer1.org2.example.com | [11cb 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [11cc 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11cd 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11ce 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11cf 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d0 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [11d1 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d2 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d3 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [11d4 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11d5 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11d6 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d7 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d8 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11d9 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11da 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11db 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11dc 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [11dd 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [11de 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11df 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11e0 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11e1 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 63 1a b4 2e 02 20 6a 7d 8b 5b 3e 9c 9e 13 59 d3 |c.... j}.[>...Y.| +peer0.org2.example.com | 00000030 de 62 ab 4a d2 b9 3f e2 cd 21 ab 0f 07 19 d0 f0 |.b.J..?..!......| +peer0.org2.example.com | 00000040 97 a7 d5 f6 f7 07 |......| +peer0.org2.example.com | [1077 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1078 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1079 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [107a 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [107b 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [107c 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [107d 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [107e 10-14 19:01:23.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [107f 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1080 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161015 +peer0.org2.example.com | [1081 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FF8BDFEA54A6BB2209A91389FDE06106C4C2E7266100C4F8488D3C116DD7D218 +peer0.org2.example.com | [1082 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1083 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1084 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1085 10-14 19:01:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1086 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1087 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1088 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1089 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108b 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [108c 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108e 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [108f 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [108a 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [108d 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1090 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1091 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1092 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1093 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1094 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1095 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1096 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1097 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 f1 d8 72 21 84 36 61 f6 c6 dc fa 5a 79 2c 28 |...r!.6a....Zy,(| +peer0.org2.example.com | 00000010 d8 99 9f 1a b8 00 43 dc 38 0b b6 02 7e 29 9f 22 |......C.8...~)."| +peer0.org2.example.com | [1098 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a2 31 32 4f 87 91 77 69 93 b4 98 |0D. $.12O..wi...| +peer0.org2.example.com | 00000010 f8 74 c2 94 cc 93 7c de 04 76 e8 7e 06 df 3a 8a |.t....|..v.~..:.| +peer0.org2.example.com | 00000020 28 d1 e0 16 02 20 50 bf 9c 48 7b e9 34 cb 5a e7 |(.... P..H{.4.Z.| +peer0.org2.example.com | 00000030 19 f8 8f 6e 47 81 cc b6 1a be 3d 2b a4 c1 1d ef |...nG.....=+....| +peer0.org2.example.com | 00000040 50 a8 79 c5 bd 1d |P.y...| +peer0.org2.example.com | [1099 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f1a 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f1b 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 gate 1602702082319282300 evaluation starts +peer1.org1.example.com | [f1c 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f1d 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [f1e 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 principal matched by identity 0 +peer1.org1.example.com | [f1f 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [f20 10-14 19:01:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [f21 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f22 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c7afc0 gate 1602702082319282300 evaluation succeeds +peer1.org1.example.com | [f23 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f24 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f25 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f26 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f27 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f28 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [f29 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f2a 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [f2b 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [f2c 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [f2d 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [f2e 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f2f 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f30 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f31 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f32 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f33 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f34 10-14 19:01:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f35 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f36 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 gate 1602702082330268600 evaluation starts +peer1.org1.example.com | [f37 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [cauthdsl] deduplicate -> WARN 158d De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [cauthdsl] func1 -> DEBU 158e 0xc000c6dd70 gate 1602702136250488200 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:16.250 UTC [cauthdsl] func2 -> DEBU 158f 0xc000c6dd70 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-10-14 19:02:16.251 UTC [cauthdsl] func2 -> DEBU 1590 0xc000c6dd70 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.251 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1591 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.251 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1592 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.251 UTC [msp] Validate -> DEBU 1593 MSP Org1MSP validating identity" +orderer0.example.com | "2020-10-14 19:02:16.251 UTC [msp] getCertificationChain -> DEBU 1594 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:16.252 UTC [msp] hasOURole -> DEBU 1595 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-10-14 19:02:16.252 UTC [msp] getCertificationChain -> DEBU 1596 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:16.252 UTC [cauthdsl] func2 -> DEBU 1597 0xc000c6dd70 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:16.252 UTC [msp.identity] Verify -> DEBU 1598 Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +orderer0.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o|" +orderer0.example.com | "2020-10-14 19:02:16.252 UTC [msp.identity] Verify -> DEBU 1599 Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +orderer0.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +orderer0.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +orderer0.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +orderer0.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.|" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [cauthdsl] func2 -> DEBU 159a 0xc000c6dd70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [cauthdsl] func1 -> DEBU 159b 0xc000c6dd70 gate 1602702136250488200 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159e Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [common.configtx] verifyDeltaSet -> DEBU 15a0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.253 UTC [common.configtx] verifyDeltaSet -> DEBU 15a1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.254 UTC [common.configtx] verifyDeltaSet -> DEBU 15a2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.254 UTC [common.configtx] verifyDeltaSet -> DEBU 15a3 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.254 UTC [common.configtx] recurseConfigMap -> DEBU 15a4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15aa Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15ab Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ac Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ad Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ae Setting policy for key Admins to " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15af Setting policy for key Endorsement to " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b0 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b1 Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b2 Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15ba Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15bb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15bc Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.channelconfig] NewStandardValues -> DEBU 15bd Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15be Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bf Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c0 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c1 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c2 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.259 UTC [common.channelconfig] NewStandardValues -> DEBU 15c3 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c4 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c5 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] NewStandardValues -> DEBU 15c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c7 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] NewStandardValues -> DEBU 15c8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c9 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] Validate -> DEBU 15ca Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [common.channelconfig] validateMSP -> DEBU 15cb Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [msp] newBccspMsp -> DEBU 15cc Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.260 UTC [msp] New -> DEBU 15cd Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.261 UTC [msp] Setup -> DEBU 15ce Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [msp.identity] newIdentity -> DEBU 15cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15d0 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15d2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.262 UTC [common.channelconfig] Validate -> DEBU 15d4 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.263 UTC [common.channelconfig] validateMSP -> DEBU 15d5 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.263 UTC [msp] newBccspMsp -> DEBU 15d6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.263 UTC [msp] New -> DEBU 15d7 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.263 UTC [msp] Setup -> DEBU 15d8 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.263 UTC [msp.identity] newIdentity -> DEBU 15d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] NewStandardValues -> DEBU 15da Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15db Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] NewStandardValues -> DEBU 15dc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15dd Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] Validate -> DEBU 15de Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-10-14 19:02:16.264 UTC [common.channelconfig] validateMSP -> DEBU 15df Setting up MSP for org Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.265 UTC [msp] newBccspMsp -> DEBU 15e0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.265 UTC [msp] New -> DEBU 15e1 Creating Cache-MSP instance" +peer1.org2.example.com | [11e2 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11e3 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [11e4 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd f5 a5 94 0a 89 9c 64 ac 36 0b 2d 1b e8 35 0e |.......d.6.-..5.| +peer1.org2.example.com | 00000010 82 40 32 94 8f 80 0d 72 36 a2 d6 0f f5 3a b9 a7 |.@2....r6....:..| +peer1.org2.example.com | [11e5 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 0e b9 2c e6 e4 90 4e 8b 28 30 |0E.!....,...N.(0| +peer1.org2.example.com | 00000010 60 2a 7f 6e 30 93 84 66 5c bb 56 92 6e 11 fc 2c |`*.n0..f\.V.n..,| +peer1.org2.example.com | 00000020 99 18 84 ce 13 02 20 35 c5 b8 71 99 80 08 6b 88 |...... 5..q...k.| +peer1.org2.example.com | 00000030 21 2f 86 88 6a e0 55 51 ff 5a cc 9e 62 f8 45 67 |!/..j.UQ.Z..b.Eg| +peer1.org2.example.com | 00000040 b5 1e 82 8f 61 62 8f |....ab.| +peer1.org2.example.com | [11e6 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11e7 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [11e8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [11e9 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [11ea 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [11eb 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ec 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ed 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ee 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11ef 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f0 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f1 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [11f2 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11f3 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11f4 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11f5 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [11f6 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [11f7 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11f8 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [11f9 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [11fa 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109a 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [109b 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [109c 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [109d 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [109e 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [109f 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10a0 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10a1 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a2 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a3 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a4 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10a5 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10a6 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10a8 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10a9 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10a7 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10aa 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ab 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10ac 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ad 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10ae 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10af 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10b0 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10b1 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10b2 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10b3 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f38 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [f39 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 principal matched by identity 0 +peer1.org1.example.com | [f3a 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [f3b 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [f3c 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f3d 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c931f0 gate 1602702082330268600 evaluation succeeds +peer1.org1.example.com | [f3e 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f3f 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f40 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f41 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f42 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f43 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f44 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f45 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f46 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f47 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f48 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f49 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f4a 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 gate 1602702082336755900 evaluation starts +peer1.org1.example.com | [f4b 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [f4c 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [f4d 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 principal matched by identity 0 +peer1.org1.example.com | [f4e 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [f4f 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [f50 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f51 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb43f0 gate 1602702082336755900 evaluation succeeds +peer1.org1.example.com | [f52 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f53 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f54 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f55 10-14 19:01:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f56 10-14 19:01:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f57 10-14 19:01:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [f58 10-14 19:01:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [f59 10-14 19:01:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f5a 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [f5b 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f5c 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [f5d 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f5e 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [f60 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f61 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f62 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f63 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [f5f 10-14 19:01:22.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f64 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f65 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f66 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f67 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f68 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f6a 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f69 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f6b 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f6c 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [f6d 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f6e 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f6f 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f70 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f71 10-14 19:01:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [10b4 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10b5 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10b6 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [10b7 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10b8 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [10b9 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ba 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10bb 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10bc 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10bd 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10be 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 gate 1602702085422754000 evaluation starts +peer0.org2.example.com | [10bf 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10c0 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [10c1 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 principal matched by identity 0 +peer0.org2.example.com | [10c2 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 93 01 12 a9 a0 f9 b7 66 2d 1a c5 72 5c 81 c5 |........f-..r\..| +peer0.org2.example.com | 00000010 89 a3 8e af 23 6d 2c 59 97 c6 dd ab d3 ca 57 ee |....#m,Y......W.| +peer0.org2.example.com | [10c3 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a ea eb f7 65 a5 be a5 71 d5 09 c1 |0D. ....e...q...| +peer0.org2.example.com | 00000010 b7 10 6f 3b ce 9b f4 76 1f fc d1 6b 72 c7 c3 3c |..o;...v...kr..<| +peer0.org2.example.com | 00000020 c8 e7 a0 82 02 20 19 15 c0 19 84 79 47 95 42 e2 |..... .....yG.B.| +peer0.org2.example.com | 00000030 bb ee 7a 25 ff 21 c5 ab 0a a4 bb 32 64 56 91 64 |..z%.!.....2dV.d| +peer0.org2.example.com | 00000040 a6 d6 72 5d 60 28 |..r]`(| +peer0.org2.example.com | [10c4 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [10c5 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a91a40 gate 1602702085422754000 evaluation succeeds +peer0.org2.example.com | [10c6 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10c7 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10c8 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10c9 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10ca 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10cb 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [10cc 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [10cd 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [10ce 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-10-14 19:02:16.265 UTC [msp] Setup -> DEBU 15e2 Setting up MSP instance Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.265 UTC [msp.identity] newIdentity -> DEBU 15e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15e4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e5 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e6 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e7 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e9 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15eb Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ec Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15ed Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ee Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.268 UTC [common.channelconfig] validateMSP -> DEBU 15ef Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.269 UTC [msp] newBccspMsp -> DEBU 15f0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.269 UTC [msp] New -> DEBU 15f1 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.269 UTC [msp] Setup -> DEBU 15f2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:16.270 UTC [msp.identity] newIdentity -> DEBU 15f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.270 UTC [msp] Setup -> DEBU 15f4 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-10-14 19:02:16.270 UTC [msp] Setup -> DEBU 15f5 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-10-14 19:02:16.270 UTC [policies] NewManagerImpl -> DEBU 15f6 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f7 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f8 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f9 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fa Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fb Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fc Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fd Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fe Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 15ff Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1600 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1601 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1602 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1603 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1604 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1605 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1606 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1607 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1608 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1609 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1610 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1611 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1612 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1625 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [10cf 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10d0 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10d1 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10d2 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d3 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d4 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d5 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d6 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d7 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10d8 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10d9 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10da 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10dc 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10dd 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10de 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e0 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10df 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e1 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e2 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e3 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10db 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e4 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e5 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e6 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e7 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10e8 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [10e9 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ea 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [10eb 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [10ec 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10ed 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [10ee 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10ef 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [10f0 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10f1 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10f2 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10f3 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 gate 1602702085612745500 evaluation starts +peer0.org2.example.com | [10f4 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10f5 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [10f6 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 principal matched by identity 0 +peer0.org2.example.com | [10f7 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 03 12 73 8d a0 ec 50 83 9e 84 e9 f9 b9 f5 0f |g..s...P........| +peer0.org2.example.com | 00000010 eb e3 68 4c 59 71 f0 4d 3f 19 a0 87 83 9f 60 76 |..hLYq.M?.....`v| +peer0.org2.example.com | [10f8 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d1 c2 2c e0 47 0d 69 36 f9 41 |0E.!....,.G.i6.A| +peer0.org2.example.com | 00000010 a1 b4 8e 83 02 ec be 66 5b a1 6d 86 4c 2c c4 2f |.......f[.m.L,./| +peer0.org2.example.com | 00000020 27 39 72 aa 72 02 20 09 ce 6b 31 b3 37 7e c6 a4 |'9r.r. ..k1.7~..| +peer0.org2.example.com | 00000030 23 42 58 0f a7 63 28 85 1e d9 09 92 34 d5 b3 d8 |#BX..c(.....4...| +peer0.org2.example.com | 00000040 d4 36 12 db d0 78 f2 |.6...x.| +peer0.org2.example.com | [10f9 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [10fa 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b69c40 gate 1602702085612745500 evaluation succeeds +peer0.org2.example.com | [10fb 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10fc 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [10fd 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10fe 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10ff 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1100 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1101 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1102 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1103 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1104 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1105 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1106 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1107 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1108 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1109 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [110a 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [110b 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110c 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110d 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110e 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [110f 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fe0 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [11fb 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [f72 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101B +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1626 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org2.example.com | [1110 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fe1 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11fc 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [f73 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 56F730926C8B9719863DB32B7013F1E1E337571FB7C8BA112824ECD6CB937B5F +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1627 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [1111 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fe2 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [11fd 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer1.org1.example.com | [f74 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1628 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [1112 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [fe3 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer1.org1.example.com | [f75 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1629 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | [1113 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fe4 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f76 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [1114 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [fe5 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f77 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162b Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162c Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162d Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org1.example.com | [f78 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [fe6 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1115 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162e Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | [f79 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11fe 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org1.example.com | [fe7 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1116 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [f7a 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer1.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org1.example.com | [fe8 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1630 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | [f7b 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org1.example.com | [fe9 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1117 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1631 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org1.example.com | [f7c 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org1.example.com | [fea 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [feb 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [fec 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7d 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11ff 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [fed 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1632 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [f7e 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [f7f 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1118 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fee 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1633 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [f80 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1119 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [111a 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fef 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1634 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org1.example.com | [f81 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [111b 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff0 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161015 +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1635 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org1.example.com | [f82 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [111c 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ff1 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F2934FC81566491FE927BF7AD451800499957FE373D91EF4FBABECD071C9ABB9 +peer1.org2.example.com | [1200 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 aa c6 05 b9 84 57 fb 59 53 a7 |0E.!.......W.YS.| +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org1.example.com | [f83 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [111d 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ff2 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 51 d4 e0 4e 57 fd cd 98 63 64 48 0a 45 37 66 06 |Q..NW...cdH.E7f.| +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org1.example.com | [f84 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [111e 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff3 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org1.example.com | [f85 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [111f 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1120 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff4 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org1.example.com | [f86 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1121 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ff5 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 80 34 26 47 14 02 20 3d db 2e 40 87 7c 2d ad 62 |.4&G.. =..@.|-.b| +orderer0.example.com | "2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org2.example.com | [1122 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000030 2e eb 96 c3 36 59 7b 88 f9 36 82 1c 1a fd a0 ae |....6Y{..6......| +peer0.org2.example.com | [1123 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [f87 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff6 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | 00000040 94 2e 67 c1 c6 82 5d |..g...]| +peer1.org1.example.com | [f88 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ff7 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ff8 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff9 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ffa 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [ffb 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffc 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [ffd 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffe 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [fff 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1000 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1001 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1002 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1003 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1004 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1005 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1006 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +peer0.org1.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +peer0.org1.example.com | [1007 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer0.org1.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer0.org1.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +peer0.org1.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +peer0.org1.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +peer0.org1.example.com | [1008 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1009 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f ca 80 f8 3d 1c 35 0e 05 c7 c0 ed |0D. ....=.5.....| +peer0.org1.example.com | 00000010 1c 03 56 ad 3a af 73 91 8f 83 ea aa 20 2c 38 27 |..V.:.s..... ,8'| +peer0.org1.example.com | 00000020 9f 68 8f 71 02 20 58 4c d8 b0 2f 33 8d ba 47 0a |.h.q. XL../3..G.| +peer0.org1.example.com | 00000030 be 83 97 2a 0c b0 cb 74 b6 be ed 17 1f ae b5 4a |...*...t.......J| +peer0.org1.example.com | 00000040 84 c9 72 56 62 1f |..rVb.| +peer0.org1.example.com | [100a 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [100b 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [100c 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [100d 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [100e 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [100f 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1010 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1011 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1012 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1013 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1014 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1015 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1016 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1017 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1018 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 gate 1602702078590495800 evaluation starts +peer0.org1.example.com | [1019 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [101a 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [101b 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [101c 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [101d 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 principal matched by identity 0 +peer0.org1.example.com | [101e 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +peer0.org1.example.com | 00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +peer0.org1.example.com | [101f 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +peer0.org1.example.com | 00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +peer0.org1.example.com | 00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +peer0.org1.example.com | 00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +peer0.org1.example.com | 00000040 70 f3 1b d2 74 b0 de |p...t..| +peer0.org1.example.com | [1020 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1021 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 gate 1602702078590495800 evaluation succeeds +peer0.org1.example.com | [1022 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1023 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1024 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1025 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1026 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1027 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1028 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1029 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +peer0.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +peer0.org1.example.com | [102a 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +peer0.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer0.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer0.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer0.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer0.org1.example.com | [102b 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [102c 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1645 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1646 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1647 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1648 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1649 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164a Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164b Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164c Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164d Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 164e As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 164f As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1650 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1651 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1652 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1653 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1654 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1655 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1656 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1657 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1658 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1659 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [common.capabilities] Supported -> DEBU 165a Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [common.capabilities] Supported -> DEBU 165b Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 165c Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 165d Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [msp.identity] Sign -> DEBU 165e Sign: plaintext: 0AEA060A1B08011A0608B8969DFC0522...3D1FE0686FB454769127B1C0609CAED1 " +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [msp.identity] Sign -> DEBU 165f Sign: digest: C61065BF2900E32B47A4A771862D3AFA07029F7E99B48105B17405B19F90461F " +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1660 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1661 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1664 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-10-14 19:02:16.275 UTC [msp] DeserializeIdentity -> DEBU 1665 Obtaining identity" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp.identity] newIdentity -> DEBU 1666 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [cauthdsl] func1 -> DEBU 1667 0xc0011e77c0 gate 1602702136277296600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 1668 0xc0011e77c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 1669 0xc0011e77c0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 166a Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp] Validate -> DEBU 166b MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp] getCertificationChain -> DEBU 166c MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 166d 0xc0011e77c0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp.identity] Verify -> DEBU 166e Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +orderer0.example.com | 00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.|" +orderer0.example.com | "2020-10-14 19:02:16.277 UTC [msp.identity] Verify -> DEBU 166f Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +orderer0.example.com | 00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +orderer0.example.com | 00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +orderer0.example.com | 00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +orderer0.example.com | 00000040 4d 58 92 4e a4 4a df |MX.N.J.|" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [cauthdsl] func2 -> DEBU 1670 0xc0011e77c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [cauthdsl] func1 -> DEBU 1671 0xc0011e77c0 gate 1602702136277296600 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1672 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1673 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1674 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1675 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1676 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1677 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [orderer.common.msgprocessor] Apply -> DEBU 1678 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] NewStandardValues -> DEBU 1679 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167a Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167b Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167c Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167d Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167e Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.279 UTC [common.channelconfig] NewStandardValues -> DEBU 167f Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:02:16.279 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1680 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:02:16.279 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1681 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.280 UTC [common.channelconfig] NewStandardValues -> DEBU 1682 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1683 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1684 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1685 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] Validate -> DEBU 1686 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] validateMSP -> DEBU 1687 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [msp] newBccspMsp -> DEBU 1688 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [msp] New -> DEBU 1689 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [msp] Setup -> DEBU 168a Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [msp.identity] newIdentity -> DEBU 168b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.282 UTC [common.channelconfig] NewStandardValues -> DEBU 168c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168d Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 168e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168f Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] Validate -> DEBU 1690 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] validateMSP -> DEBU 1691 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [msp] newBccspMsp -> DEBU 1692 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [msp] New -> DEBU 1693 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [msp] Setup -> DEBU 1694 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [msp.identity] newIdentity -> DEBU 1695 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1696 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1697 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1698 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1699 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.283 UTC [common.channelconfig] Validate -> DEBU 169a Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] validateMSP -> DEBU 169b Setting up MSP for org Org3MSP" +peer0.org2.example.com | [1124 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [102d 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [f89 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [msp] newBccspMsp -> DEBU 169c Creating BCCSP-based MSP instance" +peer1.org2.example.com | [1201 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1125 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [102e 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +peer1.org1.example.com | [f8a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [msp] New -> DEBU 169d Creating Cache-MSP instance" +peer1.org2.example.com | [1202 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1126 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +peer1.org1.example.com | [f8b 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [msp] Setup -> DEBU 169e Setting up MSP instance Org3MSP" +peer0.org2.example.com | [1127 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [102f 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer0.org2.example.com | [1128 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer1.org2.example.com | [1203 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1129 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [msp.identity] newIdentity -> DEBU 169f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [f8c 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1204 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [112a 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [f8d 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1205 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [112b 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [f8e 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 gate 1602702082438509700 evaluation starts +peer1.org2.example.com | [1206 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1030 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [f8f 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1207 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [112d 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1031 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [f90 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1208 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [112c 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1032 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f91 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 principal matched by identity 0 +peer1.org2.example.com | [1209 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [112e 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1033 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [f92 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer1.org2.example.com | [120a 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [112f 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1034 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer1.org2.example.com | [120b 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1130 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1036 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [f93 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer1.org2.example.com | [120c 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1131 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1035 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer1.org2.example.com | [120d 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1132 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1037 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer1.org2.example.com | [120e 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1133 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer1.org2.example.com | [1210 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1038 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +peer0.org2.example.com | [1134 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer1.org2.example.com | [120f 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +peer0.org2.example.com | [1135 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | [f94 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1211 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +peer0.org2.example.com | [1136 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | [f95 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cea500 gate 1602702082438509700 evaluation succeeds +peer1.org2.example.com | [1212 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +peer0.org2.example.com | [1137 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [f96 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1213 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 8e b1 e6 4e e7 a9 |...N..| +peer0.org1.example.com | [1039 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [103a 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [103b 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [103c 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a0 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | [103d 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a1 Processing field: ConsensusType" +peer1.org2.example.com | [1214 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1138 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161016 +peer1.org1.example.com | [f97 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a2 Processing field: BatchSize" +peer0.org2.example.com | [1139 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 913507E049FC5E10A24EA428C2F1F3CC276CD651F0A10D2C64A4C0F24E2D434D +peer1.org2.example.com | [1215 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f98 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [103e 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a3 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a4 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a5 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a6 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a7 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a8 Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16aa Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [common.channelconfig] validateMSP -> DEBU 16ab Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp] newBccspMsp -> DEBU 16ac Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp] New -> DEBU 16ad Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16ae Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp.identity] newIdentity -> DEBU 16af Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16b0 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16b1 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [policies] NewManagerImpl -> DEBU 16b2 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.285 UTC [policies] NewManagerImpl -> DEBU 16b3 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b5 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b6 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b7 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b8 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b9 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16ba Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bb Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bc Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bd Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16be Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bf Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c0 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c1 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c2 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c5 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c6 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c7 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16ca Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cb Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cc Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cd Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16ce Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e3 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e4 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e5 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e6 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e8 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ea Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16eb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:02:16.294 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:16.294 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:02:16.294 UTC [orderer.consensus.etcdraft] propose -> INFO 1701 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:16.294 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 1702 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:16.295 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1703 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:40148" +orderer0.example.com | "2020-10-14 19:02:16.295 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1704 Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:16.298 UTC [common.deliver] Handle -> WARN 1705 Error reading from 172.18.0.9:40146: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:16.298 UTC [orderer.common.server] func1 -> DEBU 1706 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:16.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1708 Sending msg of 40278 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2020-10-14 19:02:16.300 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1709 Sending msg of 40278 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-10-14 19:02:16.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170a Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer2.example.com(orderer2.example.com:7050) took 306.8µs " +orderer0.example.com | "2020-10-14 19:02:16.300 UTC [grpc] infof -> DEBU 170b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:16.301 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170c Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer1.example.com(orderer1.example.com:7050) took 69.7µs " +orderer0.example.com | "2020-10-14 19:02:16.299 UTC [comm.grpc.server] 1 -> INFO 1707 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.4801ms +orderer0.example.com | "2020-10-14 19:02:16.303 UTC [orderer.common.broadcast] Handle -> WARN 170d Error reading from 172.18.0.9:40148: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:16.303 UTC [orderer.common.server] func1 -> DEBU 170e Closing Broadcast stream" +orderer0.example.com | "2020-10-14 19:02:16.305 UTC [comm.grpc.server] 1 -> INFO 170f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=71.6136ms +orderer0.example.com | "2020-10-14 19:02:16.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1710 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.306 UTC [grpc] infof -> DEBU 1711 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:16.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1712 Sending msg of 28 bytes to 2 on channel businesschannel took 14.3µs" +orderer0.example.com | "2020-10-14 19:02:16.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1713 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2020-10-14 19:02:16.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1714 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +orderer0.example.com | "2020-10-14 19:02:16.308 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1715 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-10-14 19:02:16.308 UTC [common.configtx] addToMap -> DEBU 1716 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1717 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1718 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1719 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171a Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171b Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171c Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171d Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171f Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1720 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1721 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1722 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1723 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1724 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1725 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1726 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1727 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1728 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1729 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172a Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [f99 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f9a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f9b 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f9c 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [f9d 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer1.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer1.org1.example.com | [f9e 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer1.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer1.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer1.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer1.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer1.org1.example.com | [f9f 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fa0 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fa1 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fa2 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fa3 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa4 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fa5 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [fa6 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [fa7 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +peer0.org1.example.com | 00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +peer0.org1.example.com | 00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +peer0.org1.example.com | 00000040 43 3c f3 0d 1f 72 35 |C<...r5| +peer0.org1.example.com | [103f 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1040 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1041 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1042 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fa8 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [fa9 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [faa 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fab 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [fac 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [fad 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [fae 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 gate 1602702082448118200 evaluation starts +peer1.org1.example.com | [faf 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fb0 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [fb1 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 principal matched by identity 0 +peer1.org1.example.com | [fb2 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer1.org1.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer1.org1.example.com | [fb3 10-14 19:01:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer1.org1.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer1.org1.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer1.org1.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer1.org1.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer1.org1.example.com | [fb4 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [fb5 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d04510 gate 1602702082448118200 evaluation succeeds +peer1.org1.example.com | [fb6 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [fb7 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [fb9 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [fba 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [fbb 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [fb8 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [fbc 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbe 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [fbf 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer1.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer1.org1.example.com | [fc0 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer1.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer1.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer1.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer1.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer1.org1.example.com | [fbd 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1216 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1217 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1218 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1219 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [121a 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161017 +peer1.org2.example.com | [121b 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FD9A362E855CF6D9613324524CF032D71A60A6AAF714F700CEEBF7C043C09870 +peer1.org2.example.com | [121c 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [121d 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [121e 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [121f 10-14 19:01:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1220 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1221 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1222 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1223 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1224 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1225 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1226 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1228 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1229 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1227 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [122a 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [122c 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [122d 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [122e 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [122b 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [122f 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1230 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1231 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1043 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1044 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1045 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1046 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1047 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1048 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1049 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 gate 1602702078614964400 evaluation starts +peer0.org1.example.com | [104a 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [104b 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [104c 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 principal matched by identity 0 +peer0.org1.example.com | [104d 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +peer0.org1.example.com | 00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +peer0.org1.example.com | [104e 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +peer0.org1.example.com | 00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +peer0.org1.example.com | 00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +peer0.org1.example.com | 00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +peer0.org1.example.com | 00000040 b4 10 00 6f 5b da |...o[.| +peer0.org1.example.com | [104f 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1050 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 gate 1602702078614964400 evaluation succeeds +peer0.org1.example.com | [1051 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1052 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1053 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1054 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1055 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1056 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1057 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1058 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1059 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [105a 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [105b 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [105c 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [105d 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [105e 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [105f 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1060 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1061 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1062 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1063 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1064 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1065 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1066 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1067 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1068 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1069 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [106a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [106b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [106c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [106d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [106e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [106f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1070 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 gate 1602702080141166300 evaluation starts +peer0.org1.example.com | [1071 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1072 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1073 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 principal matched by identity 0 +peer0.org1.example.com | [1074 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 53 2d a9 c1 62 a6 da ce ff 81 4b 77 5c 1d 2a |xS-..b.....Kw\.*| +peer0.org1.example.com | 00000010 9e 67 1e da bf 59 6b b6 b6 5f 0f f7 84 ff 8b 61 |.g...Yk.._.....a| +peer0.org1.example.com | [1075 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 3c a8 cb af 76 21 f8 70 ca bd 13 |0D. ><...v!.p...| +peer0.org1.example.com | 00000010 7e 29 48 45 2c 07 10 0b a5 d0 69 22 42 4d 18 4e |~)HE,.....i"BM.N| +peer0.org1.example.com | 00000020 eb f8 f1 8a 02 20 35 e1 2e 6e 0f b3 ba 21 26 93 |..... 5..n...!&.| +peer0.org1.example.com | 00000030 66 9e 95 9c ce f5 d5 4e 91 70 55 a8 53 60 ab b3 |f......N.pU.S`..| +peer0.org1.example.com | 00000040 51 36 82 bf 95 43 |Q6...C| +peer0.org1.example.com | [1076 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1077 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 gate 1602702080141166300 evaluation succeeds +peer0.org1.example.com | [1078 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1079 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [107a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [107b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [107c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [107d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [107e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [107f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [fc1 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc2 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc3 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fc4 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fc5 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [fc7 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [fc8 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer1.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer1.org1.example.com | [fc9 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer1.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer1.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer1.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer1.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer1.org1.example.com | [fca 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [fcb 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 04 d7 83 aa 8c 9c 06 42 a2 a1 |0E.!.........B..| +peer1.org1.example.com | 00000010 0e 5c b0 65 e3 ad 26 e5 5f b3 47 d5 f7 6c aa 66 |.\.e..&._.G..l.f| +peer1.org1.example.com | 00000020 7f b7 94 08 1d 02 20 2b d8 c6 2f 5d 02 d5 a3 07 |...... +../]....| +peer1.org1.example.com | 00000030 ca 07 2b 2b a1 b0 ed 1f 3a 39 e7 4d 21 e0 1c c2 |..++....:9.M!...| +peer1.org1.example.com | 00000040 d2 65 73 40 b9 b2 90 |.es@...| +peer1.org1.example.com | [fc6 10-14 19:01:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fcc 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [fcd 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [fce 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fcf 10-14 19:01:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd0 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd1 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd2 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd3 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [fd4 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd5 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd6 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd7 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd8 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [fd9 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [fda 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer1.org1.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer1.org1.example.com | [fdb 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer1.org1.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer1.org1.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer1.org1.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer1.org1.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer1.org1.example.com | [fdc 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [fdd 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d d9 ab 2a 05 00 cf fc b5 ff |0E.!.....*......| +peer1.org1.example.com | 00000010 f0 b8 3b 53 9c db 85 06 34 6b 9c af 7d d9 49 0d |..;S....4k..}.I.| +peer1.org1.example.com | 00000020 fe ed b0 31 26 02 20 33 fd a0 4c e6 1c 19 21 b7 |...1&. 3..L...!.| +peer1.org1.example.com | 00000030 f0 b7 7a 2a 1c d9 e6 52 75 54 91 8c 81 3a 6f 64 |..z*...RuT...:od| +peer1.org1.example.com | 00000040 08 10 5c fd 1d f2 1a |..\....| +peer1.org1.example.com | [fde 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [fdf 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [fe0 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [fe1 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [fe2 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [fe3 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe4 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe5 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe6 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [fe7 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe8 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe9 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [fea 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [feb 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fec 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > alive: +peer1.org1.example.com | [fed 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fee 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [fef 10-14 19:01:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff0 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff1 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff2 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff3 10-14 19:01:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [ff4 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff5 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff6 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ff7 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff8 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [ff9 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [ffa 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [ffb 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610051801 +peer1.org1.example.com | [ffc 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 36F63F51522C499D7D9A119D722CB15B77865E548397B6AC53079C8A0C87120A +peer1.org1.example.com | [ffd 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [ffe 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fff 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1000 10-14 19:01:23.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1001 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1080 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1081 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1082 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1083 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1084 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1085 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1086 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1087 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1088 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1089 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [108a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [113a 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [113b 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [113c 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [113d 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [113e 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [113f 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1140 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1141 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1142 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1143 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1144 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1146 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1145 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1147 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1148 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1149 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [114a 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [114b 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [114c 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer0.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer0.org2.example.com | [114d 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer0.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer0.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer0.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer0.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer0.org2.example.com | [114e 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [114f 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1150 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1151 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1152 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1153 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1154 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1155 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1156 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer0.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer0.org2.example.com | [1157 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer0.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer0.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer0.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer0.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer0.org2.example.com | [1158 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1159 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [115a 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115b 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115c 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [115d 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115e 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [115f 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1160 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer0.org2.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer0.org2.example.com | [1161 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer0.org2.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer0.org2.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer0.org2.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer0.org2.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer0.org2.example.com | [1162 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1163 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa d3 bf 26 b7 d8 58 86 21 ad c5 |0E.!....&..X.!..| +peer0.org2.example.com | 00000010 57 c0 c7 4e c2 cd 37 15 df ca a7 e8 55 ce ba c3 |W..N..7.....U...| +peer0.org2.example.com | 00000020 13 70 e2 d3 d1 02 20 29 75 0f 8d 86 4c 4c 42 0d |.p.... )u...LLB.| +peer0.org2.example.com | 00000030 a5 9a 42 07 d2 8e 40 f2 be 5c 28 f8 96 e5 6c ec |..B...@..\(...l.| +peer0.org2.example.com | 00000040 32 93 1f 15 09 b6 6e |2.....n| +peer0.org2.example.com | [1164 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1165 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [108b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [108c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [108d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [108e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [108f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1090 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1091 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1092 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1093 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1094 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1095 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1096 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1097 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1098 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1099 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [109a 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [109b 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [109c 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [109d 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [109e 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [109f 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [10a0 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10a1 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [10a2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10a3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [10a4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [10a5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [10a6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [10a7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 gate 1602702080260461200 evaluation starts +peer0.org1.example.com | [10a8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [10a9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [10aa 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 principal matched by identity 0 +peer0.org1.example.com | [10ab 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fe 91 fe 25 81 61 1b 0d 27 ca d9 26 40 dd c0 |\...%.a..'..&@..| +peer0.org1.example.com | 00000010 b6 8e 07 d7 12 1c a3 60 d3 99 89 d0 a1 3f a8 1e |.......`.....?..| +peer0.org1.example.com | [10ac 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 f1 a2 60 87 53 92 03 5e 85 01 |0E.!....`.S..^..| +peer0.org1.example.com | 00000010 4a 00 5b 6a bb c8 28 67 11 ca 2b 7c e8 89 5b 43 |J.[j..(g..+|..[C| +peer0.org1.example.com | 00000020 39 2e 4f 75 98 02 20 22 78 44 ea 40 06 52 73 8d |9.Ou.. "xD.@.Rs.| +peer0.org1.example.com | 00000030 cb 65 a9 80 06 03 94 0f 2c 87 6b 8a 95 46 ec c8 |.e......,.k..F..| +peer0.org1.example.com | 00000040 ce 56 20 8f b7 fa 0d |.V ....| +peer0.org1.example.com | [10ad 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [10ae 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 gate 1602702080260461200 evaluation succeeds +peer0.org1.example.com | [10af 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10b0 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10b1 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [10b2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [10b3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10b4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [10b5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [10b6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [10b7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [10b8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10b9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ba 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10bb 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10bc 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10bd 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10be 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10bf 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10c0 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c1 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10c2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10c3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10c5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10c8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10c9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1166 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1167 10-14 19:01:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1168 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1169 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [116a 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [116b 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [116c 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [116d 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [116e 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [116f 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1170 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer0.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer0.org2.example.com | [1171 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer0.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer0.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer0.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer0.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1173 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 cf 2a a8 50 b3 72 38 6d cd 31 |0E.!...*.P.r8m.1| +peer0.org2.example.com | 00000010 c1 f1 8f 52 aa 02 93 b9 0f 0b 6d 5d 78 d2 90 30 |...R......m]x..0| +peer0.org2.example.com | 00000020 d3 72 0d 4e 59 02 20 06 bc 63 bb fd a1 17 0e 0d |.r.NY. ..c......| +peer0.org2.example.com | 00000030 53 d6 5f 53 bd 7e 87 e0 af 67 68 06 51 fe 9c b6 |S._S.~...gh.Q...| +peer0.org2.example.com | 00000040 8d 1a 79 f5 a7 1f fe |..y....| +peer0.org2.example.com | [1174 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1175 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1176 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1177 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1178 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1179 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117a 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117b 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [117d 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [117e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [117f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1180 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1181 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1182 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1183 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1184 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1185 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1186 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1187 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1188 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1189 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [118a 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118b 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118c 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118d 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118e 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [118f 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1190 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1191 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1192 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1193 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1194 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1195 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1196 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10ca 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10cb 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10cc 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10cd 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ce 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10cf 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d0 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10d1 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d2 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10d3 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10d4 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10d5 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [10d6 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 98 6a 73 ad 11 1f 61 55 7b a4 8d 05 12 40 98 |&.js...aU{....@.| +peer0.org1.example.com | 00000010 a1 1b 7b f7 97 22 e0 a8 26 ed 5c e3 ee 97 06 a1 |..{.."..&.\.....| +peer0.org1.example.com | [10d7 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 ae 61 d1 8e 26 59 34 d1 33 53 |0E.!...a..&Y4.3S| +peer0.org1.example.com | 00000010 ef de 72 88 57 64 62 c9 1d 36 2f 0d a3 cc a1 c4 |..r.Wdb..6/.....| +peer0.org1.example.com | 00000020 fa 5c 7a 27 ce 02 20 0d 41 38 b4 35 b4 ce 7c ec |.\z'.. .A8.5..|.| +peer0.org1.example.com | 00000030 0e 6b e9 ff c0 31 53 18 6d bd 2c 51 ed 6d 35 f5 |.k...1S.m.,Q.m5.| +peer0.org1.example.com | 00000040 2a d3 02 53 28 96 e7 |*..S(..| +peer0.org1.example.com | [10d8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10d9 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [10da 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [10db 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [10dc 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [10dd 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10de 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10df 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e0 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10e1 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10e2 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10e3 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10e4 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10e5 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10e6 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e7 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172d Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172e Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1730 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] addToMap -> DEBU 1731 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1732 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1733 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1734 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1735 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1736 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1737 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1738 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.312 UTC [common.configtx] policyForItem -> DEBU 1739 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2020-10-14 19:02:16.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 173a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +orderer0.example.com | "2020-10-14 19:02:16.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.313 UTC [policies] Manager -> DEBU 173d Manager Channel looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.316 UTC [policies] Manager -> DEBU 173e Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 173f Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1740 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1741 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1742 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1743 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1744 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.318 UTC [policies] Manager -> DEBU 1745 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1746 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1747 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1748 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:02:16.319 UTC [cauthdsl] deduplicate -> WARN 1749 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-10-14 19:02:16.319 UTC [cauthdsl] func1 -> DEBU 174a 0xc0009ca7e0 gate 1602702136319082400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:16.319 UTC [cauthdsl] func2 -> DEBU 174b 0xc0009ca7e0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-10-14 19:02:16.319 UTC [cauthdsl] func2 -> DEBU 174c 0xc0009ca7e0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174d 0xc0009ca7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174e 0xc0009ca7e0 processing identity 1 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174f 0xc0009ca7e0 principal matched by identity 1" +orderer0.example.com | "2020-10-14 19:02:16.320 UTC [msp.identity] Verify -> DEBU 1750 Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +orderer0.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.|" +orderer0.example.com | "2020-10-14 19:02:16.320 UTC [msp.identity] Verify -> DEBU 1751 Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +orderer0.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +orderer0.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +orderer0.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +orderer0.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..|" +orderer0.example.com | "2020-10-14 19:02:16.322 UTC [cauthdsl] func2 -> DEBU 1752 0xc0009ca7e0 principal evaluation succeeds for identity 1" +orderer0.example.com | "2020-10-14 19:02:16.322 UTC [cauthdsl] func1 -> DEBU 1753 0xc0009ca7e0 gate 1602702136319082400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:16.322 UTC [policies] Evaluate -> DEBU 1754 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.322 UTC [policies] Evaluate -> DEBU 1755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [cauthdsl] deduplicate -> WARN 1757 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [cauthdsl] func1 -> DEBU 1758 0xc0009caff0 gate 1602702136323775000 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 1759 0xc0009caff0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 175a 0xc0009caff0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 175b 0xc0009caff0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [msp.identity] Verify -> DEBU 175c Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +peer1.org2.example.com | [1232 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1234 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1235 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1236 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [123a 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1237 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1233 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [123b 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [123c 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [123d 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [123e 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [123f 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1238 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1240 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1239 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1241 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1242 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1243 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1244 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161018 +peer1.org2.example.com | [1245 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1246 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8308A3A31C1F46D3CB5E92D3C4AF4622320AD7978189DC026C4886A5DDD53E06 +peer1.org2.example.com | [1247 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1248 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1249 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [124a 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124b 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [124c 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [124d 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [124e 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\336\266\265$\214y\020\215\232\002 !\322\311\215\331\265\272\026;\302\032\235\273pd\312\2328\251+=0\20165\365\036+\355#\267\230" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1250 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1251 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1252 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1253 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [124f 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\336\266\265$\214y\020\215\232\002 !\322\311\215\331\265\272\026;\302\032\235\273pd\312\2328\251+=0\20165\365\036+\355#\267\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1254 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1255 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1256 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1257 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1258 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1259 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [125a 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [125b 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [125c 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [125d 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [125e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [125f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 9a 36 2e 85 5c f6 d9 61 33 24 52 4c f0 32 d7 |..6..\..a3$RL.2.| +peer1.org2.example.com | 00000010 1a 60 a6 aa f7 14 f7 00 ce eb f7 c0 43 c0 98 70 |.`..........C..p| +peer1.org2.example.com | [1260 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 b0 e2 a1 e5 d1 03 49 a5 a3 cb 1e |0D. &......I....| +peer1.org2.example.com | 00000010 4b e0 e8 86 89 e7 b6 ed 6d 1a 3c 70 a3 20 c7 f1 |K.......m. DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1262 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1263 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1264 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1265 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1266 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1267 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1268 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1269 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1002 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1003 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1004 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1005 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1006 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1007 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1008 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1009 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100a 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [100b 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [100c 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [100d 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [100e 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [100f 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1010 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1011 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1012 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1013 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 gate 1602702085136886400 evaluation starts +peer1.org1.example.com | [1014 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1015 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1016 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 principal matched by identity 0 +peer1.org1.example.com | [1017 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8b df ea 54 a6 bb 22 09 a9 13 89 fd e0 61 06 |....T.."......a.| +peer1.org1.example.com | 00000010 c4 c2 e7 26 61 00 c4 f8 48 8d 3c 11 6d d7 d2 18 |...&a...H.<.m...| +peer1.org1.example.com | [1018 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 45 05 fc ae 4f cc a6 43 49 71 |0E.!..E...O..CIq| +peer1.org1.example.com | 00000010 9e f8 de 5c 99 b4 5f c7 df de cd 44 6c 34 c2 16 |...\.._....Dl4..| +peer1.org1.example.com | 00000020 2b 26 c7 76 40 02 20 7e f2 87 1a 5a ae ae f3 77 |+&.v@. ~...Z...w| +peer1.org1.example.com | 00000030 34 37 75 02 a4 97 1a 64 6a d3 6e 98 28 a6 63 9e |47u....dj.n.(.c.| +peer1.org1.example.com | 00000040 04 62 ab 88 93 cf 2f |.b..../| +peer1.org1.example.com | [1019 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [101a 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41e80 gate 1602702085136886400 evaluation succeeds +peer1.org1.example.com | [101b 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [101c 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [101d 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [101e 10-14 19:01:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1197 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1198 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1199 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [119a 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [119b 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [119c 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [119d 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 gate 1602702086438026700 evaluation starts +peer0.org2.example.com | [119e 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [119f 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [11a0 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 principal matched by identity 0 +peer0.org2.example.com | [11a1 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer0.org2.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer0.org2.example.com | [11a2 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer0.org2.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer0.org2.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer0.org2.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer0.org2.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org2.example.com | [11a3 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [11a4 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c57090 gate 1602702086438026700 evaluation succeeds +peer0.org2.example.com | [11a5 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11a6 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11a7 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11a8 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11a9 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11aa 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [11ab 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [11ac 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [11ad 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [11ae 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11af 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b0 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b1 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [11b2 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11b3 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11b4 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11b5 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11b6 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b7 10-14 19:01:26.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e8 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e9 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ea 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10eb 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10ec 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ed 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10ee 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ef 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f0 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f1 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f2 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f3 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f4 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [10f5 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161016 +peer0.org1.example.com | [10f6 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5105DB905A92B59846F3E2935C4E1382A4264B878B6354CBF2EB0C3328AD050D +peer0.org1.example.com | [10f7 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [10f8 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [10f9 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [10fa 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [10fb 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fc 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fd 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10fe 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [10ff 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1100 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1101 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1102 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1103 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1104 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1106 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1105 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1107 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1108 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1109 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110a 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [110b 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [110c 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [101f 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1020 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1021 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1022 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1023 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1024 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1025 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1026 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1027 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1029 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [102a 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [102b 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1028 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [102c 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [102e 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [102f 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1030 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1031 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [102d 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1032 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1033 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1034 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1035 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1036 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1037 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1039 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [103a 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [103b 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [103c 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1038 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [103d 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [103e 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [103f 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1040 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11b8 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [11b9 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [11ba 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [11bb 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11bc 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11bd 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11be 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11bf 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11c0 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11c1 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [11c2 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11c3 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [11c4 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11c5 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [11c6 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [11c7 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11c8 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11c9 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11ca 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11cb 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11cc 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11cd 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o|" +orderer0.example.com | "2020-10-14 19:02:16.323 UTC [msp.identity] Verify -> DEBU 175d Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +orderer0.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +orderer0.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +orderer0.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +orderer0.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.|" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [cauthdsl] func2 -> DEBU 175e 0xc0009caff0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [cauthdsl] func1 -> DEBU 175f 0xc0009caff0 gate 1602702136323775000 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1760 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1762 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1763 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] verifyDeltaSet -> DEBU 1764 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1765 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1766 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [110e 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [110d 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [110f 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1110 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1111 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1112 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1113 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1115 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1116 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1114 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1117 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1119 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1118 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [111a 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [111b 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [111c 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [111d 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [111e 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [111f 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1120 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1121 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 gate 1602702081935321000 evaluation starts +peer0.org1.example.com | [1122 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1123 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1124 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 principal matched by identity 0 +peer0.org1.example.com | [1125 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1126 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1127 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1128 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1129 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112a 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [112b 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | [126a 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [126b 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [126c 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [126d 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [126e 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [126f 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1270 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1271 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 gate 1602702090320024800 evaluation starts +peer1.org2.example.com | [1272 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1273 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1274 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1275 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 principal evaluation fails +peer1.org2.example.com | [1276 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad97d0 gate 1602702090320024800 evaluation fails +peer1.org2.example.com | [1277 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1278 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1279 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [127a 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 gate 1602702090322279200 evaluation starts +peer1.org2.example.com | [127b 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [127c 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [127d 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 principal matched by identity 0 +peer1.org2.example.com | [127e 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer1.org2.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer1.org2.example.com | [127f 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer1.org2.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer1.org2.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer1.org2.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer1.org2.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer1.org2.example.com | [1280 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1281 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad9d40 gate 1602702090322279200 evaluation succeeds +peer1.org2.example.com | [1282 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1283 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1284 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1285 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1041 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1042 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1043 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1044 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1045 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1046 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1047 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1048 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1049 10-14 19:01:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 gate 1602702085259623000 evaluation starts +peer1.org1.example.com | [104a 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [104b 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [104c 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 principal matched by identity 0 +peer1.org1.example.com | [104d 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 f1 d8 72 21 84 36 61 f6 c6 dc fa 5a 79 2c 28 |...r!.6a....Zy,(| +peer1.org1.example.com | 00000010 d8 99 9f 1a b8 00 43 dc 38 0b b6 02 7e 29 9f 22 |......C.8...~)."| +peer1.org1.example.com | [104e 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a2 31 32 4f 87 91 77 69 93 b4 98 |0D. $.12O..wi...| +peer1.org1.example.com | 00000010 f8 74 c2 94 cc 93 7c de 04 76 e8 7e 06 df 3a 8a |.t....|..v.~..:.| +peer1.org1.example.com | 00000020 28 d1 e0 16 02 20 50 bf 9c 48 7b e9 34 cb 5a e7 |(.... P..H{.4.Z.| +peer1.org1.example.com | 00000030 19 f8 8f 6e 47 81 cc b6 1a be 3d 2b a4 c1 1d ef |...nG.....=+....| +peer1.org1.example.com | 00000040 50 a8 79 c5 bd 1d |P.y...| +peer1.org1.example.com | [104f 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1050 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d71fb0 gate 1602702085259623000 evaluation succeeds +peer1.org1.example.com | [1051 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1052 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1053 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1054 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1055 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1056 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1057 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1058 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1059 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [105a 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [112c 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [112d 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [112e 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 gate 1602702081935321000 evaluation succeeds +peer0.org1.example.com | [1130 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [112f 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1132 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1131 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1133 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1134 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1135 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1136 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1137 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1138 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1139 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [113a 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [113b 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [113c 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [113d 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 gate 1602702081945052300 evaluation starts +peer0.org1.example.com | [113e 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [113f 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1140 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 principal matched by identity 0 +peer0.org1.example.com | [1141 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1142 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1143 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1144 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 gate 1602702081945052300 evaluation succeeds +peer0.org1.example.com | [1145 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1146 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1147 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1148 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1149 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [114a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [114b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [114c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [114d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [114e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [114f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1150 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1151 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1152 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1153 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1154 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1155 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1156 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1157 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 gate 1602702081951306600 evaluation starts +peer0.org1.example.com | [1158 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1159 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [115a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 principal matched by identity 0 +peer0.org1.example.com | [115b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [115c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [115d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [115e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 gate 1602702081951306600 evaluation succeeds +peer0.org1.example.com | [115f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1160 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1161 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1162 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1163 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1164 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11ce 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 gate 1602702086600425900 evaluation starts +peer0.org2.example.com | [11cf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11d0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [11d1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 principal matched by identity 0 +peer0.org2.example.com | [11d2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org2.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org2.example.com | [11d3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer0.org2.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer0.org2.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer0.org2.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer0.org2.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer0.org2.example.com | [11d4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [11d5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c852c0 gate 1602702086600425900 evaluation succeeds +peer0.org2.example.com | [11d6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11d7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [11d8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11d9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11da 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11db 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [11dc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [11dd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [11de 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [11df 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11e0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11e1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11e2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [11e3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11e7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: +peer0.org2.example.com | [11e8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [11e9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ea 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11eb 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11ec 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [11ed 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [11ee 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ef 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [11f0 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f1 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [11f2 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f3 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [11f4 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f5 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f6 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f7 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11f8 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11f9 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11fa 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11fb 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11fc 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [11fd 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 gate 1602702086634243900 evaluation starts +peer0.org2.example.com | [11fe 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [11ff 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1200 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 principal matched by identity 0 +peer0.org2.example.com | [1201 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1202 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1203 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1204 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cad770 gate 1602702086634243900 evaluation succeeds +peer0.org2.example.com | [1205 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1206 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1207 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1208 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1209 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [120a 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [120b 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [120c 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [120d 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [120e 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [120f 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1210 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1211 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 gate 1602702086640269400 evaluation starts +peer0.org2.example.com | [1212 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1213 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1214 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 principal matched by identity 0 +peer0.org2.example.com | [1215 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1216 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1217 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1218 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1219 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [121a 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [121b 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [121c 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [121d 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [121e 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [121f 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1220 10-14 19:01:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd0970 gate 1602702086640269400 evaluation succeeds +peer0.org2.example.com | [1221 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1222 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1223 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1224 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1225 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1226 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1227 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1228 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1229 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [122a 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [122b 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [122c 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [122d 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [122e 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [122f 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1230 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1231 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1232 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1233 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 gate 1602702086656704500 evaluation starts +peer0.org2.example.com | [1234 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1235 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1236 10-14 19:01:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 principal matched by identity 0 +peer0.org2.example.com | [1237 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1238 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1239 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [123a 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf8af0 gate 1602702086656704500 evaluation succeeds +peer0.org2.example.com | [123b 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [123c 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [123d 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [123e 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [123f 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1240 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1241 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1242 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1243 10-14 19:01:26.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1244 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1245 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1246 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1247 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1248 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1249 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [124a 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [124b 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 gate 1602702086671904100 evaluation starts +peer0.org2.example.com | [124c 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [124d 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [124e 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 principal matched by identity 0 +peer0.org2.example.com | [124f 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1250 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1251 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1252 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d16ad0 gate 1602702086671904100 evaluation succeeds +peer0.org2.example.com | [1253 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1254 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1255 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1256 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1257 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1258 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1259 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [125a 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [125b 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [125c 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [125d 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [125e 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [125f 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1767 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1768 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1769 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 1770 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 1771 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1772 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1773 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1774 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1775 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1776 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1777 Setting policy for key Readers to " +orderer0.example.com | "2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1778 Setting policy for key Writers to " +orderer0.example.com | "2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1779 Setting policy for key Admins to " +orderer0.example.com | "2020-10-14 19:02:16.328 UTC [common.configtx] recurseConfigMap -> DEBU 177a Setting policy for key Endorsement to " +orderer0.example.com | "2020-10-14 19:02:16.328 UTC [common.configtx] recurseConfigMap -> DEBU 177b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.329 UTC [common.configtx] recurseConfigMap -> DEBU 177c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.329 UTC [common.configtx] recurseConfigMap -> DEBU 177d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-10-14 19:02:16.330 UTC [common.channelconfig] NewStandardValues -> DEBU 177e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-10-14 19:02:16.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1780 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1781 Processing field: OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1782 Processing field: Consortium" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1783 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] NewStandardValues -> DEBU 1784 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1785 Processing field: ACLs" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1786 Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.331 UTC [common.channelconfig] NewStandardValues -> DEBU 1787 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1788 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1789 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178a Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.332 UTC [common.channelconfig] Validate -> DEBU 178b Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.332 UTC [common.channelconfig] validateMSP -> DEBU 178c Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.333 UTC [msp] newBccspMsp -> DEBU 178d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.333 UTC [msp] New -> DEBU 178e Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.333 UTC [msp] Setup -> DEBU 178f Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.334 UTC [msp.identity] newIdentity -> DEBU 1790 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [1286 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1287 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1288 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1289 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer1.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer1.org2.example.com | [128a 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer1.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer1.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer1.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer1.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer1.org2.example.com | [128b 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [128c 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [128d 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [128e 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer1.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer1.org2.example.com | [128f 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer1.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer1.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer1.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer1.org2.example.com | [1290 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1291 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1292 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1293 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1294 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1295 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1296 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1297 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer1.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer1.org2.example.com | [1298 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer1.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer1.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer1.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer1.org2.example.com | [1299 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [129a 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 55 0b 1b 0c 15 83 37 5f 40 99 4f |0D. UU.....7_@.O| +peer1.org2.example.com | 00000010 6a 88 82 6d 83 f2 46 c9 91 76 3e de b6 b5 24 8c |j..m..F..v>...$.| +peer1.org2.example.com | 00000020 79 10 8d 9a 02 20 21 d2 c9 8d d9 b5 ba 16 3b c2 |y.... !.......;.| +peer1.org2.example.com | 00000030 1a 9d bb 70 64 ca 9a 38 a9 2b 3d 30 81 36 35 f5 |...pd..8.+=0.65.| +peer1.org2.example.com | 00000040 1e 2b ed 23 b7 98 |.+.#..| +peer1.org2.example.com | [129b 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [129c 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [129d 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [129e 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [129f 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12a0 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12a1 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [12a2 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [12a3 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12a4 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12a5 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12a6 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12a7 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12a8 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12a9 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12aa 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 gate 1602702090362774000 evaluation starts +peer1.org2.example.com | [12ab 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12ac 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [12ad 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12ae 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 principal evaluation fails +peer1.org1.example.com | [105b 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [105c 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105d 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105e 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105f 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1060 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1061 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1062 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1063 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1064 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1065 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1066 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1067 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1068 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1069 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [106a 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [106b 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [106c 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [106d 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [106e 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [106f 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1070 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1071 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1072 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1073 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1074 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1075 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1076 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101C +peer1.org1.example.com | [1077 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 03930112A9A0F9B7662D1AC5725C81C589A38EAF236D2C5997C6DDABD3CA57EE +peer1.org1.example.com | [1078 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1079 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [107a 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [107b 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [107c 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [107d 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [107e 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [107f 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1080 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1081 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1083 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1084 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1085 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1086 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1082 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1087 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1088 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1089 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [108a 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [108b 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [108c 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [108d 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [12af 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49680 gate 1602702090362774000 evaluation fails +peer1.org2.example.com | [12b0 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12b1 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12b2 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12b3 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 gate 1602702090369162300 evaluation starts +peer1.org2.example.com | [12b4 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12b5 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [12b6 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 principal matched by identity 0 +peer1.org2.example.com | [12b7 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer1.org2.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer1.org2.example.com | [12b8 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer1.org2.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer1.org2.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer1.org2.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer1.org2.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer1.org2.example.com | [12b9 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12ba 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b49bf0 gate 1602702090369162300 evaluation succeeds +peer1.org2.example.com | [12bb 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12bc 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12bd 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12be 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12bf 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [12c0 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12c1 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [12c2 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer1.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer1.org2.example.com | [12c3 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer1.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer1.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer1.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer1.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer1.org2.example.com | [12c4 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [12c5 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12c6 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [12c7 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer1.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer1.org2.example.com | [12c8 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer1.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer1.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer1.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer1.org2.example.com | [12c9 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12ca 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12cb 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12cc 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12cd 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12ce 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12cf 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12d0 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d1 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d2 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d3 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d4 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d5 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d6 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [12d7 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12d8 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12d9 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12da 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12db 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12dc 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [12dd 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1165 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1166 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1167 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1168 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1169 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [116a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [116b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 gate 1602702081958336400 evaluation starts +peer0.org1.example.com | [116c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [116d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [116e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 principal matched by identity 0 +peer0.org1.example.com | [116f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1170 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1171 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1172 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 gate 1602702081958336400 evaluation succeeds +peer0.org1.example.com | [1173 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1174 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1175 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1176 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1177 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1178 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1179 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [117a 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [117b 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [117c 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [117d 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [117e 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [117f 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1180 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1181 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1182 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1183 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1184 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 gate 1602702081966951000 evaluation starts +peer0.org1.example.com | [1185 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1186 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1187 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 principal matched by identity 0 +peer0.org1.example.com | [1188 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1189 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [118a 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [118b 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 gate 1602702081966951000 evaluation succeeds +peer0.org1.example.com | [118c 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [118d 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [118e 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [118f 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1190 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1191 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1192 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1193 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1194 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1195 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1196 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1197 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1198 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 gate 1602702081973299400 evaluation starts +peer0.org1.example.com | [1199 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [119a 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [119b 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 principal matched by identity 0 +peer0.org1.example.com | [119c 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [119d 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | [108e 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 03 12 73 8d a0 ec 50 83 9e 84 e9 f9 b9 f5 0f |g..s...P........| +peer1.org1.example.com | 00000010 eb e3 68 4c 59 71 f0 4d 3f 19 a0 87 83 9f 60 76 |..hLYq.M?.....`v| +peer1.org1.example.com | [108f 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d1 c2 2c e0 47 0d 69 36 f9 41 |0E.!....,.G.i6.A| +peer1.org1.example.com | 00000010 a1 b4 8e 83 02 ec be 66 5b a1 6d 86 4c 2c c4 2f |.......f[.m.L,./| +peer1.org1.example.com | 00000020 27 39 72 aa 72 02 20 09 ce 6b 31 b3 37 7e c6 a4 |'9r.r. ..k1.7~..| +peer1.org1.example.com | 00000030 23 42 58 0f a7 63 28 85 1e d9 09 92 34 d5 b3 d8 |#BX..c(.....4...| +peer1.org1.example.com | 00000040 d4 36 12 db d0 78 f2 |.6...x.| +peer1.org1.example.com | [1090 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1091 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1092 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1093 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1094 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1095 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1096 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1097 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1098 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1099 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [109a 10-14 19:01:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [109b 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [109c 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [109d 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [109e 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [109f 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a1 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10a0 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10a2 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a3 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a4 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10a5 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a6 10-14 19:01:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10a7 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10a8 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10a9 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10aa 10-14 19:01:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10ab 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10ac 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10ad 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ae 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10af 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10b0 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b1 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b2 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b3 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [10b4 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10b5 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b6 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b7 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [10b8 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10b9 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ba 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10bb 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10bc 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10bd 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10be 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [10bf 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10c0 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [12de 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [12df 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12e0 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [12e1 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [12e2 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [12e3 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [12e4 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 gate 1602702090431081300 evaluation starts +peer1.org2.example.com | [12e5 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12e6 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [12e7 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [12e8 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 principal evaluation fails +peer1.org2.example.com | [12e9 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7ed00 gate 1602702090431081300 evaluation fails +peer1.org2.example.com | [12ea 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12eb 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [12ec 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [12ed 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 gate 1602702090434423100 evaluation starts +peer1.org2.example.com | [12ee 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [12ef 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [12f0 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 principal matched by identity 0 +peer1.org2.example.com | [12f1 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 ef 8b 78 10 4b 6b 46 c8 0b 7e 24 6b c4 92 4f |...x.KkF..~$k..O| +peer1.org2.example.com | 00000010 ce 4f 94 3d c1 3c f8 97 d5 f7 a2 d7 cf f2 26 dc |.O.=.<........&.| +peer1.org2.example.com | [12f2 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 1f 75 77 45 e6 a6 05 a0 00 5d 94 |0D. #.uwE.....].| +peer1.org2.example.com | 00000010 a3 56 5a ea 78 70 43 d3 f4 dd 04 ef ea 80 87 45 |.VZ.xpC........E| +peer1.org2.example.com | 00000020 b6 d4 61 e6 02 20 1b f9 e7 95 77 c8 15 bd 43 52 |..a.. ....w...CR| +peer1.org2.example.com | 00000030 03 4e d1 97 3c 32 b9 a4 3d 88 b1 a7 74 d2 d3 fe |.N..<2..=...t...| +peer1.org2.example.com | 00000040 a7 06 57 28 51 0c |..W(Q.| +peer1.org2.example.com | [12f3 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [12f4 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b7f270 gate 1602702090434423100 evaluation succeeds +peer1.org2.example.com | [12f5 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12f6 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [12f8 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [12f7 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [12f9 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [12fa 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [12fb 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12fc 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [12fd 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [12fe 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [12ff 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1300 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1301 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1302 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1303 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1304 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1305 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1307 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1306 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1308 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1309 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130a 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130b 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130c 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130d 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130e 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130f 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1310 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1311 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1312 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1313 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1314 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1315 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1316 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1317 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1318 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1319 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [131a 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [131b 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [131c 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [131d 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 gate 1602702090476326300 evaluation starts +peer1.org2.example.com | [131e 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [131f 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1320 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1321 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 principal evaluation fails +peer1.org2.example.com | [1322 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac700 gate 1602702090476326300 evaluation fails +peer1.org2.example.com | [1323 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1324 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1325 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1326 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 gate 1602702090479501700 evaluation starts +peer1.org2.example.com | [1327 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1328 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1329 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 principal matched by identity 0 +peer1.org2.example.com | [132a 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer1.org2.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer1.org2.example.com | [132b 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer1.org2.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer1.org2.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer1.org2.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer1.org2.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer1.org2.example.com | [132c 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [132d 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bacc70 gate 1602702090479501700 evaluation succeeds +peer1.org2.example.com | [132e 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1791 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1792 Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1793 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1794 Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] Validate -> DEBU 1795 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2020-10-14 19:02:16.335 UTC [common.channelconfig] validateMSP -> DEBU 1796 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.336 UTC [msp] newBccspMsp -> DEBU 1797 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.336 UTC [msp] New -> DEBU 1798 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.336 UTC [msp] Setup -> DEBU 1799 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.337 UTC [msp.identity] newIdentity -> DEBU 179a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.337 UTC [common.channelconfig] NewStandardValues -> DEBU 179b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179c Processing field: AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.338 UTC [common.channelconfig] NewStandardValues -> DEBU 179d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179e Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.338 UTC [common.channelconfig] Validate -> DEBU 179f Anchor peers for org Org3MSP are " +orderer0.example.com | "2020-10-14 19:02:16.339 UTC [common.channelconfig] validateMSP -> DEBU 17a0 Setting up MSP for org Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.339 UTC [msp] newBccspMsp -> DEBU 17a1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.339 UTC [msp] New -> DEBU 17a2 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.339 UTC [msp] Setup -> DEBU 17a3 Setting up MSP instance Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.340 UTC [msp.identity] newIdentity -> DEBU 17a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | [10c1 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [10c2 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10c3 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [10c4 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [10c5 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10c6 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10c7 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10c8 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10c9 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10ca 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10cb 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10cc 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 gate 1602702086142447400 evaluation starts +peer1.org1.example.com | [10cd 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10ce 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [10cf 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 principal matched by identity 0 +peer1.org1.example.com | [10d0 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer1.org1.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer1.org1.example.com | [10d1 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer1.org1.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer1.org1.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer1.org1.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer1.org1.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer1.org1.example.com | [10d2 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [10d3 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e16960 gate 1602702086142447400 evaluation succeeds +peer1.org1.example.com | [10d4 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10d5 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10d6 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10d7 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10d8 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [10d9 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1260 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1261 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1262 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 gate 1602702086677811600 evaluation starts +peer0.org2.example.com | [1263 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1264 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1265 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 principal matched by identity 0 +peer0.org2.example.com | [1266 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1267 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1268 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1269 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d17f20 gate 1602702086677811600 evaluation succeeds +peer0.org2.example.com | [126a 10-14 19:01:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [126b 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [126c 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [126d 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [126e 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [126f 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1270 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1271 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1272 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1273 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1274 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1275 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1276 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 gate 1602702086682916300 evaluation starts +peer0.org2.example.com | [1277 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1278 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1279 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 principal matched by identity 0 +peer0.org2.example.com | [127a 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [127b 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [127c 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [127d 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d33120 gate 1602702086682916300 evaluation succeeds +peer0.org2.example.com | [127e 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [127f 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1280 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1281 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1282 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1283 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1284 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1285 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1286 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1287 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1288 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1289 10-14 19:01:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128a 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [128b 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128c 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128d 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [128e 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [128f 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1290 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1291 10-14 19:01:26.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1292 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1293 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 7a e4 1d 37 87 8e ea 1e e2 c2 29 a3 20 73 0c |.z..7......). s.| +peer0.org2.example.com | 00000010 45 16 70 d7 e7 08 7f ac 98 fc 53 16 02 19 ff b5 |E.p.......S.....| +peer0.org2.example.com | [1294 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 a6 79 2e 92 75 36 4c 21 ff f0 b7 |0D. a.y..u6L!...| +peer0.org2.example.com | 00000010 32 2e 93 da ab 07 e5 97 33 1e 0b 27 1a 7b 89 ef |2.......3..'.{..| +peer0.org2.example.com | 00000020 5b 0b 0c 2d 02 20 3d b0 e5 a0 6f 8a e0 e1 39 d8 |[..-. =...o...9.| +peer0.org2.example.com | 00000030 1a 93 1b 4b 91 ad 70 85 fe b9 99 99 1f b9 72 99 |...K..p.......r.| +peer0.org2.example.com | 00000040 c5 7d a9 93 26 9a |.}..&.| +peer0.org2.example.com | [1295 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1296 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1297 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1298 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1299 10-14 19:01:28.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [129a 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [129b 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129c 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129d 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [129e 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [129f 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [12a0 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12a1 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [12a2 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12a3 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [12a4 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12a5 10-14 19:01:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [12a6 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12a8 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [12a9 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12a7 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [12aa 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ab 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [12ac 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [12ad 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ae 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [12af 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [12b0 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b1 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [12b2 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [12b3 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12b4 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12b5 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161017 +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.341 UTC [common.channelconfig] NewStandardValues -> DEBU 17a5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-10-14 19:02:16.341 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a6 Processing field: ConsensusType" +orderer0.example.com | "2020-10-14 19:02:16.341 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a7 Processing field: BatchSize" +orderer0.example.com | "2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a8 Processing field: BatchTimeout" +orderer0.example.com | "2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a9 Processing field: KafkaBrokers" +orderer0.example.com | "2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17aa Processing field: ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ab Processing field: Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [common.channelconfig] NewStandardValues -> DEBU 17ac Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ad Processing field: Endpoints" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [common.channelconfig] NewStandardValues -> DEBU 17ae Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17af Processing field: MSP" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [common.channelconfig] validateMSP -> DEBU 17b0 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [msp] newBccspMsp -> DEBU 17b1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.347 UTC [msp] New -> DEBU 17b2 Creating Cache-MSP instance" +orderer0.example.com | "2020-10-14 19:02:16.348 UTC [msp] Setup -> DEBU 17b3 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:16.349 UTC [msp.identity] newIdentity -> DEBU 17b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:16.350 UTC [msp] Setup -> DEBU 17b5 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2020-10-14 19:02:16.350 UTC [msp] Setup -> DEBU 17b6 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b8 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b9 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17ba Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bb Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bc Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bd Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17be Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.353 UTC [policies] NewManagerImpl -> DEBU 17bf Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.353 UTC [policies] NewManagerImpl -> DEBU 17c0 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.353 UTC [policies] GetPolicy -> DEBU 17c1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.353 UTC [policies] GetPolicy -> DEBU 17c2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c3 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] GetPolicy -> DEBU 17c4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] GetPolicy -> DEBU 17c5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c6 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c7 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c8 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c9 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17ca Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cd Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17ce Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17cf Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17d0 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17d1 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.357 UTC [policies] NewManagerImpl -> DEBU 17d2 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-10-14 19:02:16.357 UTC [policies] NewManagerImpl -> DEBU 17d3 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-10-14 19:02:16.357 UTC [common.configtx] addToMap -> DEBU 17d4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-10-14 19:02:16.357 UTC [common.configtx] addToMap -> DEBU 17d5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17db Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17dc Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17dd Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17de Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17df Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e2 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e8 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e9 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17ea Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [119e 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [119f 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 gate 1602702081973299400 evaluation succeeds +peer0.org1.example.com | [11a0 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11a1 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11a2 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11a3 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11a4 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [11a5 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [11a6 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11a7 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [11a8 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [11a9 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11aa 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11ab 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11ac 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11ad 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11ae 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11af 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11b0 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11b1 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11b2 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11b3 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [11b4 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11b5 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [11b6 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [11b7 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11b8 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [11b9 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [11ba 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10da 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [10db 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [10dc 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [10dd 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10de 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10df 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10e0 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [10e1 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e2 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e3 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e4 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [10e5 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [10e6 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [10e7 10-14 19:01:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10e8 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10e9 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [10ea 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10eb 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ec 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ed 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ee 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10ef 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10f0 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [10f1 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10f2 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [10f3 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10f4 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [10f5 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [10f6 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10f7 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10f8 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10f9 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10fa 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10fb 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10fc 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10fd 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ae40 gate 1602702086269736600 evaluation starts +peer1.org1.example.com | [10fe 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ae40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10ff 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ae40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1100 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ae40 principal matched by identity 0 +peer1.org1.example.com | [1101 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer1.org1.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org1.example.com | [1102 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer1.org1.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer1.org1.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer1.org1.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer1.org1.example.com | 00000040 85 3c 63 67 76 9c |. DEBU 0xc003e3ae40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1104 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ae40 gate 1602702086269736600 evaluation succeeds +peer1.org1.example.com | [1105 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1106 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1107 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1108 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1109 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [110a 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [110b 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [110c 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [110d 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [110e 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [110f 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1110 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1111 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1112 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1113 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1114 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1115 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [132f 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1330 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1331 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1332 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1333 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1334 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1335 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1336 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1337 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1338 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1339 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [133a 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [133b 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [133c 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [133d 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [133e 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [133f 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1340 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1341 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1342 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [11bb 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11bc 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11bd 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11be 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11bf 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11c0 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11c1 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 gate 1602702082133565200 evaluation starts +peer0.org1.example.com | [11c2 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11c3 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [11c4 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 principal matched by identity 0 +peer0.org1.example.com | [11c5 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer0.org1.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer0.org1.example.com | [11c6 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer0.org1.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer0.org1.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer0.org1.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer0.org1.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer0.org1.example.com | [11c7 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11c8 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 gate 1602702082133565200 evaluation succeeds +peer0.org1.example.com | [11c9 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11ca 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11cb 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11cc 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11cd 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [11ce 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [11cf 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [11d0 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [11d1 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [11d2 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d3 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d4 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d5 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [11d6 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11d7 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11d8 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11d9 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12b6 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BDF5A5940A899C64AC360B2D1BE8350E824032948F800D7236A2D60FF53AB9A7 +peer0.org2.example.com | [12b7 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12b8 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [12b9 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [12ba 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [12bb 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bc 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bd 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12be 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12bf 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12c0 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12c1 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [12c2 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12c3 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1116 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1117 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1118 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1119 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [111a 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [111b 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [111c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [111d 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [111e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [111f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1120 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1121 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1122 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1123 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1124 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1125 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1126 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1127 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1128 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1129 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [112a 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17eb Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ed Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ee Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ef Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17fa Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fb Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fc Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fe Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17ff Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 1800 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1801 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1802 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1803 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1804 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-10-14 19:02:16.369 UTC [common.configtx] addToMap -> DEBU 1805 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:16.370 UTC [common.channelconfig] LogSanityChecks -> DEBU 1806 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.370 UTC [common.channelconfig] LogSanityChecks -> DEBU 1807 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.370 UTC [policies] Manager -> DEBU 1808 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-10-14 19:02:16.370 UTC [policies] Manager -> DEBU 1809 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.371 UTC [policies] Manager -> DEBU 180a Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.371 UTC [policies] Manager -> DEBU 180b Manager Channel/Application looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.372 UTC [policies] Manager -> DEBU 180c Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2020-10-14 19:02:16.372 UTC [policies] Manager -> DEBU 180d Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-10-14 19:02:16.373 UTC [policies] Manager -> DEBU 180e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-10-14 19:02:16.373 UTC [common.channelconfig] LogSanityChecks -> DEBU 180f As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.374 UTC [common.channelconfig] LogSanityChecks -> DEBU 1810 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.375 UTC [common.channelconfig] LogSanityChecks -> DEBU 1811 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-10-14 19:02:16.375 UTC [policies] Manager -> DEBU 1812 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1813 Manager Channel has managers Application" +orderer0.example.com | "2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1814 Manager Channel has managers Orderer" +orderer0.example.com | "2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1815 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-10-14 19:02:16.378 UTC [policies] Manager -> DEBU 1816 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-10-14 19:02:16.378 UTC [common.channelconfig] LogSanityChecks -> DEBU 1817 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-10-14 19:02:16.380 UTC [common.channelconfig] LogSanityChecks -> DEBU 1818 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-10-14 19:02:16.380 UTC [common.channelconfig] LogSanityChecks -> DEBU 1819 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-10-14 19:02:16.384 UTC [common.channelconfig] LogSanityChecks -> DEBU 181a As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-10-14 19:02:16.385 UTC [common.capabilities] Supported -> DEBU 181b Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:02:16.385 UTC [common.capabilities] Supported -> DEBU 181c Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-10-14 19:02:16.386 UTC [orderer.common.server] func1 -> DEBU 181d Executing callback to update root CAs" +orderer0.example.com | "2020-10-14 19:02:16.386 UTC [orderer.common.server] updateTrustedRoots -> DEBU 181e updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 181f adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1820 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1821 adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2020-10-14 19:02:16.391 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1822 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-10-14 19:02:16.395 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1823 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +orderer0.example.com | "2020-10-14 19:02:16.395 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1824 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +orderer0.example.com | "2020-10-14 19:02:16.395 UTC [msp] GetDefaultSigningIdentity -> DEBU 1825 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:16.396 UTC [msp] GetDefaultSigningIdentity -> DEBU 1826 Obtaining default signing identity" +orderer0.example.com | "2020-10-14 19:02:16.397 UTC [msp.identity] Sign -> DEBU 1827 Sign: plaintext: 0A020806120B0A090A03010203100418...BBBAFCF6E4EA2CC06FE6C077F6D5BA8E " +orderer0.example.com | "2020-10-14 19:02:16.397 UTC [msp.identity] Sign -> DEBU 1828 Sign: digest: D0047FC98F5A7C169727C7E88C305EE9084D4EA50CB63B38B3C5B826527473FD " +orderer0.example.com | "2020-10-14 19:02:16.404 UTC [fsblkstorage] indexBlock -> DEBU 1829 Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +orderer0.example.com | txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +orderer0.example.com | ]" +orderer0.example.com | "2020-10-14 19:02:16.408 UTC [fsblkstorage] updateCheckpoint -> DEBU 182a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138568], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2020-10-14 19:02:16.408 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 182b [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2020-10-14 19:02:16.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 182d Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +orderer0.example.com | "2020-10-14 19:02:16.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 182e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.8µs " +orderer0.example.com | "2020-10-14 19:02:16.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 182f Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +orderer0.example.com | "2020-10-14 19:02:16.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1830 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2020-10-14 19:02:16.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1831 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.4µs " +orderer0.example.com | "2020-10-14 19:02:16.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1832 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.8µs " +orderer0.example.com | "2020-10-14 19:02:16.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1833 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:16.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1834 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1835 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1836 Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" +peer1.org2.example.com | [1343 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: alive: +peer1.org2.example.com | [1345 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1346 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1344 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1347 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1348 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1349 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [134a 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [134b 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134c 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134d 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134e 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [134f 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1350 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1351 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1352 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1353 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1354 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1355 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1356 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1357 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1358 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12c4 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12c5 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c6 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12c7 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12c8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12c9 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161018 +peer0.org2.example.com | [12ca 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 58C94B849E5E6FC8A9602EB80AE974FFEE84DBF5ABDF7ED6341450F301D89591 +peer0.org2.example.com | [12cb 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [12cc 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [12cd 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [12ce 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12cf 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12d0 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12d1 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12d2 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [12d3 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [12d4 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12d5 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [12d6 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12d7 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [12d8 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12d9 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [12db 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12da 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [12dc 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [12dd 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12de 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [12df 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12e0 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12e1 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [12e2 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [12e3 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [12e4 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 gate 1602702090178874900 evaluation starts +peer0.org2.example.com | [12e5 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [12e6 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [12e7 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 principal matched by identity 0 +peer0.org2.example.com | [12e8 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org2.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org2.example.com | [12e9 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer0.org2.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer0.org2.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer0.org2.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer0.org2.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer0.org2.example.com | [12ea 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [12eb 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12ec 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d797b0 gate 1602702090178874900 evaluation succeeds +peer0.org2.example.com | [12ed 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12ee 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12ef 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12f0 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [12f1 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12f2 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12f3 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [12f4 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer0.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer0.org2.example.com | [12f5 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer0.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org2.example.com | [12f6 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12f7 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [12f8 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12f9 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [12fa 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer0.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org1.example.com | [112b 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [112c 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [112d 10-14 19:01:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [112e 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [112f 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1130 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1131 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 gate 1602702086303779100 evaluation starts +peer1.org1.example.com | [1132 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1133 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1134 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1135 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 principal matched by identity 0 +peer1.org1.example.com | [1136 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1137 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1138 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1139 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [113a 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [113b 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [113d 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [113e 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [113f 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [113c 10-14 19:01:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1140 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e611b0 gate 1602702086303779100 evaluation succeeds +peer1.org1.example.com | [1141 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1142 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1143 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1144 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1145 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1146 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1147 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1148 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1149 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [114a 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [114b 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1359 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [135a 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [135b 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [135c 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [135d 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [135e 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [135f 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 gate 1602702090605633100 evaluation starts +peer1.org2.example.com | [1360 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1361 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1362 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1363 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 principal evaluation fails +peer1.org2.example.com | [1364 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0b50 gate 1602702090605633100 evaluation fails +peer1.org2.example.com | [1365 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1366 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1367 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1368 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 gate 1602702090609342900 evaluation starts +peer1.org2.example.com | [1369 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [136a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [136b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 principal matched by identity 0 +peer1.org2.example.com | [136c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer1.org2.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer1.org2.example.com | [136d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer1.org2.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer1.org2.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer1.org2.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer1.org2.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer1.org2.example.com | [136e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [136f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be10c0 gate 1602702090609342900 evaluation succeeds +peer1.org2.example.com | [1370 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1371 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1372 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1373 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1374 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1375 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1376 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1377 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1378 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1379 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [137a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [137b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [137c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [137d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [137e 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [137f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1380 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [11da 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +peer0.org1.example.com | [11db 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [11dc 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11dd 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11de 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11df 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e0 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e1 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e2 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e3 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e4 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e5 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11e6 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [11e7 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11e8 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e9 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [11ea 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11eb 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [11ec 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [11ed 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11ee 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11ef 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11f0 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:17.021 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1837 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 617.7µs " +orderer0.example.com | "2020-10-14 19:02:17.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1838 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +orderer0.example.com | "2020-10-14 19:02:17.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 183a Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +orderer0.example.com | "2020-10-14 19:02:17.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 183b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0088ms " +orderer0.example.com | "2020-10-14 19:02:17.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1839 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 679.2µs " +orderer0.example.com | "2020-10-14 19:02:17.128 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 183f Sending msg of 28 bytes to 3 on channel testchainid took 836µs" +orderer0.example.com | "2020-10-14 19:02:17.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1840 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.7µs " +orderer0.example.com | "2020-10-14 19:02:17.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1841 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2020-10-14 19:02:17.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1842 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2020-10-14 19:02:17.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.3µs " +orderer0.example.com | "2020-10-14 19:02:17.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1844 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6575ms " +orderer0.example.com | "2020-10-14 19:02:17.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1845 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.630 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1846 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1847 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:17.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1848 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-10-14 19:02:17.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1849 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.6µs " +orderer0.example.com | "2020-10-14 19:02:18.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184a Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2020-10-14 19:02:18.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184b Sending msg of 28 bytes to 3 on channel businesschannel took 64µs" +orderer0.example.com | "2020-10-14 19:02:18.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +orderer0.example.com | "2020-10-14 19:02:18.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +orderer0.example.com | "2020-10-14 19:02:18.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1850 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1851 Sending msg of 28 bytes to 3 on channel testchainid took 50µs" +orderer0.example.com | "2020-10-14 19:02:18.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1852 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557.5µs " +orderer0.example.com | "2020-10-14 19:02:18.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1853 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2020-10-14 19:02:18.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1854 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +orderer0.example.com | "2020-10-14 19:02:18.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1855 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 332.4µs " +orderer0.example.com | "2020-10-14 19:02:18.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1856 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.8µs " +orderer0.example.com | "2020-10-14 19:02:18.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1857 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1858 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1859 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:18.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185a Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +orderer0.example.com | "2020-10-14 19:02:18.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +orderer0.example.com | "2020-10-14 19:02:19.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185c Sending msg of 28 bytes to 2 on channel businesschannel took 126.1µs" +orderer0.example.com | "2020-10-14 19:02:19.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185d Sending msg of 28 bytes to 3 on channel businesschannel took 115.7µs" +orderer0.example.com | "2020-10-14 19:02:19.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.7µs " +orderer0.example.com | "2020-10-14 19:02:19.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.9µs " +orderer0.example.com | "2020-10-14 19:02:19.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1860 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1861 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.404 UTC [orderer.common.server] Deliver -> DEBU 1862 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:19.404 UTC [common.deliver] Handle -> DEBU 1863 Starting new deliver loop for 172.18.0.9:40176" +orderer0.example.com | "2020-10-14 19:02:19.404 UTC [common.deliver] Handle -> DEBU 1864 Attempting to read seek info message from 172.18.0.9:40176" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1865 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1866 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1867 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1868 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1869 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.405 UTC [msp] DeserializeIdentity -> DEBU 186a Obtaining identity" +orderer0.example.com | "2020-10-14 19:02:19.406 UTC [msp.identity] newIdentity -> DEBU 186b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-10-14 19:02:19.406 UTC [cauthdsl] func1 -> DEBU 186c 0xc000589320 gate 1602702139406775700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:19.406 UTC [cauthdsl] func2 -> DEBU 186d 0xc000589320 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:19.406 UTC [cauthdsl] func2 -> DEBU 186e 0xc000589320 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:19.407 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 186f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-10-14 19:02:19.407 UTC [msp] Validate -> DEBU 1870 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-10-14 19:02:19.407 UTC [msp] getCertificationChain -> DEBU 1871 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-10-14 19:02:19.407 UTC [cauthdsl] func2 -> DEBU 1872 0xc000589320 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [msp.identity] Verify -> DEBU 1873 Verify: digest = 00000000 0b c9 41 b4 5f 04 e8 7e aa 7b 0e 7e af fd 65 ce |..A._..~.{.~..e.| +orderer0.example.com | 00000010 43 8b 38 70 05 48 ee fb 49 ba 3b 0c ad 66 46 17 |C.8p.H..I.;..fF.|" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [msp.identity] Verify -> DEBU 1874 Verify: sig = 00000000 30 44 02 20 03 b0 b8 f7 09 f1 a0 cb 19 20 a8 7c |0D. ......... .|| +orderer0.example.com | 00000010 dc 65 f5 88 78 3b 02 c7 99 7c dd de a5 a0 5c 8e |.e..x;...|....\.| +orderer0.example.com | 00000020 06 78 19 43 02 20 72 18 47 52 ff cb 1f 1e 56 10 |.x.C. r.GR....V.| +orderer0.example.com | 00000030 c0 a8 ef 51 63 74 17 8c fd a0 21 f5 8e b4 de fd |...Qct....!.....| +orderer0.example.com | 00000040 f4 56 0b 57 a6 cb |.V.W..|" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [cauthdsl] func2 -> DEBU 1875 0xc000589320 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [cauthdsl] func1 -> DEBU 1876 0xc000589320 gate 1602702139406775700 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [policies] Evaluate -> DEBU 1877 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:19.408 UTC [policies] Evaluate -> DEBU 1878 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 1879 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [common.deliver] deliverBlocks -> DEBU 187d [channel: businesschannel] Received seekInfo (0xc00132a080) start: > stop: > from 172.18.0.9:40176" +orderer0.example.com | "2020-10-14 19:02:19.409 UTC [fsblkstorage] Next -> DEBU 187e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:19.410 UTC [fsblkstorage] newBlockfileStream -> DEBU 187f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1880 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1881 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1882 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:19.411 UTC [common.deliver] deliverBlocks -> DEBU 1883 [channel: businesschannel] Delivering block [6] for (0xc00132a080) for 172.18.0.9:40176" +orderer0.example.com | "2020-10-14 19:02:19.412 UTC [common.deliver] deliverBlocks -> DEBU 1884 [channel: businesschannel] Done delivering to 172.18.0.9:40176 for (0xc00132a080)" +orderer0.example.com | "2020-10-14 19:02:19.412 UTC [common.deliver] Handle -> DEBU 1885 Waiting for new SeekInfo from 172.18.0.9:40176" +peer1.org1.example.com | [114c 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [114d 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 gate 1602702086313993300 evaluation starts +peer1.org1.example.com | [114e 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [114f 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1150 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 principal matched by identity 0 +peer1.org1.example.com | [1151 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1152 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1153 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1154 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e7d070 gate 1602702086313993300 evaluation succeeds +peer1.org1.example.com | [1155 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1156 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1157 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1158 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1159 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [115a 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [115b 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [115c 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [115d 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [115e 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1160 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1161 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [115f 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1162 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1163 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1164 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1165 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1166 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1167 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1168 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1169 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 gate 1602702086325160400 evaluation starts +peer1.org1.example.com | [116a 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [116b 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [116c 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 principal matched by identity 0 +peer1.org1.example.com | [116d 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [116e 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [116f 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1170 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9f1e0 gate 1602702086325160400 evaluation succeeds +peer1.org1.example.com | [1171 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1172 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1173 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1174 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1175 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1176 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1177 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1381 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive: +peer1.org2.example.com | [1382 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1383 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1384 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1385 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1386 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1387 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1388 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1389 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [138a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [138b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [138c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [138d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [138e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [138f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 gate 1602702090632845800 evaluation starts +peer1.org2.example.com | [1390 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1391 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1392 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1394 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 principal evaluation fails +peer1.org2.example.com | [1395 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14690 gate 1602702090632845800 evaluation fails +peer1.org2.example.com | [1396 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1397 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1398 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1399 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [139a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 gate 1602702090636226500 evaluation starts +peer1.org2.example.com | [1393 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [139b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [139d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [139e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 principal matched by identity 0 +peer1.org2.example.com | [139f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 08 b4 c8 39 d3 c5 3f 0e c9 23 ad e4 2b cc 48 |....9..?..#..+.H| +peer1.org2.example.com | 00000010 bd 2c e8 43 82 6e d1 9b c7 1e 48 b1 8a 96 e0 2a |.,.C.n....H....*| +peer1.org2.example.com | [13a0 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 e6 11 9e 7a ae 71 e8 66 a0 cc |0E.!.....z.q.f..| +peer1.org2.example.com | 00000010 3c 75 cb 55 4b bb 88 9d d1 1a 0b 41 0e 9f db 90 | DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13a1 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [13a2 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be1eb0 gate 1602702090636226500 evaluation succeeds +peer1.org2.example.com | [13a3 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13a4 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13a5 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13a6 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13a7 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13a8 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1602702050573832200, 27 but got ts: inc_num:1602702050573832200 seq_num:26 +peer1.org2.example.com | [13a9 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13aa 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ab 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13ad 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ac 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ae 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13af 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13b0 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b1 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b2 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13b3 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b4 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b5 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b6 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b7 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b8 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b9 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ba 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13bb 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13bc 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13bd 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13be 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fb 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer0.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer0.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer0.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer0.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [12fd 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12fe 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ff 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1300 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1302 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer0.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer0.org2.example.com | [1303 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer0.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org2.example.com | [1304 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1305 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 92 aa c6 05 b9 84 57 fb 59 53 a7 |0E.!.......W.YS.| +peer0.org2.example.com | 00000010 51 d4 e0 4e 57 fd cd 98 63 64 48 0a 45 37 66 06 |Q..NW...cdH.E7f.| +peer0.org2.example.com | 00000020 80 34 26 47 14 02 20 3d db 2e 40 87 7c 2d ad 62 |.4&G.. =..@.|-.b| +peer0.org2.example.com | 00000030 2e eb 96 c3 36 59 7b 88 f9 36 82 1c 1a fd a0 ae |....6Y{..6......| +peer0.org2.example.com | 00000040 94 2e 67 c1 c6 82 5d |..g...]| +peer0.org2.example.com | [1306 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1307 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1308 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1301 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1309 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130a 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [130b 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130c 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [130d 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [130e 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [130f 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1310 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1311 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1312 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11f1 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11f2 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11f3 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11f4 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 gate 1602702082280911400 evaluation starts +peer0.org1.example.com | [11f5 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11f6 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [11f7 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 principal matched by identity 0 +peer0.org1.example.com | [11f8 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer0.org1.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer0.org1.example.com | [11f9 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer0.org1.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer0.org1.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer0.org1.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer0.org1.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer0.org1.example.com | [11fa 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11fb 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 gate 1602702082280911400 evaluation succeeds +peer0.org1.example.com | [11fc 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11fd 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11fe 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11ff 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1200 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1201 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1202 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1203 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1204 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1206 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1205 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1207 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1208 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1209 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [120a 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [120b 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [120c 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [120d 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [120e 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [120f 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1210 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +peer0.org1.example.com | [1211 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1313 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1314 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1315 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 gate 1602702090195725400 evaluation starts +peer0.org2.example.com | [1316 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1317 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1318 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 principal matched by identity 0 +peer0.org2.example.com | [1319 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer0.org2.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer0.org2.example.com | [131a 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer0.org2.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer0.org2.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer0.org2.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer0.org2.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org2.example.com | [131b 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [131c 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de20c0 gate 1602702090195725400 evaluation succeeds +peer0.org2.example.com | [131d 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [131e 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [131f 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1320 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1321 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1322 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1323 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1324 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer0.org2.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer0.org2.example.com | [1325 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org2.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer0.org2.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org2.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org2.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org2.example.com | [1326 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1327 10-14 19:01:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1328 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1329 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [132a 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer0.org2.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer0.org2.example.com | [132b 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer0.org2.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer0.org2.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer0.org2.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer0.org2.example.com | 00000040 85 3c 63 67 76 9c |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [132d 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [132e 10-14 19:01:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [132f 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1330 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1331 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1332 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1333 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1334 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:19.412 UTC [common.deliver] Handle -> DEBU 1886 Attempting to read seek info message from 172.18.0.9:40176" +orderer0.example.com | "2020-10-14 19:02:19.420 UTC [grpc] infof -> DEBU 1887 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:19.420 UTC [common.deliver] Handle -> WARN 1888 Error reading from 172.18.0.9:40176: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:19.420 UTC [orderer.common.server] func1 -> DEBU 1889 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:19.421 UTC [comm.grpc.server] 1 -> INFO 188a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0143ms +orderer0.example.com | "2020-10-14 19:02:19.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188c Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-10-14 19:02:19.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.6µs " +orderer0.example.com | "2020-10-14 19:02:19.559 UTC [orderer.common.server] Deliver -> DEBU 188e Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:19.559 UTC [common.deliver] Handle -> DEBU 188f Starting new deliver loop for 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.559 UTC [common.deliver] Handle -> DEBU 1890 Attempting to read seek info message from 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.560 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1893 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1894 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1895 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [cauthdsl] func1 -> DEBU 1896 0xc000c6e370 gate 1602702139561794800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:19.561 UTC [cauthdsl] func2 -> DEBU 1897 0xc000c6e370 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:19.562 UTC [cauthdsl] func2 -> DEBU 1898 0xc000c6e370 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:19.562 UTC [cauthdsl] func2 -> DEBU 1899 0xc000c6e370 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:19.562 UTC [msp.identity] Verify -> DEBU 189a Verify: digest = 00000000 34 b5 e9 de cc ac 48 65 dc 25 01 7c d2 21 87 7f |4.....He.%.|.!..| +orderer0.example.com | 00000010 d0 2e 33 18 02 51 86 41 19 7d 18 b3 0f 1e f5 4e |..3..Q.A.}.....N|" +orderer0.example.com | "2020-10-14 19:02:19.563 UTC [msp.identity] Verify -> DEBU 189b Verify: sig = 00000000 30 44 02 20 1c aa 25 72 87 6f 61 8c 3b 72 eb c2 |0D. ..%r.oa.;r..| +orderer0.example.com | 00000010 c2 ba 97 21 15 05 3e bd 42 81 70 a2 7a 94 13 30 |...!..>.B.p.z..0| +orderer0.example.com | 00000020 1b d9 95 51 02 20 26 6a f9 e9 61 ca 9e 07 73 74 |...Q. &j..a...st| +orderer0.example.com | 00000030 ed f8 50 e1 05 b2 73 34 b1 39 a1 dd 7f da 12 3f |..P...s4.9.....?| +orderer0.example.com | 00000040 74 62 05 84 90 8a |tb....|" +orderer0.example.com | "2020-10-14 19:02:19.563 UTC [cauthdsl] func2 -> DEBU 189c 0xc000c6e370 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:19.563 UTC [cauthdsl] func1 -> DEBU 189d 0xc000c6e370 gate 1602702139561794800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:19.563 UTC [policies] Evaluate -> DEBU 189e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 189f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:19.565 UTC [common.deliver] deliverBlocks -> DEBU 18a4 [channel: businesschannel] Received seekInfo (0xc00045a040) start: > stop: > from 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.565 UTC [fsblkstorage] Next -> DEBU 18a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:19.566 UTC [fsblkstorage] newBlockfileStream -> DEBU 18a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:19.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a7 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:19.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a8 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:19.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a9 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:19.567 UTC [common.deliver] deliverBlocks -> DEBU 18aa [channel: businesschannel] Delivering block [6] for (0xc00045a040) for 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.567 UTC [common.deliver] deliverBlocks -> DEBU 18ab [channel: businesschannel] Done delivering to 172.18.0.9:40178 for (0xc00045a040)" +orderer0.example.com | "2020-10-14 19:02:19.568 UTC [common.deliver] Handle -> DEBU 18ac Waiting for new SeekInfo from 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.568 UTC [common.deliver] Handle -> DEBU 18ad Attempting to read seek info message from 172.18.0.9:40178" +orderer0.example.com | "2020-10-14 19:02:19.572 UTC [common.deliver] Handle -> WARN 18ae Error reading from 172.18.0.9:40178: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:19.572 UTC [orderer.common.server] func1 -> DEBU 18af Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:19.572 UTC [comm.grpc.server] 1 -> INFO 18b0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.5646ms +orderer0.example.com | "2020-10-14 19:02:19.573 UTC [grpc] infof -> DEBU 18b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:19.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b2 Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +orderer0.example.com | "2020-10-14 19:02:19.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +orderer0.example.com | "2020-10-14 19:02:19.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.2µs " +orderer0.example.com | "2020-10-14 19:02:19.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 498.5µs " +orderer0.example.com | "2020-10-14 19:02:19.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:19.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b9 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +orderer0.example.com | "2020-10-14 19:02:19.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.1µs " +orderer0.example.com | "2020-10-14 19:02:20.005 UTC [orderer.common.server] Deliver -> DEBU 18bb Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:20.005 UTC [common.deliver] Handle -> DEBU 18bc Starting new deliver loop for 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.005 UTC [common.deliver] Handle -> DEBU 18bd Attempting to read seek info message from 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.007 UTC [cauthdsl] func1 -> DEBU 18c3 0xc000ce5570 gate 1602702140007760800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000ce5570 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000ce5570 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c6 0xc000ce5570 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.008 UTC [msp.identity] Verify -> DEBU 18c7 Verify: digest = 00000000 0f 8f b0 1d 05 d3 c5 92 a4 0a cd 71 0f 43 e5 d6 |...........q.C..| +orderer0.example.com | 00000010 a6 04 d1 35 70 14 98 28 b4 49 2f cb 0b 72 da e6 |...5p..(.I/..r..|" +orderer0.example.com | "2020-10-14 19:02:20.009 UTC [msp.identity] Verify -> DEBU 18c8 Verify: sig = 00000000 30 44 02 20 61 b7 c5 ea e2 e2 df f0 30 a8 88 b1 |0D. a.......0...| +peer0.org2.example.com | [1335 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1336 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1337 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 9a 36 2e 85 5c f6 d9 61 33 24 52 4c f0 32 d7 |..6..\..a3$RL.2.| +peer0.org2.example.com | 00000010 1a 60 a6 aa f7 14 f7 00 ce eb f7 c0 43 c0 98 70 |.`..........C..p| +peer0.org2.example.com | [1338 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 b0 e2 a1 e5 d1 03 49 a5 a3 cb 1e |0D. &......I....| +peer0.org2.example.com | 00000010 4b e0 e8 86 89 e7 b6 ed 6d 1a 3c 70 a3 20 c7 f1 |K.......m. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [133a 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [133b 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [133c 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [133d 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [133e 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [133f 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1340 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1341 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1342 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1343 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1344 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1345 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1346 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1347 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1348 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1349 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [134a 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [134b 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\336\266\265$\214y\020\215\232\002 !\322\311\215\331\265\272\026;\302\032\235\273pd\312\2328\251+=0\20165\365\036+\355#\267\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [134c 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [134d 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\336\266\265$\214y\020\215\232\002 !\322\311\215\331\265\272\026;\302\032\235\273pd\312\2328\251+=0\20165\365\036+\355#\267\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [134e 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [134f 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer0.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer0.org2.example.com | [1350 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org1.example.com | [1178 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1179 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [117a 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [117b 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [117c 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [117d 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 gate 1602702086328874500 evaluation starts +peer1.org1.example.com | [117e 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [117f 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1180 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 principal matched by identity 0 +peer1.org1.example.com | [1181 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1182 10-14 19:01:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1183 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1184 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb83e0 gate 1602702086328874500 evaluation succeeds +peer1.org1.example.com | [1185 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1186 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1187 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1188 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1189 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13bf 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13c0 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13c1 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13c2 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13c3 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13c4 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [13c5 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [13c6 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [13c7 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [13c8 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13c9 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ca 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13cb 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [13cc 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13cd 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ce 10-14 19:01:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13cf 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13d1 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d0 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d2 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [13d3 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d4 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d5 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d6 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [13d7 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13d8 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13d9 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [13da 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [13db 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [13dc 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 gate 1602702090959999800 evaluation starts +peer1.org2.example.com | [13dd 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13de 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [13df 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [13e0 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 principal evaluation fails +peer1.org2.example.com | [13e1 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58900 gate 1602702090959999800 evaluation fails +peer0.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer0.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer0.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer0.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer0.org2.example.com | [1351 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1352 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 55 0b 1b 0c 15 83 37 5f 40 99 4f |0D. UU.....7_@.O| +peer0.org2.example.com | 00000010 6a 88 82 6d 83 f2 46 c9 91 76 3e de b6 b5 24 8c |j..m..F..v>...$.| +peer0.org2.example.com | 00000020 79 10 8d 9a 02 20 21 d2 c9 8d d9 b5 ba 16 3b c2 |y.... !.......;.| +peer0.org2.example.com | 00000030 1a 9d bb 70 64 ca 9a 38 a9 2b 3d 30 81 36 35 f5 |...pd..8.+=0.65.| +peer0.org2.example.com | 00000040 1e 2b ed 23 b7 98 |.+.#..| +peer0.org2.example.com | [1353 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1354 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [1355 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1356 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1357 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1358 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1359 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [135a 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [135b 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [135c 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [135d 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [135e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [135f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\336\266\265$\214y\020\215\232\002 !\322\311\215\331\265\272\026;\302\032\235\273pd\312\2328\251+=0\20165\365\036+\355#\267\230" > > alive: +peer0.org2.example.com | [1360 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1361 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1362 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1363 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1364 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1365 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1366 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1367 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1368 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1369 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [136a 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136b 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [136c 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [136d 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136e 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136f 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1370 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1371 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1372 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1373 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1374 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1375 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1376 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1377 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1378 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1379 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [137a 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [137b 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [137c 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [137d 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [137e 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [137f 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1380 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 gate 1602702090430947300 evaluation starts +peer0.org2.example.com | [1381 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1382 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1383 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 principal matched by identity 0 +peer0.org2.example.com | [1384 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 ef 8b 78 10 4b 6b 46 c8 0b 7e 24 6b c4 92 4f |...x.KkF..~$k..O| +peer0.org2.example.com | 00000010 ce 4f 94 3d c1 3c f8 97 d5 f7 a2 d7 cf f2 26 dc |.O.=.<........&.| +peer0.org2.example.com | [1385 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 1f 75 77 45 e6 a6 05 a0 00 5d 94 |0D. #.uwE.....].| +peer0.org2.example.com | 00000010 a3 56 5a ea 78 70 43 d3 f4 dd 04 ef ea 80 87 45 |.VZ.xpC........E| +peer0.org2.example.com | 00000020 b6 d4 61 e6 02 20 1b f9 e7 95 77 c8 15 bd 43 52 |..a.. ....w...CR| +peer0.org2.example.com | 00000030 03 4e d1 97 3c 32 b9 a4 3d 88 b1 a7 74 d2 d3 fe |.N..<2..=...t...| +peer0.org2.example.com | 00000040 a7 06 57 28 51 0c |..W(Q.| +peer0.org2.example.com | [1386 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1387 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3ee80 gate 1602702090430947300 evaluation succeeds +peer0.org2.example.com | [1388 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1389 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [138a 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [138b 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [138c 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [138d 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [138e 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [138f 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1390 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1391 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1392 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1393 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1394 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1395 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1396 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1397 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1398 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1399 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [139b 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [139c 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [139d 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [139a 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [139e 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [139f 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13a0 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 gate 1602702090449844600 evaluation starts +peer0.org2.example.com | [13a1 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13a2 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [13a3 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a4 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 principal matched by identity 0 +peer0.org2.example.com | [13a5 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer0.org2.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer0.org2.example.com | [13a6 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a7 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer0.org2.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer0.org2.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer0.org2.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer0.org2.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer0.org2.example.com | [13a8 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a9 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13aa 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13ab 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6e980 gate 1602702090449844600 evaluation succeeds +peer0.org2.example.com | [13ac 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13ad 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13ae 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13af 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13b0 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b1 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13b2 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [13b3 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13b4 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b5 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [13b6 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [13b7 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [13b8 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [13b9 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13ba 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13bb 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [13bc 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13bd 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13be 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13bf 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [13c0 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13c1 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13c2 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13c3 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [13c4 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: +peer0.org2.example.com | [13c5 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [13c6 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13c7 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13c8 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13c9 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13ca 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13cb 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13cc 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13cd 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13ce 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13cf 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [13d0 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13d1 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [13d2 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [13d3 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d4 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d5 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d6 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d7 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d8 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13d9 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [13da 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13db 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13dc 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13e2 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13e3 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13e4 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [13e5 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 gate 1602702090962123900 evaluation starts +peer1.org2.example.com | [13e6 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13e7 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [13e8 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 principal matched by identity 0 +peer1.org2.example.com | [13e9 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [13ea 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [13eb 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [13ec 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c58e70 gate 1602702090962123900 evaluation succeeds +peer1.org2.example.com | [13ed 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13ee 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13ef 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13f0 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13f1 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13f2 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13f3 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [13f4 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13f5 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13f6 10-14 19:01:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [13f7 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [13f8 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [13fb 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 gate 1602702090972676600 evaluation starts +peer1.org2.example.com | [13fc 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13fd 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [13fe 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [13f9 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ff 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 principal evaluation fails +peer1.org2.example.com | [1400 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25790 gate 1602702090972676600 evaluation fails +peer1.org2.example.com | [13fa 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1401 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1402 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1403 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1404 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 gate 1602702090975032800 evaluation starts +peer1.org2.example.com | [1405 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1406 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1407 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 principal matched by identity 0 +peer1.org2.example.com | [1408 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1409 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [140a 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [140b 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c25d00 gate 1602702090975032800 evaluation succeeds +peer1.org2.example.com | [140c 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [140d 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [140e 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [140f 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1410 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1411 10-14 19:01:30.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | [13de 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13dd 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13df 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [13e0 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13e1 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13e2 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13e3 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13e4 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [13e5 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [13e6 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13e7 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 gate 1602702090606839500 evaluation starts +peer0.org2.example.com | [13e8 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13e9 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [13ea 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 principal matched by identity 0 +peer0.org2.example.com | [13eb 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer0.org2.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer0.org2.example.com | [13ec 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer0.org2.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer0.org2.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer0.org2.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer0.org2.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org2.example.com | [13ed 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13ee 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea3400 gate 1602702090606839500 evaluation succeeds +peer0.org2.example.com | [13ef 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13f0 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13f1 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13f2 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13f3 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13f4 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [13f5 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [13f6 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [13f7 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [13f8 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f9 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13fa 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13fb 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13fc 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [13fd 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13fe 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1212 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1412 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1413 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1414 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1415 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1416 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1417 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1418 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1419 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [141a 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [141b 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [141c 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [141d 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [141e 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [141f 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1420 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1421 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1422 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1423 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1424 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1425 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 gate 1602702090984398700 evaluation starts +peer1.org2.example.com | [1427 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1428 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1426 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1429 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [142a 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [142b 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [142c 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 principal evaluation fails +peer1.org2.example.com | [142d 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c77f30 gate 1602702090984398700 evaluation fails +peer1.org2.example.com | [142e 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [142f 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1430 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1431 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 gate 1602702090989952300 evaluation starts +peer1.org2.example.com | [1432 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1433 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1434 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 principal matched by identity 0 +peer1.org2.example.com | [1435 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1436 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [118a 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [118b 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [118c 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [118d 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [118e 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [118f 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1190 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1191 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1192 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1193 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1194 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1195 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1196 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 gate 1602702086336257400 evaluation starts +peer1.org1.example.com | [1197 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1198 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1199 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 principal matched by identity 0 +peer1.org1.example.com | [119a 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [119b 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [119c 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [119d 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb9f20 gate 1602702086336257400 evaluation succeeds +peer1.org1.example.com | [119e 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [119f 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11a0 10-14 19:01:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11a1 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11a2 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a3 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a4 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11a5 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11a6 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11a7 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11a8 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11a9 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11aa 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 gate 1602702086341599800 evaluation starts +peer1.org1.example.com | [11ab 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11ac 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [11ad 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 principal matched by identity 0 +peer1.org1.example.com | [11ae 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [11af 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [11b0 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [11b1 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf120 gate 1602702086341599800 evaluation succeeds +peer1.org1.example.com | [11b2 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11b3 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [11b4 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [11b5 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [11b6 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [11b7 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [11b8 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11b9 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ba 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [11bb 10-14 19:01:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11bc 10-14 19:01:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [11bd 10-14 19:01:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11be 10-14 19:01:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [11bf 10-14 19:01:26.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11c0 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [11c1 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11c2 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [11c3 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11c4 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [11c5 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11c6 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [11c7 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 b9 5b ff 51 f6 2d ee 32 57 c8 ed 3e 14 60 03 58 |.[.Q.-.2W..>.`.X| +orderer0.example.com | 00000020 8d 6a fd 81 02 20 02 b0 cb d7 17 47 59 1e 35 06 |.j... .....GY.5.| +orderer0.example.com | 00000030 f5 6c ad 58 49 cf a0 ff 74 1b 7e d7 e3 04 1c e0 |.l.XI...t.~.....| +orderer0.example.com | 00000040 e2 6b 94 c7 5f 4d |.k.._M|" +orderer0.example.com | "2020-10-14 19:02:20.009 UTC [cauthdsl] func2 -> DEBU 18c9 0xc000ce5570 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.009 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000ce5570 gate 1602702140007760800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.009 UTC [policies] Evaluate -> DEBU 18cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.011 UTC [common.deliver] deliverBlocks -> DEBU 18d1 [channel: businesschannel] Received seekInfo (0xc00132ac80) start: > stop: > from 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.011 UTC [fsblkstorage] Next -> DEBU 18d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.011 UTC [fsblkstorage] newBlockfileStream -> DEBU 18d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d4 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d6 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:20.013 UTC [common.deliver] deliverBlocks -> DEBU 18d7 [channel: businesschannel] Delivering block [6] for (0xc00132ac80) for 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.013 UTC [common.deliver] deliverBlocks -> DEBU 18d8 [channel: businesschannel] Done delivering to 172.18.0.9:40180 for (0xc00132ac80)" +orderer0.example.com | "2020-10-14 19:02:20.014 UTC [common.deliver] Handle -> DEBU 18d9 Waiting for new SeekInfo from 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.015 UTC [common.deliver] Handle -> DEBU 18da Attempting to read seek info message from 172.18.0.9:40180" +orderer0.example.com | "2020-10-14 19:02:20.019 UTC [grpc] infof -> DEBU 18db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:20.020 UTC [common.deliver] Handle -> WARN 18dc Error reading from 172.18.0.9:40180: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:20.020 UTC [orderer.common.server] func1 -> DEBU 18dd Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:20.020 UTC [comm.grpc.server] 1 -> INFO 18de streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2676ms +orderer0.example.com | "2020-10-14 19:02:20.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18df Sending msg of 28 bytes to 2 on channel businesschannel took 63.3µs" +orderer0.example.com | "2020-10-14 19:02:20.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18e0 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-10-14 19:02:20.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.1µs " +orderer0.example.com | "2020-10-14 19:02:20.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.3µs " +orderer0.example.com | "2020-10-14 19:02:20.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18e3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18e4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.285 UTC [orderer.common.server] Deliver -> DEBU 18e5 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:20.285 UTC [common.deliver] Handle -> DEBU 18e6 Starting new deliver loop for 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.285 UTC [common.deliver] Handle -> DEBU 18e7 Attempting to read seek info message from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18ec == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [cauthdsl] func1 -> DEBU 18ed 0xc000dae030 gate 1602702140286901900 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18ee 0xc000dae030 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18ef 0xc000dae030 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18f0 0xc000dae030 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [msp.identity] Verify -> DEBU 18f1 Verify: digest = 00000000 ae 52 15 22 38 b4 fc 15 82 c5 33 4b fc 00 e2 0a |.R."8.....3K....| +orderer0.example.com | 00000010 f9 6b 5f 29 77 48 18 05 03 60 d0 cf af c0 64 32 |.k_)wH...`....d2|" +peer1.org1.example.com | [11c8 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11c9 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ca 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11cb 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11cc 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11cd 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ce 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [11cf 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d0 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d1 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d2 10-14 19:01:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d3 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [11d4 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101D +peer1.org1.example.com | [11d5 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B84A13F6EFBA1A85B8CB42E2D81D8CCFE9ABA724E0E1C8F4A7ED5DA44BA05216 +peer1.org1.example.com | [11d6 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [11d7 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [11d8 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [11d9 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11da 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11db 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11dc 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1213 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1214 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1215 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1216 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1217 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1218 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1219 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [121a 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [121b 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121c 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [121d 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121e 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [121f 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1220 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer0.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer0.org1.example.com | [1221 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer0.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer0.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer0.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer0.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer0.org1.example.com | [1222 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1223 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 04 d7 83 aa 8c 9c 06 42 a2 a1 |0E.!.........B..| +peer0.org1.example.com | 00000010 0e 5c b0 65 e3 ad 26 e5 5f b3 47 d5 f7 6c aa 66 |.\.e..&._.G..l.f| +peer0.org1.example.com | 00000020 7f b7 94 08 1d 02 20 2b d8 c6 2f 5d 02 d5 a3 07 |...... +../]....| +peer0.org1.example.com | 00000030 ca 07 2b 2b a1 b0 ed 1f 3a 39 e7 4d 21 e0 1c c2 |..++....:9.M!...| +peer0.org1.example.com | 00000040 d2 65 73 40 b9 b2 90 |.es@...| +peer0.org1.example.com | [1224 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1225 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [13ff 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1400 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1401 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1402 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1403 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1404 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1405 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1406 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1407 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1408 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 gate 1602702090613806000 evaluation starts +peer0.org2.example.com | [1409 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [140a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [140c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [140b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [140d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 principal matched by identity 0 +peer0.org2.example.com | [140e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 08 b4 c8 39 d3 c5 3f 0e c9 23 ad e4 2b cc 48 |....9..?..#..+.H| +peer0.org2.example.com | 00000010 bd 2c e8 43 82 6e d1 9b c7 1e 48 b1 8a 96 e0 2a |.,.C.n....H....*| +peer0.org2.example.com | [140f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive: alive: alive: +peer0.org2.example.com | [1410 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 e6 11 9e 7a ae 71 e8 66 a0 cc |0E.!.....z.q.f..| +peer0.org2.example.com | 00000010 3c 75 cb 55 4b bb 88 9d d1 1a 0b 41 0e 9f db 90 | DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1412 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1413 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1414 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e88a90 gate 1602702090613806000 evaluation succeeds +peer0.org2.example.com | [1415 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1416 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1417 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1418 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1419 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [141a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1602702050573832200, 27 but got ts: inc_num:1602702050573832200 seq_num:26 +peer0.org2.example.com | [141b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [141d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [141e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [141f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1420 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1421 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1422 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1423 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1424 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1425 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1426 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1427 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1428 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1429 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [142a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [142b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [142c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [142d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [142e 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [142f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1430 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1431 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1432 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1433 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1434 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1435 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1436 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1437 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1438 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1439 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11dd 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [11df 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e0 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11e1 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11de 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11e2 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e3 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11e4 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e5 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e6 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11e7 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e8 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [11e9 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer1.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer1.org1.example.com | [11ea 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer1.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer1.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer1.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer1.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer1.org1.example.com | [11eb 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [11ec 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 07 a2 17 c8 fc 95 ba 0a 05 8b |0E.!............| +peer1.org1.example.com | 00000010 8d 7c 70 c7 50 52 b8 36 42 45 33 0c 0c c4 e2 aa |.|p.PR.6BE3.....| +peer1.org1.example.com | 00000020 fe 3a 0c f0 2c 02 20 09 67 51 d3 dd 24 6c bb c2 |.:..,. .gQ..$l..| +peer1.org1.example.com | 00000030 12 fb 00 b4 06 cc 9f 12 a9 ec 89 e0 69 07 b7 52 |............i..R| +peer1.org1.example.com | 00000040 e2 62 ea 11 8e 79 ab |.b...y.| +peer1.org1.example.com | [11ed 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [11ee 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [11ef 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f0 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f1 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [11f2 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f3 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [11f4 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [11f5 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1437 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1438 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca04a0 gate 1602702090989952300 evaluation succeeds +peer1.org2.example.com | [1439 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [143a 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [143b 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [143c 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [143d 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [143e 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [143f 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1440 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1441 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1442 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1443 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1444 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1445 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 gate 1602702090997232000 evaluation starts +peer1.org2.example.com | [1446 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1447 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1448 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1449 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 principal evaluation fails +peer1.org2.example.com | [144a 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca16a0 gate 1602702090997232000 evaluation fails +peer1.org2.example.com | [144b 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [144c 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [144d 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [144e 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 gate 1602702090998784200 evaluation starts +peer1.org2.example.com | [144f 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1450 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1451 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 principal matched by identity 0 +peer1.org2.example.com | [1452 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1453 10-14 19:01:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1454 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1455 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca1c10 gate 1602702090998784200 evaluation succeeds +peer1.org2.example.com | [1456 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1457 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1458 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1459 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [145a 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [145b 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [145c 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [145d 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [145e 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [145f 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1460 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1461 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1462 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1463 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1464 10-14 19:01:31.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1465 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1466 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1467 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1468 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 gate 1602702091010852500 evaluation starts +peer1.org2.example.com | [1469 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [146a 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [146b 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [146c 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 principal evaluation fails +peer1.org2.example.com | [146d 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbdd90 gate 1602702091010852500 evaluation fails +peer1.org2.example.com | [146e 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [146f 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1470 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1471 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 gate 1602702091013623000 evaluation starts +peer1.org2.example.com | [1472 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1473 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1474 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 principal matched by identity 0 +peer1.org2.example.com | [1475 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1476 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1477 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1478 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6300 gate 1602702091013623000 evaluation succeeds +peer1.org2.example.com | [1479 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [147a 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [147b 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [147c 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [147d 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147e 10-14 19:01:31.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [147f 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1480 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1481 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11f6 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11f7 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11f8 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11f9 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11fa 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11fb 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11fc 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 gate 1602702086452461600 evaluation starts +peer1.org1.example.com | [11fd 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11fe 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [11ff 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 principal matched by identity 0 +peer1.org1.example.com | [1200 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer1.org1.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer1.org1.example.com | [1201 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer1.org1.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer1.org1.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer1.org1.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer1.org1.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer1.org1.example.com | [1202 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1203 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3a360 gate 1602702086452461600 evaluation succeeds +peer1.org1.example.com | [1204 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1205 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1206 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1207 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1208 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1209 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [120a 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [120b 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer1.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer1.org1.example.com | [120c 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer1.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer1.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer1.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer1.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer1.org1.example.com | [120d 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [120e 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [120f 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1210 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1211 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1212 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1213 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1214 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1215 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1216 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1217 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1218 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1219 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [121a 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [121b 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [121c 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [121d 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f582e0 gate 1602702086457758400 evaluation starts +peer1.org1.example.com | [121e 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f582e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [121f 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f582e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1220 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f582e0 principal matched by identity 0 +peer1.org1.example.com | [1221 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer1.org1.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer1.org1.example.com | [1222 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer1.org1.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer1.org1.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer1.org1.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer1.org1.example.com | 00000040 85 3c 63 67 76 9c |. DEBU 0xc003f582e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1224 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f582e0 gate 1602702086457758400 evaluation succeeds +peer1.org1.example.com | [1225 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1226 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1227 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1228 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1229 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [122a 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [122b 10-14 19:01:26.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [122c 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer1.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer1.org1.example.com | [122d 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer1.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer1.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer1.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer1.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer1.org1.example.com | [122e 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1482 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1483 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1484 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1485 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 gate 1602702091021514000 evaluation starts +peer1.org2.example.com | [1486 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1487 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1488 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1489 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 principal evaluation fails +peer1.org2.example.com | [148a 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7500 gate 1602702091021514000 evaluation fails +peer1.org2.example.com | [148b 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [148c 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [148d 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [148e 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 gate 1602702091023466300 evaluation starts +peer1.org2.example.com | [148f 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1490 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1491 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 principal matched by identity 0 +peer1.org2.example.com | [1492 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1493 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1494 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1495 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd7a70 gate 1602702091023466300 evaluation succeeds +peer1.org2.example.com | [1496 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1497 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1498 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1499 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [149a 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [149b 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [149c 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [149d 10-14 19:01:31.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [149e 10-14 19:01:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [149f 10-14 19:01:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a0 10-14 19:01:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a1 10-14 19:01:31.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14a2 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [14a3 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [14a4 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [14a5 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610071801 +peer1.org2.example.com | [14a6 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B5E8B04BD6BE0488E94D8CD21348F28C82448F000CDCA0B31CF57ADFCCAF6F1 +peer1.org2.example.com | [14a7 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [14a8 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a9 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14aa 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ab 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ac 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [14ad 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [143e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [143f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1440 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1441 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1442 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 gate 1602702090634006600 evaluation starts +peer0.org2.example.com | [1443 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1444 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1445 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 principal matched by identity 0 +peer0.org2.example.com | [1446 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1447 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1448 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1449 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efae10 gate 1602702090634006600 evaluation succeeds +peer0.org2.example.com | [144a 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [144b 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [144c 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [144d 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [144e 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [144f 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1450 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1451 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1452 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1453 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1454 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1455 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1456 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 gate 1602702090647335700 evaluation starts +peer0.org2.example.com | [1458 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1457 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1459 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [145b 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 principal matched by identity 0 +peer0.org2.example.com | [145a 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [145c 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [145e 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [122f 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1230 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1231 10-14 19:01:26.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1232 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1233 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1234 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1235 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1236 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1237 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1238 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1239 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [123a 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [123b 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [123c 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer1.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer1.org1.example.com | [123d 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer1.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer1.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer1.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer1.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer1.org1.example.com | [123e 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [123f 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 4c 76 c0 ac b5 36 0b ad 4b |0E.!..DLv...6..K| +peer1.org1.example.com | 00000010 dc 59 ce cb 01 ae c0 77 77 44 39 48 96 15 7b 54 |.Y.....wwD9H..{T| +peer1.org1.example.com | 00000020 4f 0d d3 58 7a 02 20 0b ea 60 8d 14 0c bb 5b fe |O..Xz. ..`....[.| +peer1.org1.example.com | 00000030 7f f4 6e 7f 39 67 c5 6b f2 1f 18 2a eb cf 3a a2 |..n.9g.k...*..:.| +peer1.org1.example.com | 00000040 40 39 9c 7e 17 2d 7b |@9.~.-{| +peer1.org1.example.com | [1240 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1241 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1242 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1243 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1244 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1245 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1226 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1227 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1228 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1229 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [122a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [122b 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [122c 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [122d 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [122e 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [122f 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1230 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1231 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1232 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1233 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1234 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1235 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1236 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1237 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1238 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1239 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [123a 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123b 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [123c 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123d 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [123e 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123f 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1240 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1241 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1242 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1243 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1244 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1245 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1246 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1247 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1248 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1249 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [124a 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [124b 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161017 +peer0.org1.example.com | [124c 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C3906CA9BB28D98FAE0C7D0C8BC7128C75C3685D3FD5747C81908296EEC08995 +peer0.org1.example.com | [124d 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [124e 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [124f 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1250 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1251 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1252 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1254 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1253 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1255 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1256 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1257 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1258 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [145d 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [145f 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1460 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1461 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1462 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1463 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1464 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1465 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1e0 gate 1602702090647335700 evaluation succeeds +peer0.org2.example.com | [1466 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1467 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1468 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1469 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [146a 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [146b 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [146c 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [146d 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [146e 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [146f 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1470 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1471 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1472 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1473 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1474 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1475 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1476 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1477 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1478 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1479 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 gate 1602702090670886500 evaluation starts +peer0.org2.example.com | [147a 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [147b 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [147c 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 principal matched by identity 0 +peer0.org2.example.com | [147d 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1246 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1247 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1248 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1249 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [124a 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [124b 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [124c 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > alive: +peer1.org1.example.com | [124d 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [124e 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [124f 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1250 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1251 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1252 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1253 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1254 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1255 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1256 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1257 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1258 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1259 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [125a 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [125b 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [125c 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [125d 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610061801 +peer1.org1.example.com | [125e 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6EB2A918CF33EFFB403F073ACC21CB0A37CFC81637EF140C3A90E0A68BA08C40 +peer1.org1.example.com | [125f 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1260 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1261 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1262 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1263 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1264 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1265 10-14 19:01:28.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1266 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1267 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1268 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1269 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [126a 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [126b 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [126c 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [126d 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [126e 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [126f 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1270 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1271 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1272 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1273 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1274 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1275 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1276 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1277 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1278 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1279 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127a 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127b 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [127c 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [127d 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [127e 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [127f 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1280 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1281 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1282 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1283 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1284 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1285 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1286 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1287 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1259 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [125a 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [125b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [125c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [125d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [125e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [125f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1260 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer0.org1.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer0.org1.example.com | [1261 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer0.org1.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer0.org1.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer0.org1.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer0.org1.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer0.org1.example.com | [1262 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1263 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1264 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1265 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1266 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1267 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1268 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1269 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [126a 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [126b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [126c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [126d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [126e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [126f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 gate 1602702082597794900 evaluation starts +peer0.org1.example.com | [1270 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1271 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1272 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:02:20.287 UTC [msp.identity] Verify -> DEBU 18f2 Verify: sig = 00000000 30 44 02 20 62 8e 74 e9 12 a0 e9 15 d6 c7 d1 b7 |0D. b.t.........| +orderer0.example.com | 00000010 ef 7e 50 f8 66 1b 90 62 43 2d 0d d4 8b c1 40 ff |.~P.f..bC-....@.| +orderer0.example.com | 00000020 ba 4b f3 88 02 20 09 ae 3f 49 12 3d 27 c3 f5 03 |.K... ..?I.='...| +orderer0.example.com | 00000030 d0 87 31 e6 12 46 a1 c2 f8 ba b8 a6 c3 c2 ea 92 |..1..F..........| +orderer0.example.com | 00000040 7b 29 54 aa c0 31 |{)T..1|" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [cauthdsl] func2 -> DEBU 18f3 0xc000dae030 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [cauthdsl] func1 -> DEBU 18f4 0xc000dae030 gate 1602702140286901900 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f7 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.289 UTC [policies] Evaluate -> DEBU 18fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.289 UTC [common.deliver] deliverBlocks -> DEBU 18fb [channel: businesschannel] Received seekInfo (0xc00132b500) start: > stop: > from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.289 UTC [fsblkstorage] Next -> DEBU 18fc Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.289 UTC [fsblkstorage] newBlockfileStream -> DEBU 18fd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:20.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fe Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.290 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ff Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:20.290 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1900 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:20.290 UTC [common.deliver] deliverBlocks -> DEBU 1901 [channel: businesschannel] Delivering block [6] for (0xc00132b500) for 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.291 UTC [common.deliver] deliverBlocks -> DEBU 1902 [channel: businesschannel] Done delivering to 172.18.0.9:40182 for (0xc00132b500)" +orderer0.example.com | "2020-10-14 19:02:20.291 UTC [common.deliver] Handle -> DEBU 1903 Waiting for new SeekInfo from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.291 UTC [common.deliver] Handle -> DEBU 1904 Attempting to read seek info message from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1905 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1906 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1907 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1908 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [cauthdsl] func1 -> DEBU 190a 0xc000cf3020 gate 1602702140295587800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190b 0xc000cf3020 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190c 0xc000cf3020 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190d 0xc000cf3020 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.296 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 06 58 b3 77 6f 61 46 82 94 b1 68 3c 0c 06 5a be |.X.woaF...h<..Z.| +orderer0.example.com | 00000010 9c b0 e6 da a8 cb 60 0a 43 5f e8 39 4a 12 d2 1d |......`.C_.9J...|" +orderer0.example.com | "2020-10-14 19:02:20.296 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 45 02 21 00 d9 2a e4 28 dc df c0 41 ee c8 7a |0E.!..*.(...A..z| +orderer0.example.com | 00000010 1e 76 3d fb e8 8c 17 87 5e d9 4c 97 72 34 7c 19 |.v=.....^.L.r4|.| +peer1.org1.example.com | [1288 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1289 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [128a 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 gate 1602702090147330400 evaluation starts +peer1.org1.example.com | [128b 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [128c 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [128d 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 principal matched by identity 0 +peer1.org1.example.com | [128e 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd f5 a5 94 0a 89 9c 64 ac 36 0b 2d 1b e8 35 0e |.......d.6.-..5.| +peer1.org1.example.com | 00000010 82 40 32 94 8f 80 0d 72 36 a2 d6 0f f5 3a b9 a7 |.@2....r6....:..| +peer1.org2.example.com | [14ae 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [14af 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b0 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b1 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b2 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b3 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b4 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14b5 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14b6 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b7 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b8 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [14b9 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [14ba 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14bb 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [14bc 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [14bd 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14be 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [14bf 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [14c0 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer1.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer1.org2.example.com | [14c1 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer1.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer1.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer1.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer1.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer1.org2.example.com | [14c2 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [14c3 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 55 7e fe 38 02 8e 5b e4 e0 bd 8a 04 |0C. U~.8..[.....| +peer1.org2.example.com | 00000010 2c 89 d8 63 d6 26 77 86 db 3c 7d d4 7f 97 db 1d |,..c.&w..<}.....| +peer1.org2.example.com | 00000020 95 ee 40 4e 02 1f 3e 4f 9c 01 42 0d a2 36 f4 5f |..@N..>O..B..6._| +peer1.org2.example.com | 00000030 54 5a a1 68 51 97 d7 67 87 10 e3 e8 29 71 ce 6e |TZ.hQ..g....)q.n| +peer1.org2.example.com | 00000040 73 70 9d 85 6f |sp..o| +peer1.org2.example.com | [14c4 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes +peer1.org2.example.com | [14c5 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes]} +peer1.org2.example.com | [14c6 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [14c7 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [14c8 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [14c9 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ca 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14cb 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14cc 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [14cd 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ce 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14cf 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14d0 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [14d1 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14d2 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > alive: +peer1.org2.example.com | [14d3 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [14d4 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14d5 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [14d6 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14d7 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [14d8 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14d9 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [14da 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [14db 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14dc 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14dd 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [14de 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [147e 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [147f 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1480 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f39760 gate 1602702090670886500 evaluation succeeds +peer0.org2.example.com | [1481 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1482 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1483 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1484 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1485 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1486 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1487 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1488 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1489 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [148a 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [148b 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [148c 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [148d 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 gate 1602702090678013300 evaluation starts +peer0.org2.example.com | [148e 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [148f 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1490 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 principal matched by identity 0 +peer0.org2.example.com | [1491 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1492 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1493 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1494 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f52960 gate 1602702090678013300 evaluation succeeds +peer0.org2.example.com | [1495 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1496 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1497 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1498 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1499 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [149a 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [149b 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [128f 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 0e b9 2c e6 e4 90 4e 8b 28 30 |0E.!....,...N.(0| +peer1.org1.example.com | 00000010 60 2a 7f 6e 30 93 84 66 5c bb 56 92 6e 11 fc 2c |`*.n0..f\.V.n..,| +peer1.org1.example.com | 00000020 99 18 84 ce 13 02 20 35 c5 b8 71 99 80 08 6b 88 |...... 5..q...k.| +peer1.org1.example.com | 00000030 21 2f 86 88 6a e0 55 51 ff 5a cc 9e 62 f8 45 67 |!/..j.UQ.Z..b.Eg| +peer1.org1.example.com | 00000040 b5 1e 82 8f 61 62 8f |....ab.| +peer1.org1.example.com | [1290 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1291 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1292 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa5690 gate 1602702090147330400 evaluation succeeds +peer1.org1.example.com | [1293 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1294 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1295 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1296 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1297 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1298 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1299 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [129a 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [129b 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [129c 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [129d 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [129e 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [129f 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12a0 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a1 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a2 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a3 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a4 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12a5 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [12a6 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [12a7 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12a8 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [12a9 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12aa 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12ab 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [12ac 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [12ad 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [12ae 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 gate 1602702090162863700 evaluation starts +peer1.org1.example.com | [12af 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [12b0 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [12b1 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 principal matched by identity 0 +peer1.org1.example.com | [12b2 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer1.org1.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer1.org1.example.com | [12b3 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer1.org1.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer1.org1.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer1.org1.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer1.org1.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer1.org1.example.com | [12b4 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [12b5 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003faf4b0 gate 1602702090162863700 evaluation succeeds +peer1.org1.example.com | [12b6 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12b7 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12b8 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [12b9 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [12ba 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12bb 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [12bc 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [12bd 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [12be 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [12bf 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c0 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c1 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12c2 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [12c3 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c4 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c5 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c7 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [12c6 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12c9 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [12ca 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12cb 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12cc 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14df 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e0 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e1 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14e2 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 59 c9 9a cb bf 02 20 3b 31 26 b3 0c f7 a4 f0 1f |Y..... ;1&......| +orderer0.example.com | 00000030 e8 38 88 ac 0d 23 e0 33 0b 6f 65 eb 0a 79 e1 37 |.8...#.3.oe..y.7| +orderer0.example.com | 00000040 35 fe 9c c6 8d d2 ff |5......|" +orderer0.example.com | "2020-10-14 19:02:20.297 UTC [cauthdsl] func2 -> DEBU 1910 0xc000cf3020 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.297 UTC [cauthdsl] func1 -> DEBU 1911 0xc000cf3020 gate 1602702140295587800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.297 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.297 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1914 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1916 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [common.deliver] deliverBlocks -> DEBU 1918 [channel: businesschannel] Received seekInfo (0xc00045abc0) start: > stop: > from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [fsblkstorage] Next -> DEBU 1919 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.298 UTC [fsblkstorage] newBlockfileStream -> DEBU 191a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191b Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191c Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191d blockbytes [41176] read from file [0]" +peer0.org1.example.com | [1273 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +peer0.org1.example.com | 00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +peer0.org1.example.com | [1274 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +peer0.org1.example.com | 00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +peer0.org1.example.com | 00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +peer0.org1.example.com | 00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +peer0.org1.example.com | 00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +peer0.org1.example.com | [1275 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1276 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 gate 1602702082597794900 evaluation succeeds +peer0.org1.example.com | [1277 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1278 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1279 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [127a 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [127b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [127c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [127d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [127e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer0.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer0.org1.example.com | [127f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer0.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer0.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer0.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer0.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer0.org1.example.com | [1280 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1281 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1282 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1283 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1284 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1285 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1286 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1287 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1288 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1289 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [128a 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [128b 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [128c 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 gate 1602702082601608100 evaluation starts +peer0.org1.example.com | [128d 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [128e 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [128f 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 principal matched by identity 0 +peer0.org2.example.com | [149c 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [149d 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [149e 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [149f 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14a0 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14a1 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14a2 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14a3 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14a4 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14a5 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14a6 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [14a7 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 gate 1602702090681822600 evaluation starts +peer0.org2.example.com | [14a8 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14a9 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [14aa 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 principal matched by identity 0 +peer0.org2.example.com | [14ab 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [14ac 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [14ad 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14ae 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6cae0 gate 1602702090681822600 evaluation succeeds +peer0.org2.example.com | [14af 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14b0 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14b1 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14b2 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14b3 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [14b4 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | [12c8 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: alive: alive: +peer1.org1.example.com | [12cd 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ce 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12cf 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d0 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [12d1 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d3 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d2 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12d4 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [12d6 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12d7 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d5 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12d8 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12d9 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12da 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12db 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12dc 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12dd 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12de 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12df 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e0 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e1 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e2 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e3 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e4 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12e5 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [12e6 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e7 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12e8 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1290 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +peer0.org1.example.com | 00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +peer0.org1.example.com | [1291 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +peer0.org1.example.com | 00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +peer0.org1.example.com | 00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +peer0.org1.example.com | 00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +peer0.org1.example.com | 00000040 7b e6 4c 9c 71 72 |{.L.qr| +peer0.org1.example.com | [1292 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1293 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 gate 1602702082601608100 evaluation succeeds +peer0.org1.example.com | [1294 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1295 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1296 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1297 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1298 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1299 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [129a 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [129b 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer0.org1.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer0.org1.example.com | [129c 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer0.org1.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer0.org1.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer0.org1.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer0.org1.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer0.org1.example.com | [129d 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [129e 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [129f 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a0 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [12a1 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +peer0.org1.example.com | 00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +peer0.org1.example.com | [12a2 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +peer0.org1.example.com | 00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +peer0.org1.example.com | 00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +peer0.org1.example.com | 00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +peer0.org1.example.com | 00000040 20 26 08 6d 7c a6 ff | &.m|..| +peer0.org1.example.com | [12a4 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12a3 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a5 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a6 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [12a7 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12a8 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [12a9 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [12aa 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +peer0.org1.example.com | 00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +peer0.org1.example.com | [12ab 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +peer0.org1.example.com | 00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +peer0.org1.example.com | 00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +peer0.org1.example.com | 00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +peer0.org1.example.com | 00000040 ba 89 f4 bb 47 89 1a |....G..| +peer0.org1.example.com | [12ac 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ad 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [12ae 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d d9 ab 2a 05 00 cf fc b5 ff |0E.!.....*......| +peer0.org1.example.com | 00000010 f0 b8 3b 53 9c db 85 06 34 6b 9c af 7d d9 49 0d |..;S....4k..}.I.| +peer0.org1.example.com | 00000020 fe ed b0 31 26 02 20 33 fd a0 4c e6 1c 19 21 b7 |...1&. 3..L...!.| +peer0.org1.example.com | 00000030 f0 b7 7a 2a 1c d9 e6 52 75 54 91 8c 81 3a 6f 64 |..z*...RuT...:od| +peer0.org1.example.com | 00000040 08 10 5c fd 1d f2 1a |..\....| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [14b5 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [14b6 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [14b7 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14b8 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14b9 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [14ba 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14bb 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14bc 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14bd 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14be 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [14bf 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 gate 1602702090683412500 evaluation starts +peer0.org2.example.com | [14c0 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14c1 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [14c2 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 principal matched by identity 0 +peer0.org2.example.com | [14c3 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [14c4 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [14c5 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14c6 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f86ac0 gate 1602702090683412500 evaluation succeeds +peer0.org2.example.com | [14c7 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14c8 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [14c9 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14ca 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14cb 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14cc 10-14 19:01:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [14cd 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [14ce 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14cf 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14e3 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e4 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e5 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14e6 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e7 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e8 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [14e9 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ea 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [14eb 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161019 +peer1.org2.example.com | [14ec 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6E86FC17D313ABFCC9DA37CFF73FBF7AAFAC231A7953C952B68D0CCD76D767D3 +peer1.org2.example.com | [14ed 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [14ee 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [14ef 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [14f0 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14f1 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14f2 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14f3 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14f4 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [14f5 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [14f6 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [14f9 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14f7 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e9 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12ea 10-14 19:01:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [12eb 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ec 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [12ed 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12ee 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12ef 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [12f0 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [12f1 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [12f2 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040261b0 gate 1602702090271807900 evaluation starts +peer1.org1.example.com | [12f3 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040261b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [12f4 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040261b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [12f5 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040261b0 principal matched by identity 0 +peer1.org1.example.com | [12f6 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 9a 36 2e 85 5c f6 d9 61 33 24 52 4c f0 32 d7 |..6..\..a3$RL.2.| +peer1.org1.example.com | 00000010 1a 60 a6 aa f7 14 f7 00 ce eb f7 c0 43 c0 98 70 |.`..........C..p| +peer1.org1.example.com | [12f7 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 b0 e2 a1 e5 d1 03 49 a5 a3 cb 1e |0D. &......I....| +peer1.org1.example.com | 00000010 4b e0 e8 86 89 e7 b6 ed 6d 1a 3c 70 a3 20 c7 f1 |K.......m. DEBU 0xc0040261b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [12f9 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040261b0 gate 1602702090271807900 evaluation succeeds +peer1.org1.example.com | [12fa 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12fb 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12fc 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [12fd 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [12fe 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [12ff 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1300 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1301 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1302 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1303 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1304 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1306 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1305 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1307 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1308 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1309 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [130a 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [130b 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [130c 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [130d 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [130e 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [130f 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1310 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1311 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1312 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1313 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1314 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1315 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1316 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 gate 1602702090288823100 evaluation starts +peer1.org1.example.com | [1317 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1318 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1319 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 principal matched by identity 0 +peer1.org1.example.com | [131a 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer1.org1.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer1.org1.example.com | [131b 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org1.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer1.org1.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer1.org1.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer1.org1.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer1.org1.example.com | [131c 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [131d 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004027dc0 gate 1602702090288823100 evaluation succeeds +peer1.org1.example.com | [131e 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [131f 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1320 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1321 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1322 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1323 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1325 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1326 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1327 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1324 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1328 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1329 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [132a 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [132b 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [132f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1330 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [132c 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1332 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [132d 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1333 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12af 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [12b0 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [12b1 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b2 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b3 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b4 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b5 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b6 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b7 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12b8 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b9 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12ba 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [12bb 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12bc 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12bd 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12be 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12bf 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [12c0 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 f6 3f 51 52 2c 49 9d 7d 9a 11 9d 72 2c b1 5b |6.?QR,I.}...r,.[| +peer0.org1.example.com | 00000010 77 86 5e 54 83 97 b6 ac 53 07 9c 8a 0c 87 12 0a |w.^T....S.......| +peer0.org1.example.com | [12c1 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed d2 1a 20 ef 75 c9 cc 82 00 af |0E.!.... .u.....| +peer0.org1.example.com | 00000010 27 e4 49 45 8d 62 da e9 61 1f de 76 fb e5 e4 25 |'.IE.b..a..v...%| +peer0.org1.example.com | 00000020 15 6f a6 c3 e3 02 20 1a 89 dd 03 07 1c ea ee e7 |.o.... .........| +peer0.org1.example.com | 00000030 16 e6 32 7e 48 af 94 d7 f3 ad 0a 07 18 44 99 bf |..2~H........D..| +peer0.org1.example.com | 00000040 63 be dd 67 6b 09 26 |c..gk.&| +peer0.org1.example.com | [12c2 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c3 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c4 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c5 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [12c6 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [12c7 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12c8 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12c9 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ca 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12cb 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [12cc 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14d0 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d1 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d2 10-14 19:01:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14d3 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d4 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14d5 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14d6 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14d7 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d8 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d9 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [14da 10-14 19:01:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14db 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [14dc 10-14 19:01:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 5e 8b 04 bd 6b e0 48 8e 94 d8 cd 21 34 8f 28 |.^...k.H....!4.(| +peer0.org2.example.com | 00000010 c8 24 48 f0 00 cd ca 0b 31 cf 57 ad fc ca f6 f1 |.$H.....1.W.....| +peer0.org2.example.com | [14dd 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 08 94 23 c2 9a 17 2b 4d ce 12 5b |0D. F..#...+M..[| +peer0.org2.example.com | 00000010 05 10 7c 49 ca 4f 92 5d 52 77 28 eb 07 78 7e 75 |..|I.O.]Rw(..x~u| +peer0.org2.example.com | 00000020 c4 cf 83 9e 02 20 59 81 e6 6b 78 af fb 36 9b 6a |..... Y..kx..6.j| +peer0.org2.example.com | 00000030 23 b1 cc c9 a4 1a 4c 27 1a 06 62 c0 cc af fe 76 |#.....L'..b....v| +peer0.org2.example.com | 00000040 8c 63 f4 bb da b4 |.c....| +peer0.org2.example.com | [14de 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14df 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e0 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e1 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [14e2 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [14e3 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [14e4 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [14e5 10-14 19:01:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [14e6 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14e7 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e8 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14e9 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ea 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14eb 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [14ec 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14ed 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [14ee 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14ef 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [14f0 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14f1 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f2 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f3 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f4 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f5 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f6 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14f7 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:20.299 UTC [common.deliver] deliverBlocks -> DEBU 191e [channel: businesschannel] Delivering block [6] for (0xc00045abc0) for 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.300 UTC [common.deliver] deliverBlocks -> DEBU 191f [channel: businesschannel] Done delivering to 172.18.0.9:40182 for (0xc00045abc0)" +orderer0.example.com | "2020-10-14 19:02:20.300 UTC [common.deliver] Handle -> DEBU 1920 Waiting for new SeekInfo from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.300 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 172.18.0.9:40182" +orderer0.example.com | "2020-10-14 19:02:20.306 UTC [common.deliver] Handle -> WARN 1922 Error reading from 172.18.0.9:40182: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:20.306 UTC [orderer.common.server] func1 -> DEBU 1924 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:20.306 UTC [comm.grpc.server] 1 -> INFO 1925 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.2078ms +orderer0.example.com | "2020-10-14 19:02:20.306 UTC [grpc] infof -> DEBU 1923 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:20.475 UTC [orderer.common.server] Deliver -> DEBU 1926 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:20.475 UTC [common.deliver] Handle -> DEBU 1927 Starting new deliver loop for 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.475 UTC [common.deliver] Handle -> DEBU 1928 Attempting to read seek info message from 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.476 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.477 UTC [cauthdsl] func1 -> DEBU 192e 0xc001040600 gate 1602702140477772100 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 192f 0xc001040600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 1930 0xc001040600 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 1931 0xc001040600 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.478 UTC [msp.identity] Verify -> DEBU 1932 Verify: digest = 00000000 e0 76 be 9d 98 45 71 02 8a ac 4d 9f 1c c5 65 74 |.v...Eq...M...et| +orderer0.example.com | 00000010 02 a2 1c 99 4f f2 6d 49 b7 12 c9 11 b3 44 c6 18 |....O.mI.....D..|" +orderer0.example.com | "2020-10-14 19:02:20.478 UTC [msp.identity] Verify -> DEBU 1933 Verify: sig = 00000000 30 45 02 21 00 e7 b2 9d f9 ce c6 d1 5f 94 c3 be |0E.!........_...| +orderer0.example.com | 00000010 0e 4c e1 e1 25 c6 56 4c a0 92 28 f2 49 9e af 8b |.L..%.VL..(.I...| +orderer0.example.com | 00000020 3d 41 f0 03 7d 02 20 40 59 78 05 0b bd 48 f0 df |=A..}. @Yx...H..| +orderer0.example.com | 00000030 d6 2c 5d 97 5e f8 4f d1 b3 91 af 80 bd 0f 3c 3b |.,].^.O.......<;| +orderer0.example.com | 00000040 97 e3 c6 2d ec 49 f8 |...-.I.|" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [cauthdsl] func2 -> DEBU 1934 0xc001040600 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [cauthdsl] func1 -> DEBU 1935 0xc001040600 gate 1602702140477772100 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1936 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1937 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1938 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1939 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 193a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.480 UTC [policies] Evaluate -> DEBU 193b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.480 UTC [common.deliver] deliverBlocks -> DEBU 193c [channel: businesschannel] Received seekInfo (0xc00132bc80) start: > stop: > from 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.480 UTC [fsblkstorage] Next -> DEBU 193d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 193e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 193f Remaining bytes=[138568], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1940 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1941 blockbytes [28471] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:20.481 UTC [common.deliver] deliverBlocks -> DEBU 1942 [channel: businesschannel] Delivering block [0] for (0xc00132bc80) for 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.482 UTC [common.deliver] deliverBlocks -> DEBU 1943 [channel: businesschannel] Done delivering to 172.18.0.9:40184 for (0xc00132bc80)" +orderer0.example.com | "2020-10-14 19:02:20.482 UTC [common.deliver] Handle -> DEBU 1944 Waiting for new SeekInfo from 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1946 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1947 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2020-10-14 19:02:20.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1948 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242µs " +orderer0.example.com | "2020-10-14 19:02:20.482 UTC [common.deliver] Handle -> DEBU 1945 Attempting to read seek info message from 172.18.0.9:40184" +orderer0.example.com | "2020-10-14 19:02:20.494 UTC [common.deliver] Handle -> WARN 1949 Error reading from 172.18.0.9:40184: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:20.494 UTC [orderer.common.server] func1 -> DEBU 194b Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:20.494 UTC [comm.grpc.server] 1 -> INFO 194c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5779ms +orderer0.example.com | "2020-10-14 19:02:20.494 UTC [grpc] infof -> DEBU 194a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:20.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194d Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-10-14 19:02:20.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194e Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-10-14 19:02:20.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.1µs " +orderer0.example.com | "2020-10-14 19:02:20.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1950 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +orderer0.example.com | "2020-10-14 19:02:20.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1951 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1952 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.726 UTC [orderer.common.server] Deliver -> DEBU 1953 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:20.726 UTC [common.deliver] Handle -> DEBU 1954 Starting new deliver loop for 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.726 UTC [common.deliver] Handle -> DEBU 1955 Attempting to read seek info message from 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1956 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1957 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1958 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1959 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 195a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [cauthdsl] func1 -> DEBU 195b 0xc000ebffd0 gate 1602702140727385800 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195c 0xc000ebffd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195d 0xc000ebffd0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195e 0xc000ebffd0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [msp.identity] Verify -> DEBU 195f Verify: digest = 00000000 7e 14 bd a0 e6 22 8c 0a 8d 1a 40 d8 fc b2 c1 0f |~...."....@.....| +orderer0.example.com | 00000010 e5 a5 5b e7 30 df 82 73 af 99 8d df 39 f9 6e 5e |..[.0..s....9.n^|" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [msp.identity] Verify -> DEBU 1960 Verify: sig = 00000000 30 45 02 21 00 bf 31 2d 35 49 2e 5b dd f9 c8 8c |0E.!..1-5I.[....| +orderer0.example.com | 00000010 a0 ac 2b 9a 5e 79 ca 9e 50 57 d3 ca fb 42 49 a7 |..+.^y..PW...BI.| +orderer0.example.com | 00000020 40 bc 62 18 78 02 20 26 36 97 be ce ed 76 00 07 |@.b.x. &6....v..| +orderer0.example.com | 00000030 85 fe 2f 60 5c 1d eb 72 f3 d0 97 fc e6 e0 bf 01 |../`\..r........| +orderer0.example.com | 00000040 82 eb fe 2a 9f 2a fb |...*.*.|" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [cauthdsl] func2 -> DEBU 1961 0xc000ebffd0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [cauthdsl] func1 -> DEBU 1962 0xc000ebffd0 gate 1602702140727385800 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1963 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1964 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1965 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1966 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1967 Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [14f8 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [14fa 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14fb 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14fc 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14fd 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14fe 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14ff 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1500 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1501 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1502 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1503 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1504 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1505 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer1.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer1.org2.example.com | [1506 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer1.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer1.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer1.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer1.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer1.org2.example.com | [1507 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1508 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1509 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [150a 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer1.org2.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer1.org2.example.com | [150b 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer1.org2.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer1.org2.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer1.org2.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer1.org2.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer1.org2.example.com | [150c 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [150d 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [150e 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [150f 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1510 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1512 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1513 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1511 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1514 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1515 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1516 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1517 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1518 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1519 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [151a 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 gate 1602702094325776100 evaluation starts +peer1.org2.example.com | [151b 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [151c 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [151d 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [151e 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 principal evaluation fails +peer1.org2.example.com | [151f 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f0f0 gate 1602702094325776100 evaluation fails +peer1.org2.example.com | [1520 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1521 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1522 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1523 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 gate 1602702094329695500 evaluation starts +peer1.org2.example.com | [1524 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1525 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1526 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 principal matched by identity 0 +peer1.org2.example.com | [1527 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer1.org2.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer1.org2.example.com | [1528 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer1.org2.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer1.org2.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer1.org2.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer1.org1.example.com | [132e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1334 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1331 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1335 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1336 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1337 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1338 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1339 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133a 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [133b 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133c 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133d 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > alive: alive: alive: +peer1.org1.example.com | [133e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1340 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1341 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1343 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer1.org2.example.com | [1529 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [152a 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d6f660 gate 1602702094329695500 evaluation succeeds +peer1.org2.example.com | [152b 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [152c 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [152d 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [152e 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [152f 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1530 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1531 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1532 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1533 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1534 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1535 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1536 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer1.org2.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer1.org2.example.com | [1537 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer1.org2.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer1.org2.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer1.org2.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer1.org2.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer1.org2.example.com | [1538 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | "2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1968 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.729 UTC [common.deliver] deliverBlocks -> DEBU 1969 [channel: businesschannel] Received seekInfo (0xc00045b740) start: > stop: > from 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.729 UTC [fsblkstorage] Next -> DEBU 196a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.729 UTC [fsblkstorage] newBlockfileStream -> DEBU 196b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196c Remaining bytes=[110094], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196d Returning blockbytes - length=[28164], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196e blockbytes [28164] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [common.deliver] deliverBlocks -> DEBU 196f [channel: businesschannel] Delivering block [1] for (0xc00045b740) for 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [common.deliver] deliverBlocks -> DEBU 1970 [channel: businesschannel] Done delivering to 172.18.0.9:40186 for (0xc00045b740)" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [common.deliver] Handle -> DEBU 1971 Waiting for new SeekInfo from 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.730 UTC [common.deliver] Handle -> DEBU 1972 Attempting to read seek info message from 172.18.0.9:40186" +orderer0.example.com | "2020-10-14 19:02:20.742 UTC [grpc] infof -> DEBU 1973 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:20.742 UTC [common.deliver] Handle -> WARN 1974 Error reading from 172.18.0.9:40186: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:20.742 UTC [orderer.common.server] func1 -> DEBU 1975 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:20.742 UTC [comm.grpc.server] 1 -> INFO 1976 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40186 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.1193ms +orderer0.example.com | "2020-10-14 19:02:20.916 UTC [orderer.common.server] Deliver -> DEBU 1977 Starting new Deliver handler" +peer1.org1.example.com | [1345 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1344 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1342 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1346 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1347 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1348 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1349 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [134a 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134b 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134c 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134d 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [134e 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [134f 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1350 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1351 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1355 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1352 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1356 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1357 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1358 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1359 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1353 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [135a 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [135b 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [135c 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [135d 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [135e 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [135f 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 gate 1602702090333818100 evaluation starts +peer1.org1.example.com | [1360 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [12cd 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [12ce 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12cf 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [12d0 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [12d1 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [12d2 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [12d3 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 gate 1602702085143275800 evaluation starts +peer0.org1.example.com | [12d4 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [12d5 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [12d6 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 principal matched by identity 0 +peer0.org1.example.com | [12d7 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8b df ea 54 a6 bb 22 09 a9 13 89 fd e0 61 06 |....T.."......a.| +peer0.org1.example.com | 00000010 c4 c2 e7 26 61 00 c4 f8 48 8d 3c 11 6d d7 d2 18 |...&a...H.<.m...| +peer0.org1.example.com | [12d8 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 45 05 fc ae 4f cc a6 43 49 71 |0E.!..E...O..CIq| +peer0.org1.example.com | 00000010 9e f8 de 5c 99 b4 5f c7 df de cd 44 6c 34 c2 16 |...\.._....Dl4..| +peer0.org1.example.com | 00000020 2b 26 c7 76 40 02 20 7e f2 87 1a 5a ae ae f3 77 |+&.v@. ~...Z...w| +peer0.org1.example.com | 00000030 34 37 75 02 a4 97 1a 64 6a d3 6e 98 28 a6 63 9e |47u....dj.n.(.c.| +peer0.org1.example.com | 00000040 04 62 ab 88 93 cf 2f |.b..../| +peer0.org1.example.com | [12d9 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12da 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 gate 1602702085143275800 evaluation succeeds +peer0.org1.example.com | [12db 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12dc 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [12dd 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12de 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12df 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e0 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [12e1 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [12e2 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [12e3 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [12e4 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12e5 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12e6 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12e7 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e8 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12e9 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ea 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12eb 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ec 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ed 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ee 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ef 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f0 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f1 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f2 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f3 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12f4 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f5 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [12f6 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12f7 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12f9 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12f8 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12fa 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12fb 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12fc 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12fd 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12fe 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [12ff 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1300 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1301 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1302 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1303 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1304 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1305 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1306 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1307 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1308 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1309 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [130a 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 gate 1602702085271569900 evaluation starts +peer0.org1.example.com | [130b 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [130c 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [130d 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 principal matched by identity 0 +peer0.org1.example.com | [130e 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 f1 d8 72 21 84 36 61 f6 c6 dc fa 5a 79 2c 28 |...r!.6a....Zy,(| +peer0.org1.example.com | 00000010 d8 99 9f 1a b8 00 43 dc 38 0b b6 02 7e 29 9f 22 |......C.8...~)."| +peer0.org1.example.com | [1310 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a2 31 32 4f 87 91 77 69 93 b4 98 |0D. $.12O..wi...| +peer0.org1.example.com | 00000010 f8 74 c2 94 cc 93 7c de 04 76 e8 7e 06 df 3a 8a |.t....|..v.~..:.| +peer0.org1.example.com | 00000020 28 d1 e0 16 02 20 50 bf 9c 48 7b e9 34 cb 5a e7 |(.... P..H{.4.Z.| +peer0.org1.example.com | 00000030 19 f8 8f 6e 47 81 cc b6 1a be 3d 2b a4 c1 1d ef |...nG.....=+....| +peer0.org1.example.com | 00000040 50 a8 79 c5 bd 1d |P.y...| +peer0.org1.example.com | [130f 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1311 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1312 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1313 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 gate 1602702085271569900 evaluation succeeds +peer0.org1.example.com | [1314 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1315 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1316 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1317 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1318 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1319 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [131a 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [131b 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [131c 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [131d 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131e 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131f 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1320 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1321 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1322 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1323 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1325 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1326 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1327 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1324 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1328 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1329 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132a 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132b 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132c 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132d 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132e 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [132f 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1330 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1361 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1362 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 principal matched by identity 0 +peer1.org1.example.com | [1363 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1364 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1365 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1366 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004077ae0 gate 1602702090333818100 evaluation succeeds +peer1.org1.example.com | [1367 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1368 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1369 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [136a 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [136b 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1354 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [136c 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [136d 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [136e 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [136f 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1370 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1371 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1372 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1373 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 gate 1602702090344373600 evaluation starts +peer1.org1.example.com | [1374 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1375 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1376 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 principal matched by identity 0 +peer1.org1.example.com | [1377 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1378 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1379 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [137a 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a4ce0 gate 1602702090344373600 evaluation succeeds +peer1.org1.example.com | [137b 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [137c 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [137d 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [137e 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1331 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1332 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1333 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1334 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1335 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1336 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1337 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1338 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1339 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 93 01 12 a9 a0 f9 b7 66 2d 1a c5 72 5c 81 c5 |........f-..r\..| +peer0.org1.example.com | 00000010 89 a3 8e af 23 6d 2c 59 97 c6 dd ab d3 ca 57 ee |....#m,Y......W.| +peer0.org1.example.com | [133a 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a ea eb f7 65 a5 be a5 71 d5 09 c1 |0D. ....e...q...| +peer0.org1.example.com | 00000010 b7 10 6f 3b ce 9b f4 76 1f fc d1 6b 72 c7 c3 3c |..o;...v...kr..<| +peer0.org1.example.com | 00000020 c8 e7 a0 82 02 20 19 15 c0 19 84 79 47 95 42 e2 |..... .....yG.B.| +peer0.org1.example.com | 00000030 bb ee 7a 25 ff 21 c5 ab 0a a4 bb 32 64 56 91 64 |..z%.!.....2dV.d| +peer0.org1.example.com | 00000040 a6 d6 72 5d 60 28 |..r]`(| +peer0.org1.example.com | [133b 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [133c 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [133d 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [133e 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [133f 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1340 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1341 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1342 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1343 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1344 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1345 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1346 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1347 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1348 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1349 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [134a 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [134b 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [134c 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [134d 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [134e 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [134f 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1539 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 1e a4 12 68 22 2b 31 c8 ac d7 a7 |0D. U...h"+1....| +peer1.org2.example.com | 00000010 97 06 31 ce de 51 0b 29 d7 b8 8c ca d5 81 39 2a |..1..Q.)......9*| +peer1.org2.example.com | 00000020 65 4e b9 3f 02 20 22 ec b2 bf 29 c0 ec c4 09 26 |eN.?. "...)....&| +peer1.org2.example.com | 00000030 7b 8c 21 c1 3b 0f 6b eb fe 75 a3 53 a0 c5 04 9b |{.!.;.k..u.S....| +peer1.org2.example.com | 00000040 ef d6 6c 63 b4 f9 |..lc..| +peer1.org2.example.com | [153a 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [153b 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [153c 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [153d 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [153e 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [153f 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1540 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1541 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1542 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1543 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1544 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1545 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1546 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1547 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1548 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 gate 1602702094358274400 evaluation starts +peer1.org2.example.com | [1549 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [154a 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [154b 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [154c 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 principal evaluation fails +peer1.org2.example.com | [154d 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8bd50 gate 1602702094358274400 evaluation fails +peer1.org2.example.com | [154e 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [154f 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1550 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1551 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 gate 1602702094364123800 evaluation starts +peer1.org2.example.com | [1552 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1553 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1554 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 principal matched by identity 0 +peer1.org2.example.com | [1555 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer1.org2.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer1.org2.example.com | [1556 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer1.org2.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer1.org2.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer1.org2.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer1.org2.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org2.example.com | [14f8 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f9 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14fa 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fb 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fc 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14fd 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [14fe 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [14ff 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1500 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1501 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161019 +peer0.org2.example.com | [1502 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31944C0919D6C5B7FAD638780D2550EE73931E82AFBE8936C1912BA5D5D1FB70 +peer0.org2.example.com | [1503 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1504 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1505 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1506 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1507 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1508 10-14 19:01:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:O\234\001B\r\2426\364_TZ\241hQ\227\327g\207\020\343\350)q\316nsp\235\205o" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [1509 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [150a 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [150b 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [150c 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [137f 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1380 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1381 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1382 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1383 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1384 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1385 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1386 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1388 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1389 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1387 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [138a 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [138b 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [138c 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [138d 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [138e 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [138f 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1390 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1391 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1392 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1393 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1394 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 gate 1602702090359110800 evaluation starts +peer1.org1.example.com | [1395 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1396 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1397 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 principal matched by identity 0 +peer0.org1.example.com | [1350 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1351 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1352 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1353 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1354 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1355 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1356 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1357 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1358 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161018 +peer0.org1.example.com | [1359 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 670312738DA0EC50839E84E9F9B9F50FEBE3684C5971F04D3F19A087839F6076 +peer0.org1.example.com | [135a 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [135b 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [135c 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [135d 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [135e 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [135f 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1360 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1361 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1362 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1363 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1364 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1365 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1366 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1367 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1368 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1369 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [136a 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [136b 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [136c 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [136d 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [136e 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [136f 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1370 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1371 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1372 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1373 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1374 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1375 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1557 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1558 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003daa2c0 gate 1602702094364123800 evaluation succeeds +peer1.org2.example.com | [1559 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [155a 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [155b 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [155c 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [155d 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [155e 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [155f 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1560 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer1.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer1.org2.example.com | [1561 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer1.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer1.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer1.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer1.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer1.org2.example.com | [1562 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1563 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1564 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1565 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer1.org2.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer1.org2.example.com | [1566 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer1.org2.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer1.org2.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer1.org2.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer1.org2.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer1.org2.example.com | [1567 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1568 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1569 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [156a 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [156b 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [156c 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [156d 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [156e 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [156f 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1570 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1571 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1572 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1573 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1574 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1575 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1576 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1577 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1578 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1579 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [157a 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [157b 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157c 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [157d 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [157e 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [157f 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1580 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1581 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1582 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 gate 1602702094455550800 evaluation starts +peer1.org2.example.com | [1583 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1584 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1585 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1586 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 principal evaluation fails +peer1.org2.example.com | [1587 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3350 gate 1602702094455550800 evaluation fails +peer1.org2.example.com | [1588 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1589 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [158a 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [158b 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 gate 1602702094461600900 evaluation starts +peer1.org2.example.com | [158c 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [158d 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [158e 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 principal matched by identity 0 +peer1.org2.example.com | [158f 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer1.org2.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer1.org2.example.com | [1590 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer1.org2.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer1.org2.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer1.org2.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer1.org2.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer1.org2.example.com | [1591 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1592 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc38c0 gate 1602702094461600900 evaluation succeeds +peer1.org2.example.com | [1593 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1594 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1595 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1596 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1597 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1376 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1377 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1378 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1379 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [137a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [137b 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [137c 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [137d 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [137e 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [137f 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1380 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1381 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1382 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1383 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 gate 1602702085933995000 evaluation starts +peer0.org1.example.com | [1384 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1385 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1386 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 principal matched by identity 0 +peer0.org1.example.com | [1387 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1388 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1389 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [138a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 gate 1602702085933995000 evaluation succeeds +peer0.org1.example.com | [138b 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [138c 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [138d 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [138e 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [138f 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1390 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:20.916 UTC [common.deliver] Handle -> DEBU 1978 Starting new deliver loop for 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.916 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.917 UTC [policies] Evaluate -> DEBU 197a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.917 UTC [policies] Evaluate -> DEBU 197b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:20.919 UTC [cauthdsl] func1 -> DEBU 197f 0xc00113e500 gate 1602702140919030700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1980 0xc00113e500 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1981 0xc00113e500 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1982 0xc00113e500 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:20.919 UTC [msp.identity] Verify -> DEBU 1983 Verify: digest = 00000000 0a a9 24 f6 77 f1 33 64 d1 1d 2d 62 c3 ca f0 11 |..$.w.3d..-b....| +orderer0.example.com | 00000010 1b db 8b 3c fa cb 77 3b ba 9a f9 a5 5d 96 43 b6 |...<..w;....].C.|" +orderer0.example.com | "2020-10-14 19:02:20.921 UTC [msp.identity] Verify -> DEBU 1984 Verify: sig = 00000000 30 44 02 20 48 07 9f 2f cc 21 4b 37 ab f6 c4 96 |0D. H../.!K7....| +orderer0.example.com | 00000010 e7 54 78 b2 ba e0 a2 2e a6 7c fc 38 93 33 4d 41 |.Tx......|.8.3MA| +orderer0.example.com | 00000020 f6 0f 99 13 02 20 27 9d e9 50 55 d1 42 34 bf 4d |..... '..PU.B4.M| +orderer0.example.com | 00000030 b6 61 86 17 2e 7d f6 bc 05 74 4e 15 b3 6f 31 a3 |.a...}...tN..o1.| +orderer0.example.com | 00000040 be 8d c7 9c 9e 20 |..... |" +orderer0.example.com | "2020-10-14 19:02:20.922 UTC [cauthdsl] func2 -> DEBU 1985 0xc00113e500 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:20.922 UTC [cauthdsl] func1 -> DEBU 1986 0xc00113e500 gate 1602702140919030700 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:20.922 UTC [policies] Evaluate -> DEBU 1987 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.922 UTC [policies] Evaluate -> DEBU 1988 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 1989 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:20.924 UTC [common.deliver] deliverBlocks -> DEBU 198d [channel: businesschannel] Received seekInfo (0xc00045bdc0) start: > stop: > from 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.924 UTC [fsblkstorage] Next -> DEBU 198e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:20.924 UTC [fsblkstorage] newBlockfileStream -> DEBU 198f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +orderer0.example.com | "2020-10-14 19:02:20.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1990 Remaining bytes=[81927], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:20.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1991 Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +orderer0.example.com | "2020-10-14 19:02:20.926 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1992 blockbytes [28172] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:20.926 UTC [common.deliver] deliverBlocks -> DEBU 1993 [channel: businesschannel] Delivering block [2] for (0xc00045bdc0) for 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.928 UTC [common.deliver] deliverBlocks -> DEBU 1994 [channel: businesschannel] Done delivering to 172.18.0.9:40188 for (0xc00045bdc0)" +orderer0.example.com | "2020-10-14 19:02:20.928 UTC [common.deliver] Handle -> DEBU 1995 Waiting for new SeekInfo from 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.928 UTC [common.deliver] Handle -> DEBU 1996 Attempting to read seek info message from 172.18.0.9:40188" +orderer0.example.com | "2020-10-14 19:02:20.937 UTC [grpc] infof -> DEBU 1997 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:20.938 UTC [common.deliver] Handle -> WARN 1998 Error reading from 172.18.0.9:40188: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:20.938 UTC [orderer.common.server] func1 -> DEBU 1999 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:20.938 UTC [comm.grpc.server] 1 -> INFO 199a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40188 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.465ms +orderer0.example.com | "2020-10-14 19:02:20.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 199b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:20.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199c Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +orderer0.example.com | "2020-10-14 19:02:20.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 199d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.1µs " +orderer0.example.com | "2020-10-14 19:02:21.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199e Sending msg of 28 bytes to 2 on channel businesschannel took 59.6µs" +orderer0.example.com | "2020-10-14 19:02:21.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199f Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2020-10-14 19:02:21.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 312.2µs " +orderer0.example.com | "2020-10-14 19:02:21.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.8µs " +orderer0.example.com | "2020-10-14 19:02:21.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.127 UTC [orderer.common.server] Deliver -> DEBU 19a4 Starting new Deliver handler" +peer1.org2.example.com | [1598 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1599 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [159a 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [159b 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [159c 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159d 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159e 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [15a0 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159f 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a1 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a2 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15a3 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15a4 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > alive: alive: +peer1.org2.example.com | [15a5 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a6 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15a7 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a8 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [15a9 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15aa 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ab 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ac 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ad 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ae 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15af 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [15b0 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15b1 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [15b2 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15b3 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [15b4 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [15b5 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15b6 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [15b7 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15b8 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15b9 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [15ba 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15bb 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15bc 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 gate 1602702094618458900 evaluation starts +peer1.org2.example.com | [15bd 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15be 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [15bf 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [15c0 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 principal evaluation fails +peer1.org2.example.com | [15c1 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7300 gate 1602702094618458900 evaluation fails +peer1.org2.example.com | [15c2 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15c3 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15c4 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15c5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15c6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15c7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [15c9 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [15ca 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 gate 1602702094631235700 evaluation starts +peer1.org2.example.com | [15cb 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [15cc 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [15cd 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 principal matched by identity 0 +peer1.org2.example.com | [15ce 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer1.org2.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer1.org2.example.com | [15cf 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer1.org2.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer1.org2.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer1.org2.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer1.org2.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer1.org2.example.com | [15d0 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [15d1 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de7870 gate 1602702094631235700 evaluation succeeds +peer1.org2.example.com | [15d2 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15d3 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [15d4 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [15d5 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15d6 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15d7 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [150d 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [150e 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [150f 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1510 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1511 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [1512 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1513 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [1514 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1515 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1516 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org2.example.com | [1517 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer0.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer0.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer0.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org2.example.com | [1518 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1519 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 55 7e fe 38 02 8e 5b e4 e0 bd 8a 04 |0C. U~.8..[.....| +peer0.org2.example.com | 00000010 2c 89 d8 63 d6 26 77 86 db 3c 7d d4 7f 97 db 1d |,..c.&w..<}.....| +peer0.org2.example.com | 00000020 95 ee 40 4e 02 1f 3e 4f 9c 01 42 0d a2 36 f4 5f |..@N..>O..B..6._| +peer0.org2.example.com | 00000030 54 5a a1 68 51 97 d7 67 87 10 e3 e8 29 71 ce 6e |TZ.hQ..g....)q.n| +peer0.org2.example.com | 00000040 73 70 9d 85 6f |sp..o| +peer0.org2.example.com | [151a 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes +peer0.org2.example.com | [151b 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes +peer0.org2.example.com | [151c 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [151d 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [151e 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [151f 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1520 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1521 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1522 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1391 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1392 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1393 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1394 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1395 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1396 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1397 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 gate 1602702085938375900 evaluation starts +peer0.org1.example.com | [1398 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [139a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [139b 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1399 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [139c 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [139e 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [139f 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13a0 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [139d 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 principal matched by identity 0 +peer0.org1.example.com | [13a2 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [13a1 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [13a3 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13a4 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [13a5 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13a6 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 gate 1602702085938375900 evaluation succeeds +peer0.org1.example.com | [13a7 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a8 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a9 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13aa 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13ab 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13ac 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [13ad 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ae 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [13af 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [13b0 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b1 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b2 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13b3 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13b4 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13b5 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13b6 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13b7 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [15d8 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [15d9 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [15da 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [15db 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15dc 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15dd 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15de 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [15df 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e0 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e1 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15e2 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15e3 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > alive: +peer1.org2.example.com | [15e4 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e5 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15e6 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e7 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e8 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [15e9 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [15ea 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15eb 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ec 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ed 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [15ee 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15ef 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f0 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f1 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f2 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f3 10-14 19:01:34.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f4 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f5 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f6 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15f7 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f8 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15f9 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15fa 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [15fb 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15fc 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [15fd 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [15fe 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [15ff 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1600 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 gate 1602702094957288300 evaluation starts +peer1.org2.example.com | [1601 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1602 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1603 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1604 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 principal evaluation fails +peer1.org2.example.com | [1605 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003deffe0 gate 1602702094957288300 evaluation fails +peer1.org2.example.com | [1606 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1607 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1608 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1609 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 gate 1602702094958698700 evaluation starts +peer1.org2.example.com | [160a 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [160b 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [160c 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 principal matched by identity 0 +peer1.org2.example.com | [160d 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [160e 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1398 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1399 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [139a 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [139b 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040c5830 gate 1602702090359110800 evaluation succeeds +peer1.org1.example.com | [139c 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [139d 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [139e 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [139f 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13a0 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13a1 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13a2 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13a3 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13a4 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13a5 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13a6 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13a7 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13a8 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13a9 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13aa 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 gate 1602702090369209400 evaluation starts +peer1.org1.example.com | [13ab 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13ac 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [13ad 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 principal matched by identity 0 +peer1.org1.example.com | [13ae 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [13af 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [13b0 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13b1 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004043b70 gate 1602702090369209400 evaluation succeeds +peer1.org1.example.com | [13b2 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13b3 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13b4 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13b5 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13b6 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13b7 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [13b8 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | [1524 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1523 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1525 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1526 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1527 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1528 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1529 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 gate 1602702094193472500 evaluation starts +peer0.org2.example.com | [152a 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [152b 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [152c 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 principal matched by identity 0 +peer0.org2.example.com | [152d 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer0.org2.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer0.org2.example.com | [152e 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer0.org2.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer0.org2.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer0.org2.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer0.org2.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer0.org2.example.com | [152f 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1530 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff2880 gate 1602702094193472500 evaluation succeeds +peer0.org2.example.com | [1531 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1532 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1533 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1534 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1535 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1536 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1537 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1538 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org2.example.com | [1539 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer0.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer0.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer0.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org2.example.com | [153a 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [153b 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [153c 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [153d 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [153e 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer0.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer0.org2.example.com | [153f 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer0.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer0.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer0.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer0.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer0.org2.example.com | [1540 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1541 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1542 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1543 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1544 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1545 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1546 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:21.127 UTC [common.deliver] Handle -> DEBU 19a5 Starting new deliver loop for 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.127 UTC [common.deliver] Handle -> DEBU 19a6 Attempting to read seek info message from 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000c8aa40 gate 1602702141130732500 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:21.130 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000c8aa40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000c8aa40 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19af 0xc000c8aa40 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:21.131 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 44 53 14 62 f8 4f 94 67 01 88 6d c4 bf ce 0a 71 |DS.b.O.g..m....q| +orderer0.example.com | 00000010 0c 79 7c 2a 2c 71 70 e8 07 04 ef ac 2a 24 5f cc |.y|*,qp.....*$_.|" +orderer0.example.com | "2020-10-14 19:02:21.131 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 b1 fe ea 8c 4d 2f d2 bb 0b 94 d0 |0E.!.....M/.....| +orderer0.example.com | 00000010 93 07 2d 39 68 51 22 86 35 aa 56 ce 30 b6 17 d5 |..-9hQ".5.V.0...| +orderer0.example.com | 00000020 76 55 21 99 f2 02 20 56 fb ab ed dd 10 4e 06 c0 |vU!... V.....N..| +orderer0.example.com | 00000030 29 f7 5f 2a 18 1c df d6 24 36 19 0d b4 db a4 08 |)._*....$6......| +orderer0.example.com | 00000040 70 5e b6 39 ce 32 32 |p^.9.22|" +orderer0.example.com | "2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000c8aa40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000c8aa40 gate 1602702141130732500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc00045a0c0) start: > stop: > from 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84816]" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[53752], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84816], bytesOffset=[84818]}" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [4550] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:21.133 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block [3] for (0xc00045a0c0) for 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.134 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:40190 for (0xc00045a0c0)" +orderer0.example.com | "2020-10-14 19:02:21.134 UTC [common.deliver] Handle -> DEBU 19c2 Waiting for new SeekInfo from 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.134 UTC [common.deliver] Handle -> DEBU 19c3 Attempting to read seek info message from 172.18.0.9:40190" +orderer0.example.com | "2020-10-14 19:02:21.145 UTC [common.deliver] Handle -> WARN 19c4 Error reading from 172.18.0.9:40190: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:21.145 UTC [orderer.common.server] func1 -> DEBU 19c6 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:21.145 UTC [grpc] infof -> DEBU 19c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:21.146 UTC [comm.grpc.server] 1 -> INFO 19c7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40190 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1361ms +orderer0.example.com | "2020-10-14 19:02:21.337 UTC [orderer.common.server] Deliver -> DEBU 19c8 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:21.338 UTC [common.deliver] Handle -> DEBU 19c9 Starting new deliver loop for 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.338 UTC [common.deliver] Handle -> DEBU 19ca Attempting to read seek info message from 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.340 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.340 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.340 UTC [cauthdsl] func1 -> DEBU 19d0 0xc0009c94d0 gate 1602702141340784700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d1 0xc0009c94d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d2 0xc0009c94d0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d3 0xc0009c94d0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:21.341 UTC [msp.identity] Verify -> DEBU 19d4 Verify: digest = 00000000 03 db 91 9e 03 dd d7 d2 32 1c 31 78 41 25 29 5f |........2.1xA%)_| +orderer0.example.com | 00000010 51 65 2a 20 ee db 8e 5e 24 dc af f6 f5 e9 30 78 |Qe* ...^$.....0x|" +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [13b9 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [13ba 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [13bb 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [13bc 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13bd 10-14 19:01:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13be 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13bf 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13c0 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13c1 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13c2 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13c3 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13c4 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 gate 1602702090382090500 evaluation starts +peer1.org1.example.com | [13c5 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13c6 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [13c7 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 principal matched by identity 0 +peer1.org1.example.com | [13c8 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [13c9 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [13ca 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13cb 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040edcf0 gate 1602702090382090500 evaluation succeeds +peer1.org1.example.com | [13cc 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13cd 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13ce 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13cf 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13d0 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d1 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b8 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 gate 1602702085949070300 evaluation starts +peer0.org1.example.com | [13b9 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13ba 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [13bb 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 principal matched by identity 0 +peer0.org1.example.com | [13bc 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [13bd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [13be 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13bf 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 gate 1602702085949070300 evaluation succeeds +peer0.org1.example.com | [13c0 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13c1 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13c2 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13c3 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13c4 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c5 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13c6 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13c7 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13c8 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13c9 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13ca 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13cb 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13cc 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 gate 1602702085955234100 evaluation starts +peer0.org1.example.com | [13cd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13ce 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [13cf 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 principal matched by identity 0 +peer0.org1.example.com | [13d0 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [13d1 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [13d2 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13d3 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 gate 1602702085955234100 evaluation succeeds +peer0.org1.example.com | [13d4 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13d5 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13d6 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13d7 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13d8 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [13d9 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [13da 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13db 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [13dc 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13dd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [13de 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [13df 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [13e0 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [13e1 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e2 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e3 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13e4 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13e5 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13e6 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13e7 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13e8 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13e9 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 gate 1602702085962695200 evaluation starts +peer0.org1.example.com | [13ea 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13eb 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [13ec 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 principal matched by identity 0 +peer0.org1.example.com | [13ed 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [160f 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1610 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e44550 gate 1602702094958698700 evaluation succeeds +peer1.org2.example.com | [1611 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1612 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1613 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1614 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1615 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1616 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:21.341 UTC [msp.identity] Verify -> DEBU 19d5 Verify: sig = 00000000 30 44 02 20 14 f4 c5 ca 44 d7 0d d1 8b 68 f0 2d |0D. ....D....h.-| +orderer0.example.com | 00000010 95 33 39 46 2c 5b 66 6d 8f 7d a7 01 43 1a bb 79 |.39F,[fm.}..C..y| +orderer0.example.com | 00000020 a9 e2 fa a6 02 20 6b ed 32 2e 99 70 0d 45 ec ec |..... k.2..p.E..| +orderer0.example.com | 00000030 4f 0d 9e d3 46 60 52 7b cd ce b8 7f 3b 8d df fa |O...F`R{....;...| +orderer0.example.com | 00000040 03 cd 86 2b a4 58 |...+.X|" +orderer0.example.com | "2020-10-14 19:02:21.342 UTC [cauthdsl] func2 -> DEBU 19d6 0xc0009c94d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:21.343 UTC [cauthdsl] func1 -> DEBU 19d7 0xc0009c94d0 gate 1602702141340784700 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19d8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19da Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.344 UTC [policies] Evaluate -> DEBU 19dc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.344 UTC [policies] Evaluate -> DEBU 19dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.344 UTC [common.deliver] deliverBlocks -> DEBU 19de [channel: businesschannel] Received seekInfo (0xc00045a840) start: > stop: > from 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.344 UTC [fsblkstorage] Next -> DEBU 19df Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:21.345 UTC [fsblkstorage] newBlockfileStream -> DEBU 19e0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89368]" +orderer0.example.com | "2020-10-14 19:02:21.345 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e1 Remaining bytes=[49200], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:21.345 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e2 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89368], bytesOffset=[89370]}" +orderer0.example.com | "2020-10-14 19:02:21.346 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e3 blockbytes [4010] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:21.346 UTC [common.deliver] deliverBlocks -> DEBU 19e4 [channel: businesschannel] Delivering block [4] for (0xc00045a840) for 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.346 UTC [common.deliver] deliverBlocks -> DEBU 19e5 [channel: businesschannel] Done delivering to 172.18.0.9:40192 for (0xc00045a840)" +orderer0.example.com | "2020-10-14 19:02:21.347 UTC [common.deliver] Handle -> DEBU 19e6 Waiting for new SeekInfo from 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.347 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 172.18.0.9:40192" +orderer0.example.com | "2020-10-14 19:02:21.353 UTC [grpc] infof -> DEBU 19e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:21.353 UTC [common.deliver] Handle -> WARN 19e9 Error reading from 172.18.0.9:40192: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:21.353 UTC [orderer.common.server] func1 -> DEBU 19ea Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:21.353 UTC [comm.grpc.server] 1 -> INFO 19eb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40192 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.282ms +orderer0.example.com | "2020-10-14 19:02:21.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ec Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ed Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2020-10-14 19:02:21.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 386.2µs " +orderer0.example.com | "2020-10-14 19:02:21.541 UTC [orderer.common.server] Deliver -> DEBU 19ef Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:21.541 UTC [common.deliver] Handle -> DEBU 19f0 Starting new deliver loop for 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.541 UTC [common.deliver] Handle -> DEBU 19f1 Attempting to read seek info message from 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [cauthdsl] func1 -> DEBU 19f7 0xc000d0c0a0 gate 1602702141543775600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000d0c0a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000d0c0a0 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19fa 0xc000d0c0a0 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [msp.identity] Verify -> DEBU 19fb Verify: digest = 00000000 f3 46 f9 26 44 1d 7a a1 fe 0d 9c d7 be 5d 52 d1 |.F.&D.z......]R.| +orderer0.example.com | 00000010 d0 2f b1 ea 0c a4 c6 85 d9 bd 3a 00 42 3f 0e 06 |./........:.B?..|" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [msp.identity] Verify -> DEBU 19fc Verify: sig = 00000000 30 45 02 21 00 85 19 d3 b2 04 2c bd b6 6d 58 27 |0E.!......,..mX'| +orderer0.example.com | 00000010 f6 ef d1 49 2b 5e 59 43 10 7b c6 68 b8 bd 91 0e |...I+^YC.{.h....| +orderer0.example.com | 00000020 ca 18 f1 29 fa 02 20 11 68 79 57 d9 26 8e 47 a4 |...).. .hyW.&.G.| +orderer0.example.com | 00000030 13 e9 0c b0 5c b5 e5 e8 43 8f 31 c7 3e 3f 6b fa |....\...C.1.>?k.| +orderer0.example.com | 00000040 4d fa 78 5d 6f cc 02 |M.x]o..|" +orderer0.example.com | "2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19fd 0xc000d0c0a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [cauthdsl] func1 -> DEBU 19fe 0xc000d0c0a0 gate 1602702141543775600 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 19ff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a01 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a03 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [13ee 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [13ef 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13f0 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 gate 1602702085962695200 evaluation succeeds +peer0.org1.example.com | [13f1 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13f2 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13f3 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13f4 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13f5 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13f6 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13f7 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [13f8 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13f9 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13fa 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13fb 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13fc 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13fd 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 gate 1602702085968519000 evaluation starts +peer0.org1.example.com | [13fe 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13ff 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1400 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 principal matched by identity 0 +peer0.org1.example.com | [1401 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1402 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1403 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1404 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 gate 1602702085968519000 evaluation succeeds +peer0.org1.example.com | [1405 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1406 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1407 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1408 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1409 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [140a 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [140b 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [140c 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [140d 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [140e 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [140f 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1410 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1411 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1412 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1413 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1414 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1415 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1416 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1417 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1418 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1419 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [141a 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [141b 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [141c 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [141d 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [141e 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [141f 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1420 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1421 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1422 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1423 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1424 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 gate 1602702086140391200 evaluation starts +peer0.org1.example.com | [1425 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1426 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1427 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 principal matched by identity 0 +peer0.org1.example.com | [1428 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer0.org1.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer0.org1.example.com | [1429 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer0.org1.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer0.org1.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer0.org1.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer0.org1.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer0.org1.example.com | [142a 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [142b 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 gate 1602702086140391200 evaluation succeeds +peer0.org1.example.com | [142c 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [142d 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [142e 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [142f 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1430 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1431 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1432 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1433 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1434 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1435 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1436 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1437 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1438 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1439 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [143a 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [143b 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [143c 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.545 UTC [common.deliver] deliverBlocks -> DEBU 1a05 [channel: businesschannel] Received seekInfo (0xc00045b380) start: > stop: > from 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [fsblkstorage] Next -> DEBU 1a06 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a08 Remaining bytes=[45188], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a09 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a0a blockbytes [4007] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:21.546 UTC [common.deliver] deliverBlocks -> DEBU 1a0b [channel: businesschannel] Delivering block [5] for (0xc00045b380) for 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.547 UTC [common.deliver] deliverBlocks -> DEBU 1a0c [channel: businesschannel] Done delivering to 172.18.0.9:40194 for (0xc00045b380)" +orderer0.example.com | "2020-10-14 19:02:21.547 UTC [common.deliver] Handle -> DEBU 1a0d Waiting for new SeekInfo from 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.547 UTC [common.deliver] Handle -> DEBU 1a0e Attempting to read seek info message from 172.18.0.9:40194" +orderer0.example.com | "2020-10-14 19:02:21.555 UTC [grpc] infof -> DEBU 1a0f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:21.555 UTC [common.deliver] Handle -> WARN 1a10 Error reading from 172.18.0.9:40194: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:21.556 UTC [orderer.common.server] func1 -> DEBU 1a11 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:21.556 UTC [comm.grpc.server] 1 -> INFO 1a12 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40194 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.7933ms +orderer0.example.com | "2020-10-14 19:02:21.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a13 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2020-10-14 19:02:21.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a14 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +orderer0.example.com | "2020-10-14 19:02:21.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 460.2µs " +orderer0.example.com | "2020-10-14 19:02:21.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 354.6µs " +orderer0.example.com | "2020-10-14 19:02:21.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a18 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.749 UTC [orderer.common.server] Deliver -> DEBU 1a19 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:21.750 UTC [common.deliver] Handle -> DEBU 1a1a Starting new deliver loop for 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.750 UTC [common.deliver] Handle -> DEBU 1a1b Attempting to read seek info message from 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.750 UTC [policies] Evaluate -> DEBU 1a1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a20 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.752 UTC [cauthdsl] func1 -> DEBU 1a21 0xc000cccc80 gate 1602702141752019500 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a22 0xc000cccc80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a23 0xc000cccc80 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a24 0xc000cccc80 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:21.753 UTC [msp.identity] Verify -> DEBU 1a25 Verify: digest = 00000000 be af 21 60 67 e4 f7 30 8d 26 c9 18 eb ad 09 62 |..!`g..0.&.....b| +orderer0.example.com | 00000010 ed 49 71 9a 85 7f eb af 80 3f 2a 45 bd ef 7b 67 |.Iq......?*E..{g|" +orderer0.example.com | "2020-10-14 19:02:21.753 UTC [msp.identity] Verify -> DEBU 1a26 Verify: sig = 00000000 30 45 02 21 00 ca 6c c7 4f fc 4b c4 a7 e5 3c 3a |0E.!..l.O.K...<:| +orderer0.example.com | 00000010 34 6f b3 94 44 cd df 28 09 d3 1f a9 1d 04 3d 0b |4o..D..(......=.| +orderer0.example.com | 00000020 03 51 a1 b1 16 02 20 64 de b1 27 37 c2 ba e3 b1 |.Q.... d..'7....| +orderer0.example.com | 00000030 bf 79 0e 1d a1 46 90 71 39 44 4c fc 31 12 9a 21 |.y...F.q9DL.1..!| +orderer0.example.com | 00000040 f0 57 37 a5 df 00 4e |.W7...N|" +orderer0.example.com | "2020-10-14 19:02:21.753 UTC [cauthdsl] func2 -> DEBU 1a27 0xc000cccc80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:21.754 UTC [cauthdsl] func1 -> DEBU 1a28 0xc000cccc80 gate 1602702141752019500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a29 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.755 UTC [policies] Evaluate -> DEBU 1a2d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.755 UTC [policies] Evaluate -> DEBU 1a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.755 UTC [common.deliver] deliverBlocks -> DEBU 1a2f [channel: businesschannel] Received seekInfo (0xc00045bc40) start: > stop: > from 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.756 UTC [fsblkstorage] Next -> DEBU 1a30 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-10-14 19:02:21.756 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a31 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +orderer0.example.com | "2020-10-14 19:02:21.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a32 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:21.757 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a33 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +orderer0.example.com | "2020-10-14 19:02:21.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a34 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:21.758 UTC [common.deliver] deliverBlocks -> DEBU 1a35 [channel: businesschannel] Delivering block [6] for (0xc00045bc40) for 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.759 UTC [common.deliver] deliverBlocks -> DEBU 1a36 [channel: businesschannel] Done delivering to 172.18.0.9:40196 for (0xc00045bc40)" +orderer0.example.com | "2020-10-14 19:02:21.759 UTC [common.deliver] Handle -> DEBU 1a37 Waiting for new SeekInfo from 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.759 UTC [common.deliver] Handle -> DEBU 1a38 Attempting to read seek info message from 172.18.0.9:40196" +orderer0.example.com | "2020-10-14 19:02:21.766 UTC [grpc] infof -> DEBU 1a39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:21.766 UTC [common.deliver] Handle -> WARN 1a3a Error reading from 172.18.0.9:40196: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:21.767 UTC [orderer.common.server] func1 -> DEBU 1a3b Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:21.767 UTC [comm.grpc.server] 1 -> INFO 1a3c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40196 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.66ms +orderer0.example.com | "2020-10-14 19:02:21.968 UTC [orderer.common.server] Deliver -> DEBU 1a3d Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:21.968 UTC [common.deliver] Handle -> DEBU 1a3e Starting new deliver loop for 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.968 UTC [common.deliver] Handle -> DEBU 1a3f Attempting to read seek info message from 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a43 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a44 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [cauthdsl] func1 -> DEBU 1a45 0xc0003da760 gate 1602702141970251400 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [cauthdsl] func2 -> DEBU 1a46 0xc0003da760 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:21.970 UTC [cauthdsl] func2 -> DEBU 1a47 0xc0003da760 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:21.971 UTC [cauthdsl] func2 -> DEBU 1a48 0xc0003da760 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:21.971 UTC [msp.identity] Verify -> DEBU 1a49 Verify: digest = 00000000 22 14 59 6a 93 5f e8 34 1a c2 f7 16 ee 88 f5 18 |".Yj._.4........| +orderer0.example.com | 00000010 22 f2 16 40 77 bb ee 0b f9 da 92 d7 5d 1c 32 56 |"..@w.......].2V|" +orderer0.example.com | "2020-10-14 19:02:21.971 UTC [msp.identity] Verify -> DEBU 1a4a Verify: sig = 00000000 30 45 02 21 00 be 69 95 ca 6c ff 0b 9f c6 8a ae |0E.!..i..l......| +orderer0.example.com | 00000010 c5 f9 76 bb 29 13 f1 89 63 a4 84 2a 37 37 c3 6b |..v.)...c..*77.k| +orderer0.example.com | 00000020 a1 01 ce f9 c4 02 20 5b f3 80 49 19 33 0b 81 d4 |...... [..I.3...| +orderer0.example.com | 00000030 1e 52 05 99 38 08 6b ae c0 22 96 b2 26 d9 a9 32 |.R..8.k.."..&..2| +orderer0.example.com | 00000040 59 81 08 06 87 af f8 |Y......|" +orderer0.example.com | "2020-10-14 19:02:21.971 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc0003da760 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [cauthdsl] func1 -> DEBU 1a4c 0xc0003da760 gate 1602702141970251400 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a51 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.973 UTC [policies] Evaluate -> DEBU 1a52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:21.973 UTC [common.deliver] deliverBlocks -> DEBU 1a53 [channel: testchainid] Received seekInfo (0xc000d1a5c0) start: > stop: > from 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.973 UTC [fsblkstorage] Next -> DEBU 1a54 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | [1617 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1618 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1619 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [161a 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [161b 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [161c 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [161d 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 gate 1602702094966749400 evaluation starts +peer1.org2.example.com | [161e 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [161f 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1620 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1621 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 principal evaluation fails +peer1.org2.example.com | [1622 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45750 gate 1602702094966749400 evaluation fails +peer1.org2.example.com | [1623 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1624 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1625 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1626 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 gate 1602702094968476400 evaluation starts +peer1.org2.example.com | [1627 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1628 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1629 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 principal matched by identity 0 +peer1.org2.example.com | [162a 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [162b 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [162c 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [162d 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45cc0 gate 1602702094968476400 evaluation succeeds +peer1.org2.example.com | [162e 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [162f 10-14 19:01:34.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1630 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1631 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1632 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1633 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1634 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1635 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1636 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1637 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1638 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1639 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163a 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163b 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [163c 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [163d 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [163e 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [163f 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1640 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1641 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 gate 1602702094975012900 evaluation starts +peer1.org2.example.com | [1642 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1643 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1644 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1645 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 principal evaluation fails +peer1.org2.example.com | [1646 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e69ef0 gate 1602702094975012900 evaluation fails +peer1.org2.example.com | [1647 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1648 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1649 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [164a 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 gate 1602702094976790500 evaluation starts +peer1.org2.example.com | [164b 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [164c 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [164d 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 principal matched by identity 0 +peer1.org2.example.com | [164e 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [164f 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1650 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1651 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82460 gate 1602702094976790500 evaluation succeeds +peer1.org2.example.com | [1652 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1653 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1654 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1655 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1656 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1657 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [143d 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [143e 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [143f 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1440 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1441 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1442 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1443 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1444 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1445 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1446 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1447 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1448 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1449 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [144a 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144b 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [144c 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [144d 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144e 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [144f 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1450 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1451 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1452 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1453 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1454 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1455 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1456 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1457 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 gate 1602702086279160500 evaluation starts +peer0.org1.example.com | [1458 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1459 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [145a 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 principal matched by identity 0 +peer0.org1.example.com | [145b 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer0.org1.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer0.org1.example.com | [145c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer0.org1.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer0.org1.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer0.org1.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer0.org1.example.com | 00000040 85 3c 63 67 76 9c |. DEBU 0xc003691a70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [145e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 gate 1602702086279160500 evaluation succeeds +peer0.org1.example.com | [145f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1460 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1461 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1462 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1463 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1464 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1465 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1466 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1467 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1468 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1469 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [146a 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [146b 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [146c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146d 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [146f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1658 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1659 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [165a 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [165b 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [165c 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [165d 10-14 19:01:34.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [165e 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 gate 1602702094980136200 evaluation starts +peer1.org2.example.com | [165f 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1660 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1661 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1662 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 principal evaluation fails +peer1.org2.example.com | [1663 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83660 gate 1602702094980136200 evaluation fails +peer1.org2.example.com | [1664 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1665 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1666 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1667 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 gate 1602702094983008700 evaluation starts +peer1.org2.example.com | [1668 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1669 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [166a 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 principal matched by identity 0 +peer1.org2.example.com | [166b 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [166c 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [166d 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [166e 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83bd0 gate 1602702094983008700 evaluation succeeds +peer1.org2.example.com | [166f 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1670 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1671 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1672 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1673 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1675 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1674 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1676 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1677 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1678 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1679 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [167a 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [167b 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [167c 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [167d 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [167e 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [167f 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1680 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1681 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1682 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1683 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1684 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1685 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1686 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1687 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1688 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1689 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [168a 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 gate 1602702094991327500 evaluation starts +peer1.org2.example.com | [168b 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [168c 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [168d 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [168e 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 principal evaluation fails +peer1.org2.example.com | [168f 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e9bd50 gate 1602702094991327500 evaluation fails +peer1.org2.example.com | [1690 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1691 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1692 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1693 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 gate 1602702094995727700 evaluation starts +peer1.org2.example.com | [1694 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1695 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1696 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 principal matched by identity 0 +peer1.org2.example.com | [1697 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1698 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | [13d2 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13d3 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13d4 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13d5 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13d6 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13d7 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13d8 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 gate 1602702090385614700 evaluation starts +peer1.org1.example.com | [13d9 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [13da 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [13db 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 principal matched by identity 0 +peer1.org1.example.com | [13dc 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [13dd 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [13de 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13df 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410eef0 gate 1602702090385614700 evaluation succeeds +peer1.org1.example.com | [13e0 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13e1 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [13e2 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13e3 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13e4 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e5 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e6 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [13e7 10-14 19:01:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e8 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [13e9 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13ea 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [13eb 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13ec 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [13ed 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13ee 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ef 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f0 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f2 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f1 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f4 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:21.973 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a55 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a56 Remaining bytes=[30408], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a57 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a58 blockbytes [30405] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:21.974 UTC [common.deliver] deliverBlocks -> DEBU 1a59 [channel: testchainid] Delivering block [1] for (0xc000d1a5c0) for 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.975 UTC [common.deliver] deliverBlocks -> DEBU 1a5a [channel: testchainid] Done delivering to 172.18.0.9:40198 for (0xc000d1a5c0)" +orderer0.example.com | "2020-10-14 19:02:21.976 UTC [common.deliver] Handle -> DEBU 1a5b Waiting for new SeekInfo from 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.976 UTC [common.deliver] Handle -> DEBU 1a5c Attempting to read seek info message from 172.18.0.9:40198" +orderer0.example.com | "2020-10-14 19:02:21.981 UTC [grpc] infof -> DEBU 1a5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:21.981 UTC [common.deliver] Handle -> WARN 1a5e Error reading from 172.18.0.9:40198: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:21.981 UTC [orderer.common.server] func1 -> DEBU 1a5f Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:21.982 UTC [comm.grpc.server] 1 -> INFO 1a60 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40198 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3632ms +orderer0.example.com | "2020-10-14 19:02:21.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a61 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:21.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a62 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-10-14 19:02:21.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 554.7µs " +orderer0.example.com | "2020-10-14 19:02:22.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a64 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2020-10-14 19:02:22.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.2µs " +orderer0.example.com | "2020-10-14 19:02:22.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +orderer0.example.com | "2020-10-14 19:02:22.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a67 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:22.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +orderer0.example.com | "2020-10-14 19:02:22.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a69 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:22.337 UTC [orderer.common.server] Deliver -> DEBU 1a6a Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:22.337 UTC [common.deliver] Handle -> DEBU 1a6b Starting new deliver loop for 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.337 UTC [common.deliver] Handle -> DEBU 1a6c Attempting to read seek info message from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a71 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.339 UTC [cauthdsl] func1 -> DEBU 1a72 0xc0001b4600 gate 1602702142339110500 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:22.339 UTC [cauthdsl] func2 -> DEBU 1a73 0xc0001b4600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:22.339 UTC [cauthdsl] func2 -> DEBU 1a74 0xc0001b4600 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:22.340 UTC [cauthdsl] func2 -> DEBU 1a75 0xc0001b4600 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:22.341 UTC [msp.identity] Verify -> DEBU 1a76 Verify: digest = 00000000 aa a3 e9 64 85 f8 49 d6 a1 d0 3f ff 6d 26 f5 c3 |...d..I...?.m&..| +orderer0.example.com | 00000010 dc d1 52 cc 24 00 e1 b1 c7 c6 00 42 4d 61 cd 6f |..R.$......BMa.o|" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [msp.identity] Verify -> DEBU 1a77 Verify: sig = 00000000 30 44 02 20 08 ef ce 46 d8 55 23 ee fa f8 7e be |0D. ...F.U#...~.| +orderer0.example.com | 00000010 73 e0 dd 69 50 17 bb 36 4f dd 42 aa 51 3a 1a 28 |s..iP..6O.B.Q:.(| +orderer0.example.com | 00000020 17 ae 0f d8 02 20 59 a9 d9 5e bf 99 7a 21 fe cc |..... Y..^..z!..| +orderer0.example.com | 00000030 e0 ee 9b ef 15 24 74 97 dd 9b 30 04 8b d9 11 7e |.....$t...0....~| +orderer0.example.com | 00000040 7a 8b 08 dc eb cd |z.....|" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [cauthdsl] func2 -> DEBU 1a78 0xc0001b4600 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [cauthdsl] func1 -> DEBU 1a79 0xc0001b4600 gate 1602702142339110500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.343 UTC [policies] Evaluate -> DEBU 1a7e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.343 UTC [policies] Evaluate -> DEBU 1a7f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.347 UTC [common.deliver] deliverBlocks -> DEBU 1a80 [channel: testchainid] Received seekInfo (0xc000cb0ec0) start: > stop: > from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.348 UTC [fsblkstorage] Next -> DEBU 1a81 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:22.349 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a82 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +orderer0.example.com | "2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a83 Remaining bytes=[30408], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a84 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +orderer0.example.com | "2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a85 blockbytes [30405] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:22.351 UTC [common.deliver] deliverBlocks -> DEBU 1a86 [channel: testchainid] Delivering block [1] for (0xc000cb0ec0) for 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.351 UTC [common.deliver] deliverBlocks -> DEBU 1a87 [channel: testchainid] Done delivering to 172.18.0.9:40200 for (0xc000cb0ec0)" +orderer0.example.com | "2020-10-14 19:02:22.352 UTC [common.deliver] Handle -> DEBU 1a88 Waiting for new SeekInfo from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.352 UTC [common.deliver] Handle -> DEBU 1a89 Attempting to read seek info message from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [cauthdsl] func1 -> DEBU 1a8f 0xc0002ac130 gate 1602702142360631700 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a90 0xc0002ac130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a91 0xc0002ac130 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a92 0xc0002ac130 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [msp.identity] Verify -> DEBU 1a93 Verify: digest = 00000000 81 9d d2 42 d6 ea f8 c1 59 11 f8 e4 5e 96 9f 0f |...B....Y...^...| +orderer0.example.com | 00000010 78 0b 4d cc 3c 1d e9 2b 06 33 cc da 77 cc 6f 01 |x.M.<..+.3..w.o.|" +orderer0.example.com | "2020-10-14 19:02:22.360 UTC [msp.identity] Verify -> DEBU 1a94 Verify: sig = 00000000 30 45 02 21 00 c7 bb be 33 3c 7d 01 b7 2e 5c e6 |0E.!....3<}...\.| +orderer0.example.com | 00000010 ca 05 0a 23 eb ee 79 72 ee b3 7d 3c f7 7e e2 7e |...#..yr..}<.~.~| +orderer0.example.com | 00000020 fc e5 fe 21 65 02 20 40 bb d4 86 c1 16 9d b4 9d |...!e. @........| +orderer0.example.com | 00000030 2c 98 65 ee fe 9d a0 18 e6 54 88 07 8d aa 5a ed |,.e......T....Z.| +orderer0.example.com | 00000040 e2 32 7f 24 9e 07 56 |.2.$..V|" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [cauthdsl] func2 -> DEBU 1a95 0xc0002ac130 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [cauthdsl] func1 -> DEBU 1a96 0xc0002ac130 gate 1602702142360631700 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a97 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a99 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1a9d [channel: testchainid] Received seekInfo (0xc000cb1380) start: > stop: > from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [fsblkstorage] Next -> DEBU 1a9e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a9f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa0 Remaining bytes=[53338], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa1 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa2 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1aa3 [channel: testchainid] Delivering block [0] for (0xc000cb1380) for 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1aa4 [channel: testchainid] Done delivering to 172.18.0.9:40200 for (0xc000cb1380)" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [common.deliver] Handle -> DEBU 1aa5 Waiting for new SeekInfo from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.361 UTC [common.deliver] Handle -> DEBU 1aa6 Attempting to read seek info message from 172.18.0.9:40200" +orderer0.example.com | "2020-10-14 19:02:22.368 UTC [common.deliver] Handle -> WARN 1aa7 Error reading from 172.18.0.9:40200: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:22.370 UTC [orderer.common.server] func1 -> DEBU 1aa8 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:22.370 UTC [comm.grpc.server] 1 -> INFO 1aa9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40200 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.1342ms +orderer0.example.com | "2020-10-14 19:02:22.371 UTC [grpc] infof -> DEBU 1aaa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:22.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:22.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aac Sending msg of 28 bytes to 3 on channel testchainid took 525.3µs" +orderer0.example.com | "2020-10-14 19:02:22.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1873ms " +orderer0.example.com | "2020-10-14 19:02:22.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aae Sending msg of 28 bytes to 2 on channel businesschannel took 81.8µs" +orderer0.example.com | "2020-10-14 19:02:22.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aaf Sending msg of 28 bytes to 3 on channel businesschannel took 52.4µs" +orderer0.example.com | "2020-10-14 19:02:22.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.8µs " +orderer0.example.com | "2020-10-14 19:02:22.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 289.4µs " +orderer0.example.com | "2020-10-14 19:02:22.594 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:22.594 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1699 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [169a 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec22c0 gate 1602702094995727700 evaluation succeeds +peer1.org2.example.com | [169b 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [169c 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [169d 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1470 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1471 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1472 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1473 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1474 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1475 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1476 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1477 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1478 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1479 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [147a 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [147b 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [147c 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [147d 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [147e 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [147f 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1480 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1481 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1482 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1483 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer0.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer0.org1.example.com | [1484 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer0.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer0.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer0.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer0.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org1.example.com | [1485 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1486 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 07 a2 17 c8 fc 95 ba 0a 05 8b |0E.!............| +peer0.org1.example.com | 00000010 8d 7c 70 c7 50 52 b8 36 42 45 33 0c 0c c4 e2 aa |.|p.PR.6BE3.....| +peer0.org1.example.com | 00000020 fe 3a 0c f0 2c 02 20 09 67 51 d3 dd 24 6c bb c2 |.:..,. .gQ..$l..| +peer0.org1.example.com | 00000030 12 fb 00 b4 06 cc 9f 12 a9 ec 89 e0 69 07 b7 52 |............i..R| +peer0.org1.example.com | 00000040 e2 62 ea 11 8e 79 ab |.b...y.| +peer0.org1.example.com | [1487 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [13f3 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f5 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f6 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f7 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13f8 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f9 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [13fa 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13fb 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13fc 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13fd 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [13fe 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13ff 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1400 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101E +peer1.org1.example.com | [1401 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B6EF8B78104B6B46C80B7E246BC4924FCE4F943DC13CF897D5F7A2D7CFF226DC +peer1.org1.example.com | [1402 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1403 10-14 19:01:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1404 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1405 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1406 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1407 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1408 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1409 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [140a 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [140b 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [140c 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [140d 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [140e 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1488 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1489 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [148a 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [148b 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [148c 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148d 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148e 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148f 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1490 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1491 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1492 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1493 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1494 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1495 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1496 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1497 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1498 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1499 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [149a 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [149b 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [149c 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [149e 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [149d 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [149f 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a0 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a1 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a2 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a3 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a4 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a5 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1547 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1548 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1549 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [154a 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [154b 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [154c 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [154d 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 gate 1602702094209166100 evaluation starts +peer0.org2.example.com | [154e 10-14 19:01:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [154f 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1550 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 principal matched by identity 0 +peer0.org2.example.com | [1551 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer0.org2.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer0.org2.example.com | [1552 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer0.org2.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer0.org2.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer0.org2.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer0.org2.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org2.example.com | [1553 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1554 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400af90 gate 1602702094209166100 evaluation succeeds +peer0.org2.example.com | [1555 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1556 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1557 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1558 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1559 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [155a 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [155b 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [155c 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org2.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org2.example.com | [155d 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org2.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer0.org2.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer0.org2.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer0.org2.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org2.example.com | [155e 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [155f 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1560 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1561 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1562 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer0.org2.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer0.org2.example.com | [1563 10-14 19:01:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer0.org2.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer0.org2.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer0.org2.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer0.org2.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer0.org2.example.com | [1564 10-14 19:01:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1565 10-14 19:01:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1566 10-14 19:01:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1567 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1568 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1569 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [156a 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [156b 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [156d 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [156c 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [156e 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [156f 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer0.org2.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer0.org2.example.com | [1570 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer0.org2.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer0.org2.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer0.org2.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer0.org2.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer0.org2.example.com | [1571 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1572 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 1e a4 12 68 22 2b 31 c8 ac d7 a7 |0D. U...h"+1....| +peer0.org2.example.com | 00000010 97 06 31 ce de 51 0b 29 d7 b8 8c ca d5 81 39 2a |..1..Q.)......9*| +peer0.org2.example.com | 00000020 65 4e b9 3f 02 20 22 ec b2 bf 29 c0 ec c4 09 26 |eN.?. "...)....&| +peer0.org2.example.com | 00000030 7b 8c 21 c1 3b 0f 6b eb fe 75 a3 53 a0 c5 04 9b |{.!.;.k..u.S....| +peer0.org2.example.com | 00000040 ef d6 6c 63 b4 f9 |..lc..| +peer0.org2.example.com | [1573 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1574 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [1576 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1575 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1577 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1578 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1579 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [157a 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [157b 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [157c 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [157d 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [157e 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [157f 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1580 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1581 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1582 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1583 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1584 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1585 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1586 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1587 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1588 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1589 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158a 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158b 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158c 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158d 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158e 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [158f 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1590 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1591 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1592 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1593 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1594 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1595 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14a6 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a7 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [14a8 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a9 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [14aa 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [14ab 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [14ac 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14ad 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [14ae 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161019 +peer0.org1.example.com | [14af 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84BDE041940AF8188368C6714508539F297B9D13AA211D89078599417FFBAA17 +peer0.org1.example.com | [14b0 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [14b1 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [14b2 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [14b3 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [14b4 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b5 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [14b6 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [14b7 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b8 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b9 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [14ba 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bb 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14bc 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bd 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14be 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14bf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14c0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14c1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [14c2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14c3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [14c4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14c5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [14c6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14c7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14c8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [14c9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [14ca 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [14cb 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 gate 1602702086608021700 evaluation starts +peer0.org1.example.com | [14cc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14cd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [14ce 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 principal matched by identity 0 +peer0.org1.example.com | [14cf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +peer0.org1.example.com | 00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +peer0.org1.example.com | [14d0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +peer0.org1.example.com | 00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +peer0.org1.example.com | 00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +peer0.org1.example.com | 00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +peer0.org1.example.com | 00000040 2f 39 53 01 52 be 16 |/9S.R..| +peer0.org1.example.com | [14d1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14d2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 gate 1602702086608021700 evaluation succeeds +peer0.org1.example.com | [14d3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14d4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [14d5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [14d6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [14d7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14d8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14d9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [14da 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org1.example.com | [14db 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer0.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer0.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer0.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer0.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer0.org1.example.com | [14dc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [14dd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [14de 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14df 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [14e0 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer0.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer0.org1.example.com | [14e1 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer0.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer0.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer0.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer0.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org1.example.com | [14e2 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14e3 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e4 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e5 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14e6 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [14e7 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e8 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [14ea 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org1.example.com | [14eb 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer0.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer0.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer0.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer0.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer0.org1.example.com | [14ec 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [14ed 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 4c 76 c0 ac b5 36 0b ad 4b |0E.!..DLv...6..K| +peer0.org1.example.com | 00000010 dc 59 ce cb 01 ae c0 77 77 44 39 48 96 15 7b 54 |.Y.....wwD9H..{T| +peer0.org1.example.com | 00000020 4f 0d d3 58 7a 02 20 0b ea 60 8d 14 0c bb 5b fe |O..Xz. ..`....[.| +peer0.org1.example.com | 00000030 7f f4 6e 7f 39 67 c5 6b f2 1f 18 2a eb cf 3a a2 |..n.9g.k...*..:.| +peer0.org1.example.com | 00000040 40 39 9c 7e 17 2d 7b |@9.~.-{| +peer0.org1.example.com | [14ee 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [14ef 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [14f0 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f1 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e9 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f2 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14f3 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f4 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [14f5 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [169e 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [169f 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16a0 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16a1 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [16a2 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16a3 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16a4 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16a5 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16a6 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [16a7 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 gate 1602702094999320600 evaluation starts +peer1.org2.example.com | [16a8 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16a9 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [16aa 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [16ab 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 principal evaluation fails +peer1.org2.example.com | [16ac 10-14 19:01:34.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec34c0 gate 1602702094999320600 evaluation fails +peer1.org2.example.com | [16ad 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16ae 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16af 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [16b0 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 gate 1602702095000601900 evaluation starts +peer1.org2.example.com | [16b1 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [16b2 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [16b3 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 principal matched by identity 0 +peer1.org2.example.com | [16b4 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [16b5 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [16b6 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [16b7 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec3a30 gate 1602702095000601900 evaluation succeeds +peer1.org2.example.com | [16b8 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16b9 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1596 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1597 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1598 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1599 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [159a 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [159b 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [159c 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 gate 1602702094446431400 evaluation starts +peer0.org2.example.com | [159d 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [159e 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [159f 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 principal matched by identity 0 +peer0.org2.example.com | [15a0 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer0.org2.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer0.org2.example.com | [15a1 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer0.org2.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer0.org2.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer0.org2.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer0.org2.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer0.org2.example.com | [15a2 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [15a3 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040473e0 gate 1602702094446431400 evaluation succeeds +peer0.org2.example.com | [15a4 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15a5 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15a6 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15a7 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15a8 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [15a9 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [15aa 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15ab 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [15ac 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [15ad 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ae 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15af 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b0 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [15b1 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b2 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b3 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b4 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [15b5 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive: alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > alive: +peer0.org1.example.com | [14f6 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [14f7 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14f8 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [14f9 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [14fa 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [14fb 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [14fc 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 gate 1602702086616933200 evaluation starts +peer0.org1.example.com | [14fd 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14fe 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [14ff 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 principal matched by identity 0 +peer0.org1.example.com | [1500 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +peer0.org1.example.com | 00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +peer0.org1.example.com | [1501 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +peer0.org1.example.com | 00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +peer0.org1.example.com | 00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +peer0.org1.example.com | 00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +peer0.org1.example.com | 00000040 85 3c 63 67 76 9c |. DEBU 0xc003908240 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1503 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 gate 1602702086616933200 evaluation succeeds +peer0.org1.example.com | [1504 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1505 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1506 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1507 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1508 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1509 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [150a 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [150b 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +peer0.org1.example.com | 00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +peer0.org1.example.com | [150c 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +peer0.org1.example.com | 00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +peer0.org1.example.com | 00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +peer0.org1.example.com | 00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +peer0.org1.example.com | 00000040 c1 b5 90 3d 01 a1 a6 |...=...| +peer0.org1.example.com | [150d 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [150e 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [150f 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1510 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org1.example.com | [1511 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer0.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer0.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer1.org1.example.com | [140f 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1410 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1411 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1413 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1414 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16101F +peer1.org1.example.com | [1412 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1415 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DCB8248FBB7504E713971C124AE4D0E145414D72A2EB3AF26D0998496BE03CC +peer1.org1.example.com | [1416 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1417 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1418 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1419 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [141a 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [141b 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [141c 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [141e 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [141f 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [141d 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1420 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1421 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1422 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1423 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1424 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1425 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1426 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1427 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1428 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1429 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ba 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16bb 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16bc 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [16bd 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [16be 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [16bf 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [16c0 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c1 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c2 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c3 10-14 19:01:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c4 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16c5 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16c6 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16c7 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16c8 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [16c9 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 39 46 16 ec 0d 8a e0 5a 98 4b 7b fd 95 0d 7a |.9F.....Z.K{...z| +peer1.org2.example.com | 00000010 fb 94 4b 7c 4e 2b 98 8b e6 fb d3 da 7e e8 de 7f |..K|N+......~...| +peer1.org2.example.com | [16ca 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 74 09 f5 f0 95 fc 3b cb 80 ad 08 |0D. wt.....;....| +peer1.org2.example.com | 00000010 8e 84 c0 39 8b b8 2d c2 22 23 33 d3 fa 79 75 5c |...9..-."#3..yu\| +peer1.org2.example.com | 00000020 dd de 49 b4 02 20 7a 38 23 54 94 56 bd 0c fa e1 |..I.. z8#T.V....| +peer1.org2.example.com | 00000030 e5 1d 95 da 26 1c 34 10 56 ae aa a1 56 57 9e 3a |....&.4.V...VW.:| +peer1.org2.example.com | 00000040 6f da 4c 86 37 50 |o.L.7P| +peer1.org2.example.com | [16cb 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16cc 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [16cd 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [16ce 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [16cf 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes in aliveMembership +peer1.org2.example.com | [16d0 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d1 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d2 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16d3 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16d4 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16d5 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16d6 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [16d7 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15b6 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b7 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b8 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b9 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ba 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15bb 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15bc 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15bd 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15be 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15bf 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15c0 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [15c1 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15c2 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [15c3 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15c4 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [15c5 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [15c6 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15c7 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15c8 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15c9 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15ca 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15cb 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15cc 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [15cd 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 gate 1602702094609700100 evaluation starts +peer0.org2.example.com | [15ce 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15cf 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [15d0 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 principal matched by identity 0 +peer0.org2.example.com | [15d1 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer0.org2.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer0.org2.example.com | [15d2 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer0.org2.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer0.org2.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer0.org2.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer0.org2.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer1.org2.example.com | [16d8 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [16d9 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16da 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16dc 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16db 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16dd 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16de 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16df 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e0 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16e1 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e2 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16e3 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e4 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16e5 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e6 10-14 19:01:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [16e7 10-14 19:01:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101A +peer1.org2.example.com | [16e8 10-14 19:01:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2328C584D14676F56D60DFFD77004BC8C7F4ADDAF40EA57E4FFB1A87E21D68B +peer1.org2.example.com | [16e9 10-14 19:01:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [16ea 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [16eb 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [16ec 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [16ed 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ee 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ef 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [16f0 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16f1 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [16f3 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16f4 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f2 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16f6 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [16f7 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16f8 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f5 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [16f9 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:22.667 UTC [orderer.common.server] Deliver -> DEBU 1ab4 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:22.667 UTC [common.deliver] Handle -> DEBU 1ab5 Starting new deliver loop for 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.668 UTC [common.deliver] Handle -> DEBU 1ab6 Attempting to read seek info message from 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.676 UTC [policies] Evaluate -> DEBU 1aba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.676 UTC [policies] Evaluate -> DEBU 1abb == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.677 UTC [cauthdsl] func1 -> DEBU 1abc 0xc0002df960 gate 1602702142677419600 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:22.677 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0002df960 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-10-14 19:02:22.677 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0002df960 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:22.678 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0002df960 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:22.678 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 53 23 a7 4b 9f e4 b2 92 2b 5f 1b db e5 b5 3b 80 |S#.K....+_....;.| +orderer0.example.com | 00000010 28 be 91 a7 45 b9 19 9e c8 ed 1a cf 03 07 70 e5 |(...E.........p.|" +orderer0.example.com | "2020-10-14 19:02:22.678 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 cd 67 80 36 ed cc f7 07 00 fe f4 |0E.!..g.6.......| +orderer0.example.com | 00000010 be 8d 60 3a 23 9b b0 e6 fb c1 c0 13 1a e3 62 bf |..`:#.........b.| +orderer0.example.com | 00000020 5a 75 52 12 2c 02 20 19 6c 25 51 e8 88 cb fa cb |ZuR.,. .l%Q.....| +orderer0.example.com | 00000030 64 05 7f 6a 27 1a 8c d2 3e 4f 0f 0c 63 24 b7 91 |d..j'...>O..c$..| +orderer0.example.com | 00000040 81 21 74 3b 7a 84 0f |.!t;z..|" +orderer0.example.com | "2020-10-14 19:02:22.678 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0002df960 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-10-14 19:02:22.678 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0002df960 gate 1602702142677419600 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [common.deliver] deliverBlocks -> DEBU 1aca [channel: testchainid] Received seekInfo (0xc000cb19c0) start: > stop: > from 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.679 UTC [fsblkstorage] Next -> DEBU 1acb Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2020-10-14 19:02:22.680 UTC [fsblkstorage] newBlockfileStream -> DEBU 1acc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1acd Remaining bytes=[53338], Going to peek [8] bytes" +orderer0.example.com | "2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ace Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1acf blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-10-14 19:02:22.680 UTC [common.deliver] deliverBlocks -> DEBU 1ad0 [channel: testchainid] Delivering block [0] for (0xc000cb19c0) for 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.682 UTC [common.deliver] deliverBlocks -> DEBU 1ad1 [channel: testchainid] Done delivering to 172.18.0.9:40202 for (0xc000cb19c0)" +orderer0.example.com | "2020-10-14 19:02:22.682 UTC [common.deliver] Handle -> DEBU 1ad2 Waiting for new SeekInfo from 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.682 UTC [common.deliver] Handle -> DEBU 1ad3 Attempting to read seek info message from 172.18.0.9:40202" +orderer0.example.com | "2020-10-14 19:02:22.705 UTC [common.deliver] Handle -> WARN 1ad4 Error reading from 172.18.0.9:40202: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-10-14 19:02:22.705 UTC [orderer.common.server] func1 -> DEBU 1ad5 Closing Deliver stream" +orderer0.example.com | "2020-10-14 19:02:22.706 UTC [comm.grpc.server] 1 -> INFO 1ad6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40202 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9904ms +orderer0.example.com | "2020-10-14 19:02:22.706 UTC [grpc] infof -> DEBU 1ad7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-10-14 19:02:22.936 UTC [orderer.common.server] Deliver -> DEBU 1ad8 Starting new Deliver handler" +orderer0.example.com | "2020-10-14 19:02:22.936 UTC [common.deliver] Handle -> DEBU 1ad9 Starting new deliver loop for 172.18.0.9:40204" +orderer0.example.com | "2020-10-14 19:02:22.937 UTC [common.deliver] Handle -> DEBU 1ada Attempting to read seek info message from 172.18.0.9:40204" +orderer0.example.com | "2020-10-14 19:02:22.946 UTC [policies] Evaluate -> DEBU 1adb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.947 UTC [policies] Evaluate -> DEBU 1adc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.947 UTC [policies] Evaluate -> DEBU 1add == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.948 UTC [policies] Evaluate -> DEBU 1ade This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-10-14 19:02:22.948 UTC [policies] Evaluate -> DEBU 1adf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-10-14 19:02:22.948 UTC [cauthdsl] func1 -> DEBU 1ae0 0xc000362a70 gate 1602702142948629500 evaluation starts" +orderer0.example.com | "2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae1 0xc000362a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer0.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer0.org1.example.com | [1512 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1513 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1514 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1515 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1516 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1517 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1518 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1519 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [151a 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [151b 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [151c 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [151d 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [151e 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [151f 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1520 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1521 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1522 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1523 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e b2 a9 18 cf 33 ef fb 40 3f 07 3a cc 21 cb 0a |n....3..@?.:.!..| +peer0.org1.example.com | 00000010 37 cf c8 16 37 ef 14 0c 3a 90 e0 a6 8b a0 8c 40 |7...7...:......@| +peer0.org1.example.com | [1524 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 04 10 41 77 86 6c d0 af 88 53 |0E.!....Aw.l...S| +peer0.org1.example.com | 00000010 15 b0 9d d6 0d ff f3 7d ab 12 15 59 36 45 5b 00 |.......}...Y6E[.| +peer0.org1.example.com | 00000020 ce 0b 76 9c 9b 02 20 38 68 d6 95 f1 af fb 49 b7 |..v... 8h.....I.| +peer0.org1.example.com | 00000030 db 77 62 57 54 89 4b 0d ec d2 22 d1 6d 0b a3 2c |.wbWT.K...".m..,| +peer0.org1.example.com | 00000040 3b 5d 60 e2 4a 30 cb |;]`.J0.| +peer0.org1.example.com | [1525 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1526 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1527 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1528 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [1529 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [152a 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [152b 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [152c 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [152d 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [152e 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [152f 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1530 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1531 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1533 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1532 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1534 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1535 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1536 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1537 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1538 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1539 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [153a 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [153b 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [153c 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [153d 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [153e 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [153f 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1540 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1541 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1542 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1543 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1544 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1545 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1546 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 gate 1602702089933585000 evaluation starts +peer0.org1.example.com | [1547 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1548 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [142a 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [142b 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [142c 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [142d 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [142e 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [142f 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1430 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 gate 1602702090460126400 evaluation starts +peer1.org1.example.com | [1431 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1432 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1433 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 principal matched by identity 0 +peer1.org1.example.com | [1434 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer1.org1.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer1.org1.example.com | [1435 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer1.org1.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer1.org1.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer1.org1.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer1.org1.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer1.org1.example.com | [1436 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1438 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004158990 gate 1602702090460126400 evaluation succeeds +peer1.org1.example.com | [1437 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1439 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [143a 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [143b 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [143c 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [143d 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [143e 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [143f 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1440 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1441 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer1.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer1.org1.example.com | [1442 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer1.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer1.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer1.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer1.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer1.org1.example.com | [1443 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1444 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1445 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1446 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1447 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer1.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer1.org1.example.com | [1448 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +peer1.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +peer1.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +peer1.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +peer1.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +peer1.org1.example.com | [1449 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [144a 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [144b 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [144c 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [144d 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [144e 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [144f 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer1.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer1.org1.example.com | [1450 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer1.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer1.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer1.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer1.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer1.org1.example.com | [1451 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1452 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 e9 24 ec 95 ee 6a 72 f5 a6 c6 |0E.!...$...jr...| +peer1.org1.example.com | 00000010 02 64 cb 61 65 1d 93 d0 1b df ff 11 d5 9e 52 00 |.d.ae.........R.| +peer1.org1.example.com | 00000020 2f bf c3 25 cf 02 20 22 ab 4d c7 3f 6a 60 56 9c |/..%.. ".M.?j`V.| +peer1.org1.example.com | 00000030 90 c8 52 ec 05 cf 94 6a af f6 9e 24 fc 75 29 e1 |..R....j...$.u).| +peer1.org1.example.com | 00000040 b4 ca 6a 6f fb 21 2a |..jo.!*| +peer1.org1.example.com | [1453 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1454 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1455 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1456 10-14 19:01:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1457 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1458 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1459 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [145a 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [145b 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae2 0xc000362a70 processing identity 0 with bytes of fe2870" +orderer0.example.com | "2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae3 0xc000362a70 principal matched by identity 0" +orderer0.example.com | "2020-10-14 19:02:22.950 UTC [msp.identity] Verify -> DEBU 1ae4 Verify: digest = 00000000 69 47 f3 31 ee c7 7f 9f 41 d0 e9 39 bb 9d 26 16 |iG.1....A..9..&.| +orderer0.example.com | 00000010 16 c2 fe 66 98 78 2f 9f d1 b1 83 a8 79 27 27 92 |...f.x/.....y''.|" +peer1.org2.example.com | [16fa 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16fb 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16fc 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16fd 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16fe 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [16ff 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1700 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1701 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1702 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1703 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1704 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1705 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1706 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 gate 1602702095441696400 evaluation starts +peer1.org2.example.com | [1707 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1708 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1709 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [170a 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 principal evaluation fails +peer1.org2.example.com | [170b 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2c900 gate 1602702095441696400 evaluation fails +peer1.org2.example.com | [170c 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [170d 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [170e 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [170f 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 gate 1602702095443669600 evaluation starts +peer1.org2.example.com | [1710 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1711 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1712 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 principal matched by identity 0 +peer1.org2.example.com | [1713 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b7 e9 8a b8 63 51 26 bb e7 18 e1 36 37 09 f2 |.....cQ&....67..| +peer1.org2.example.com | 00000010 6d 1b cd f4 b8 20 37 02 09 3a 49 0d 04 45 f0 5d |m.... 7..:I..E.]| +peer1.org2.example.com | [1714 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 40 46 68 39 a7 a7 ec b0 cc 8c 6b |0D. 9@Fh9......k| +peer1.org2.example.com | 00000010 b7 58 8a d1 55 15 60 02 de 1d 57 1a d8 d2 16 c0 |.X..U.`...W.....| +peer1.org2.example.com | 00000020 6d 98 db 9f 02 20 78 06 7d 71 e1 ff 3f f7 bc 37 |m.... x.}q..?..7| +peer1.org2.example.com | 00000030 28 f1 00 40 48 78 85 2c 3d 2b 32 db 0c df c4 31 |(..@Hx.,=+2....1| +peer1.org2.example.com | 00000040 b0 eb 08 b3 ef cf |......| +peer1.org2.example.com | [1715 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1716 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2ce70 gate 1602702095443669600 evaluation succeeds +peer1.org2.example.com | [1717 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1718 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1719 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1549 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 principal matched by identity 0 +peer0.org1.example.com | [154a 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [154b 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [154c 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [154d 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 gate 1602702089933585000 evaluation succeeds +peer0.org1.example.com | [154e 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [154f 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1550 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1551 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1552 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1553 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1554 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1555 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1556 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1557 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1558 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1559 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [155a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 gate 1602702089941081500 evaluation starts +peer0.org1.example.com | [155b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [155c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [155d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [155e 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [155f 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 principal matched by identity 0 +peer0.org1.example.com | [1560 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1561 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1563 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1562 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1564 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1565 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1566 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1567 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 gate 1602702089941081500 evaluation succeeds +peer0.org1.example.com | [1569 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [156a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [156b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [156c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [156d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1568 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [156e 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156f 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1570 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1571 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1572 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1573 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1574 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1575 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1576 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1577 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1578 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1579 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [157a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [157b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 gate 1602702089949694100 evaluation starts +peer0.org1.example.com | [157c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [157d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [157e 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 principal matched by identity 0 +peer0.org1.example.com | [157f 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1580 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1581 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1582 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 gate 1602702089949694100 evaluation succeeds +peer0.org1.example.com | [1583 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1584 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1585 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1586 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1587 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1588 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1589 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [158a 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [158b 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [158c 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [158d 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [158e 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [158f 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 gate 1602702089956005000 evaluation starts +peer0.org1.example.com | [1590 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1591 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1592 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 principal matched by identity 0 +peer0.org1.example.com | [1593 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1594 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1595 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1596 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 gate 1602702089956005000 evaluation succeeds +peer0.org1.example.com | [1597 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1598 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1599 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [159a 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15d3 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [15d4 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004091070 gate 1602702094609700100 evaluation succeeds +peer0.org2.example.com | [15d5 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15d6 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [15d7 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15d8 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15d9 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15da 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [15db 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15dc 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [15dd 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [15de 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15df 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15e0 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15e1 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [15e2 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15e3 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15e4 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15e5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [15e6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > alive: alive: +peer0.org2.example.com | [15e7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [15e8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15e9 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15ea 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15eb 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [15ec 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ed 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ee 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ef 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f0 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [15f1 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f2 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [15f3 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15f4 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15f5 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [15f6 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15f7 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [15f8 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [15f9 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [15fa 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [15fb 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 gate 1602702094632798600 evaluation starts +peer0.org2.example.com | [15fc 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [15fd 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [15fe 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 principal matched by identity 0 +peer0.org2.example.com | [15ff 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1600 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1601 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1602 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7590 gate 1602702094632798600 evaluation succeeds +peer0.org2.example.com | [1603 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1604 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1605 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1606 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1607 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1608 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1609 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [160a 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [160b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [160c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [160d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [160e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [160f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1610 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1611 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1612 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1613 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 gate 1602702094642895600 evaluation starts +peer0.org2.example.com | [1614 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1615 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1616 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 principal matched by identity 0 +peer0.org2.example.com | [1617 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1618 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +orderer0.example.com | "2020-10-14 19:02:22.950 UTC [msp.identity] Verify -> DEBU 1ae5 Verify: sig = 00000000 30 44 02 20 5d a4 2d 6c 39 ef fb 91 0b 75 ab 04 |0D. ].-l9....u..| +peer1.org2.example.com | [171a 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [159b 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | [145c 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [145d 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [171b 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +orderer0.example.com | 00000010 47 d1 aa 24 b5 b0 ee 0b 63 6e 11 87 af c3 b4 c5 |G..$....cn......| +peer1.org2.example.com | [171c 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [159c 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | [1619 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000020 af 24 ed dc 02 20 77 1e e3 94 bb f4 57 88 05 f8 |.$... w.....W...| +peer1.org1.example.com | [145e 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [171d 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +orderer0.example.com | 00000030 38 8b bf 0d 01 3d cd 10 04 b4 2d ea c6 be 7e 71 |8....=....-...~q| +peer1.org1.example.com | [145f 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1460 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [171e 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [171f 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | 00000040 5d c2 14 00 a2 14 |].....|" +peer0.org2.example.com | [161a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d1570 gate 1602702094642895600 evaluation succeeds +peer0.org2.example.com | [161b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1461 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +orderer0.example.com | "2020-10-14 19:02:22.951 UTC [cauthdsl] func2 -> DEBU 1ae6 0xc000362a70 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [161c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1462 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 gate 1602702090494037300 evaluation starts +peer1.org1.example.com | [1463 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +orderer0.example.com | "2020-10-14 19:02:22.951 UTC [cauthdsl] func1 -> DEBU 1ae7 0xc000362a70 gate 1602702142948629500 evaluation succeeds" +orderer0.example.com | "2020-10-14 19:02:22.951 UTC [policies] Evaluate -> DEBU 1ae8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [161d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [161e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [161f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:22.952 UTC [policies] Evaluate -> DEBU 1ae9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1620 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1464 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 processing identity 0 with bytes of 115a6c0 +orderer0.example.com | "2020-10-14 19:02:22.952 UTC [policies] Evaluate -> DEBU 1aea Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1720 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1621 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1465 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aeb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1721 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1622 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aec Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [159d 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1722 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1623 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1466 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +orderer0.example.com | "2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1723 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1624 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +orderer0.example.com | "2020-10-14 19:02:22.953 UTC [common.deliver] deliverBlocks -> DEBU 1aee [channel: testchainid] Received seekInfo (0xc000d2a140) start: > stop: > from 172.18.0.9:40204" +peer0.org1.example.com | [159e 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1724 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1625 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1467 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +orderer0.example.com | "2020-10-14 19:02:22.954 UTC [fsblkstorage] Next -> DEBU 1aef Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org1.example.com | [159f 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | [1725 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1626 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +orderer0.example.com | "2020-10-14 19:02:22.954 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1726 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1627 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +orderer0.example.com | "2020-10-14 19:02:22.955 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af1 Remaining bytes=[30408], Going to peek [8] bytes" +peer0.org1.example.com | [15a0 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | [1727 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1628 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +orderer0.example.com | "2020-10-14 19:02:22.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af2 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | [1728 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1629 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +orderer0.example.com | "2020-10-14 19:02:22.957 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af3 blockbytes [30405] read from file [0]" +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | [1729 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [162a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 gate 1602702094644349900 evaluation starts +peer1.org1.example.com | [1468 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-10-14 19:02:22.957 UTC [common.deliver] deliverBlocks -> DEBU 1af4 [channel: testchainid] Delivering block [1] for (0xc000d2a140) for 172.18.0.9:40204" +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | [172a 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [162b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1469 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004198360 gate 1602702090494037300 evaluation succeeds +orderer0.example.com | "2020-10-14 19:02:22.958 UTC [common.deliver] deliverBlocks -> DEBU 1af5 [channel: testchainid] Done delivering to 172.18.0.9:40204 for (0xc000d2a140)" +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [172b 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [162c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [146a 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:22.959 UTC [common.deliver] Handle -> DEBU 1af6 Waiting for new SeekInfo from 172.18.0.9:40204" +peer0.org1.example.com | [15a1 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | [172c 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [162d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 principal matched by identity 0 +peer1.org1.example.com | [146b 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:22.960 UTC [common.deliver] Handle -> DEBU 1af7 Attempting to read seek info message from 172.18.0.9:40204" +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [172d 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [162e 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | [146c 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:22.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [15a2 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | [172e 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [146d 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:22.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1af9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | [172f 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [162f 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | [146e 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:22.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1afa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 833.6µs " +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | [1730 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | [146f 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:22.987 UTC [common.deliver] Handle -> WARN 1afb Error reading from 172.18.0.9:40204: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | [1731 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | [1470 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-10-14 19:02:22.987 UTC [orderer.common.server] func1 -> DEBU 1afc Closing Deliver stream" +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1732 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | [1471 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +peer0.org1.example.com | [15a3 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1733 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | 00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +peer0.org1.example.com | [15a4 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:22.987 UTC [comm.grpc.server] 1 -> INFO 1afd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40204 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.2774ms +peer1.org2.example.com | [1734 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1630 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1631 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ec9f0 gate 1602702094644349900 evaluation succeeds +peer0.org1.example.com | [15a5 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:02:22.988 UTC [grpc] infof -> DEBU 1afe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [1632 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15a6 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1472 10-14 19:01:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +orderer0.example.com | "2020-10-14 19:02:23.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aff Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +peer1.org2.example.com | [1735 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1633 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15a7 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +orderer0.example.com | "2020-10-14 19:02:23.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b00 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +peer1.org2.example.com | [1736 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1634 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15a8 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +orderer0.example.com | "2020-10-14 19:02:23.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.2µs " +peer1.org2.example.com | [1737 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1635 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15a9 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +orderer0.example.com | "2020-10-14 19:02:23.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +peer1.org2.example.com | [1738 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1636 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15aa 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 e0 cb 95 6e 50 45 |...nPE| +orderer0.example.com | "2020-10-14 19:02:23.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b03 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1739 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1637 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15ab 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 gate 1602702089968539300 evaluation starts +peer1.org1.example.com | [1473 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-10-14 19:02:23.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b04 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [173a 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [173b 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ac 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15ad 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [15ae 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 principal matched by identity 0 +peer0.org2.example.com | [1638 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15af 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [15b0 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | [1639 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +orderer0.example.com | "2020-10-14 19:02:23.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b05 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1474 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [173c 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [163a 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +orderer0.example.com | "2020-10-14 19:02:23.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b06 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +peer0.org2.example.com | [163b 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [173d 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [15b1 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-10-14 19:02:23.483 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +peer1.org1.example.com | [1475 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [163c 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [173e 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b2 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 gate 1602702089968539300 evaluation succeeds +orderer0.example.com | "2020-10-14 19:02:23.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b08 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +peer1.org1.example.com | [1476 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer1.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer0.org2.example.com | [163d 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [15b3 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15b4 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15b5 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15b6 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15b7 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b8 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15b9 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15ba 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15bb 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15bc 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [15bd 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [15be 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [15bf 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 gate 1602702089972232500 evaluation starts +peer0.org1.example.com | [15c0 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15c1 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [15c2 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 principal matched by identity 0 +peer0.org1.example.com | [15c3 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [15c4 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [15c5 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [15c6 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 gate 1602702089972232500 evaluation succeeds +peer0.org1.example.com | [15c7 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15c8 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15c9 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15ca 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15cb 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15cc 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15cd 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [15ce 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15cf 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [15d0 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [15d1 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [15d2 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d3 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d4 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d5 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d6 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d7 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15d8 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [15d9 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15da 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15db 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15dc 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15dd 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15de 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [15df 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e0 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15e1 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15e2 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15e3 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [15e4 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1477 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer1.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer1.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer1.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer1.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer1.org1.example.com | [1478 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1479 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [147a 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [147b 10-14 19:01:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [147c 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [147d 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [147e 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [163e 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 gate 1602702094654420900 evaluation starts +peer0.org2.example.com | [163f 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1640 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1641 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 principal matched by identity 0 +peer0.org2.example.com | [1642 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1643 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1644 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1645 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407b600 gate 1602702094654420900 evaluation succeeds +peer0.org2.example.com | [1646 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1647 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1648 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1649 10-14 19:01:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [164a 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [164b 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [164c 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [164d 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [164e 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164f 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1650 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1651 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1652 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1653 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1654 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1655 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1656 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1657 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1658 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1659 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [165a 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [165b 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [165c 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [165d 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [165e 10-14 19:01:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [165f 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1660 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1661 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 gate 1602702094677177400 evaluation starts +peer0.org2.example.com | [1662 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1663 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1664 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 principal matched by identity 0 +peer0.org2.example.com | [1665 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1666 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1667 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1668 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111ea0 gate 1602702094677177400 evaluation succeeds +peer0.org2.example.com | [1669 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [166a 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [166b 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [166c 10-14 19:01:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [166d 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [166e 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [166f 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1670 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1671 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1672 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1673 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1674 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1675 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 gate 1602702094681603600 evaluation starts +peer0.org2.example.com | [1676 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1677 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1678 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 principal matched by identity 0 +peer0.org2.example.com | [1679 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [167a 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [15e5 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [15e6 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 gate 1602702090143690800 evaluation starts +peer0.org1.example.com | [15e7 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15e8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [15e9 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 principal matched by identity 0 +peer0.org1.example.com | [15ea 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd f5 a5 94 0a 89 9c 64 ac 36 0b 2d 1b e8 35 0e |.......d.6.-..5.| +peer0.org1.example.com | 00000010 82 40 32 94 8f 80 0d 72 36 a2 d6 0f f5 3a b9 a7 |.@2....r6....:..| +peer0.org1.example.com | [15eb 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 0e b9 2c e6 e4 90 4e 8b 28 30 |0E.!....,...N.(0| +peer0.org1.example.com | 00000010 60 2a 7f 6e 30 93 84 66 5c bb 56 92 6e 11 fc 2c |`*.n0..f\.V.n..,| +peer0.org1.example.com | 00000020 99 18 84 ce 13 02 20 35 c5 b8 71 99 80 08 6b 88 |...... 5..q...k.| +peer0.org1.example.com | 00000030 21 2f 86 88 6a e0 55 51 ff 5a cc 9e 62 f8 45 67 |!/..j.UQ.Z..b.Eg| +peer0.org1.example.com | 00000040 b5 1e 82 8f 61 62 8f |....ab.| +peer0.org1.example.com | [15ec 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [15ed 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 gate 1602702090143690800 evaluation succeeds +peer0.org1.example.com | [15ee 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15ef 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15f0 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15f1 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15f2 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15f3 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [15f4 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [15f5 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [15f6 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [15f7 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15f9 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15fa 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15fb 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15fc 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15fd 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [15fe 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15ff 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1600 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1601 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1602 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1603 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1604 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1605 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1606 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1607 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [167b 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [167c 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041390a0 gate 1602702094681603600 evaluation succeeds +peer0.org2.example.com | [167d 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [167e 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [167f 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1680 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1681 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1682 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1683 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1684 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +orderer0.example.com | "2020-10-14 19:02:23.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b09 Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +orderer0.example.com | "2020-10-14 19:02:23.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +orderer0.example.com | "2020-10-14 19:02:23.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.8µs " +orderer0.example.com | "2020-10-14 19:02:23.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:23.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [173f 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1740 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1741 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1742 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1743 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1744 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1745 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 gate 1602702095608688500 evaluation starts +peer1.org2.example.com | [1746 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1747 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1748 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1749 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 principal evaluation fails +peer1.org2.example.com | [174a 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5aca0 gate 1602702095608688500 evaluation fails +peer1.org2.example.com | [174b 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [174c 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [174d 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [174e 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 gate 1602702095609133800 evaluation starts +peer1.org2.example.com | [174f 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1750 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1751 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 principal matched by identity 0 +peer1.org2.example.com | [1752 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 97 27 c4 b2 c3 7d 92 12 ef 26 52 31 9c 21 f0 |..'...}...&R1.!.| +peer1.org2.example.com | 00000010 b6 8f 6f 3f 21 3e 8c 78 c0 47 99 1f 52 13 90 f3 |..o?!>.x.G..R...| +peer1.org2.example.com | [1753 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 1d 80 d5 ec 4c 63 e0 e0 5d 50 ff |0D. 6....Lc..]P.| +peer1.org2.example.com | 00000010 8b 3c 03 dd c5 42 2b e3 c2 f7 f8 a8 f5 23 e3 16 |.<...B+......#..| +peer1.org2.example.com | 00000020 e2 42 80 a9 02 20 02 bf 15 e4 c9 60 a3 89 b9 9d |.B... .....`....| +peer1.org2.example.com | 00000030 27 ee fb fa 03 1d d6 6b 4e 72 da 2b 90 51 65 d8 |'......kNr.+.Qe.| +peer1.org2.example.com | 00000040 ff 27 d7 5a b2 49 |.'.Z.I| +peer1.org2.example.com | [1754 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1755 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b210 gate 1602702095609133800 evaluation succeeds +peer1.org2.example.com | [1756 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1757 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1758 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1759 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [175a 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [175b 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [175c 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [147f 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1480 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1481 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1482 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1483 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1484 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1485 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1486 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer1.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer1.org1.example.com | [1487 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer1.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer1.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer1.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer1.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer1.org1.example.com | [1488 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1489 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 28 97 f0 36 6e 0e a8 34 07 1a |0E.!..(..6n..4..| +peer1.org1.example.com | 00000010 a7 a2 f0 1d 8a 51 ed 86 f0 f6 87 84 21 0e 99 05 |.....Q......!...| +peer1.org1.example.com | 00000020 7b e9 9e 1e 05 02 20 18 16 95 b2 41 ca 6d a2 6b |{..... ....A.m.k| +peer1.org1.example.com | 00000030 2e e6 65 f9 c3 42 f0 0e ac b9 15 5e 4b db 30 a8 |..e..B.....^K.0.| +peer1.org1.example.com | 00000040 2e 2e d9 20 2d 88 7f |... -..| +peer1.org1.example.com | [148a 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [148b 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [148c 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [148d 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [148e 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [148f 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1490 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1491 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1492 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1493 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1494 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1495 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1685 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1686 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1687 10-14 19:01:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1688 10-14 19:01:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1689 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [168a 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [168b 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [168c 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [168d 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [168e 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [168f 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1690 10-14 19:01:34.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1691 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1692 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101A +peer0.org2.example.com | [1693 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EB394616EC0D8AE05A984B7BFD950D7AFB944B7C4E2B988BE6FBD3DA7EE8DE7F +peer0.org2.example.com | [1694 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1695 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1696 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1697 10-14 19:01:35.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1698 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1699 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [169a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [169b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [169c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [169d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [169e 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [169f 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16a0 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [16a1 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16a3 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16a2 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16a4 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16a5 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16a6 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16a7 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16a8 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [16a9 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 8c 58 4d 14 67 6f 56 d6 0d ff d7 70 04 bc |.2.XM.goV....p..| +peer0.org2.example.com | 00000010 8c 7f 4a dd af 40 ea 57 e4 ff b1 a8 7e 21 d6 8b |..J..@.W....~!..| +peer0.org1.example.com | [1608 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1609 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [160a 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [160b 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [160c 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [160d 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [160e 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [160f 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1610 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1611 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1612 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1613 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 gate 1602702090174061900 evaluation starts +peer0.org1.example.com | [1614 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1615 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1616 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 principal matched by identity 0 +peer0.org1.example.com | [1617 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer0.org1.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer0.org1.example.com | [1618 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org1.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer0.org1.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org1.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org1.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org1.example.com | [1619 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [161a 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 gate 1602702090174061900 evaluation succeeds +peer0.org1.example.com | [161b 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [161c 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [161d 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [161e 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [161f 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1620 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1621 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1622 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1623 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16aa 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 6c 3d ce 16 ac ec 6f e9 99 bd |0E.!..l=....o...| +peer0.org2.example.com | 00000010 b2 94 03 50 cc e1 05 f6 79 80 b6 9e e9 3d 50 a6 |...P....y....=P.| +peer0.org2.example.com | 00000020 ac 1b fd a3 fb 02 20 05 72 5b e6 a9 5b e3 f2 76 |...... .r[..[..v| +peer0.org2.example.com | 00000030 44 69 86 85 78 9f 7e 86 b5 87 4c 45 ab d1 ed 7b |Di..x.~...LE...{| +peer0.org2.example.com | 00000040 02 95 47 78 22 af c2 |..Gx"..| +peer0.org2.example.com | [16ab 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16ac 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [16ad 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [16ae 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [16af 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [16b0 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b1 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b2 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b3 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b4 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b5 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b6 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [16b7 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b8 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [16ba 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16bb 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16b9 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16bc 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16bd 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16be 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16bf 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16c0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16c1 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16c2 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16c3 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [16c4 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16c5 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16c6 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16c7 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16c8 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [16c9 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ca 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16cb 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16cc 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16cd 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [16ce 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [16cf 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [16d0 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 gate 1602702095440068200 evaluation starts +peer0.org2.example.com | [16d1 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16d2 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [16d3 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 principal matched by identity 0 +peer0.org2.example.com | [16d4 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b7 e9 8a b8 63 51 26 bb e7 18 e1 36 37 09 f2 |.....cQ&....67..| +peer0.org2.example.com | 00000010 6d 1b cd f4 b8 20 37 02 09 3a 49 0d 04 45 f0 5d |m.... 7..:I..E.]| +peer0.org2.example.com | [16d5 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 40 46 68 39 a7 a7 ec b0 cc 8c 6b |0D. 9@Fh9......k| +peer0.org2.example.com | 00000010 b7 58 8a d1 55 15 60 02 de 1d 57 1a d8 d2 16 c0 |.X..U.`...W.....| +peer0.org2.example.com | 00000020 6d 98 db 9f 02 20 78 06 7d 71 e1 ff 3f f7 bc 37 |m.... x.}q..?..7| +peer0.org2.example.com | 00000030 28 f1 00 40 48 78 85 2c 3d 2b 32 db 0c df c4 31 |(..@Hx.,=+2....1| +peer0.org2.example.com | 00000040 b0 eb 08 b3 ef cf |......| +peer0.org2.example.com | [16d6 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [16d7 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004181e00 gate 1602702095440068200 evaluation succeeds +peer0.org2.example.com | [16d8 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1496 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > alive: +peer1.org1.example.com | [1497 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1498 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1499 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [149a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [149b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [149c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [149d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [149e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 08 b4 c8 39 d3 c5 3f 0e c9 23 ad e4 2b cc 48 |....9..?..#..+.H| +peer1.org1.example.com | 00000010 bd 2c e8 43 82 6e d1 9b c7 1e 48 b1 8a 96 e0 2a |.,.C.n....H....*| +peer1.org1.example.com | [149f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 e6 11 9e 7a ae 71 e8 66 a0 cc |0E.!.....z.q.f..| +peer1.org1.example.com | 00000010 3c 75 cb 55 4b bb 88 9d d1 1a 0b 41 0e 9f db 90 | DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14a1 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1602702050573832200, 27 but got ts: inc_num:1602702050573832200 seq_num:26 +peer1.org1.example.com | [14a2 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a3 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a4 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a5 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a6 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a7 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [14a8 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a9 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [14aa 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14ab 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ac 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14ad 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ae 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14af 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14b0 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14b1 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14b2 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [175d 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [175e 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [175f 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1760 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1761 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1762 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1763 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1764 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1766 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1767 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1768 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1769 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [176a 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [176b 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [176c 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [176d 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1765 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [176e 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [176f 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1771 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1772 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1773 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1774 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1776 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1770 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1777 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1778 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1779 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1775 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1624 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1625 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1626 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1627 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1628 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1629 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [162a 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [162b 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162c 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162d 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162e 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [162f 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1630 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1631 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1632 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1633 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1634 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1635 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1636 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1637 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1638 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1639 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [163a 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [163b 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [163c 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [163d 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [163e 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [163f 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1640 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1641 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1642 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1643 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:23.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:23.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b0f Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +orderer0.example.com | "2020-10-14 19:02:23.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.1µs " +orderer0.example.com | "2020-10-14 19:02:24.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b11 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2020-10-14 19:02:24.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b12 Sending msg of 28 bytes to 3 on channel businesschannel took 76.9µs" +orderer0.example.com | "2020-10-14 19:02:24.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +orderer0.example.com | "2020-10-14 19:02:24.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.1µs " +orderer0.example.com | "2020-10-14 19:02:24.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b15 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b16 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b18 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +orderer0.example.com | "2020-10-14 19:02:24.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.9µs " +orderer0.example.com | "2020-10-14 19:02:24.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b1a Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +orderer0.example.com | "2020-10-14 19:02:24.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b1b Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +orderer0.example.com | "2020-10-14 19:02:24.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.5µs " +orderer0.example.com | "2020-10-14 19:02:24.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.3µs " +orderer0.example.com | "2020-10-14 19:02:24.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b1e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:24.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b21 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +orderer0.example.com | "2020-10-14 19:02:24.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " +orderer0.example.com | "2020-10-14 19:02:25.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b23 Sending msg of 28 bytes to 2 on channel businesschannel took 34.3µs" +orderer0.example.com | "2020-10-14 19:02:25.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b24 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-10-14 19:02:25.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283.9µs " +orderer0.example.com | "2020-10-14 19:02:25.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3258ms " +orderer0.example.com | "2020-10-14 19:02:25.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b27 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.096 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b28 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.485 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b29 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2a Sending msg of 28 bytes to 3 on channel testchainid took 62.9µs" +orderer0.example.com | "2020-10-14 19:02:25.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.1µs " +orderer0.example.com | "2020-10-14 19:02:25.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2c Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2020-10-14 19:02:25.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2d Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-10-14 19:02:25.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.7µs " +orderer0.example.com | "2020-10-14 19:02:25.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +orderer0.example.com | "2020-10-14 19:02:25.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b30 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b31 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:25.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b33 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +peer1.org2.example.com | [177a 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [177b 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177c 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177d 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177e 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [177f 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1780 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1781 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1782 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1783 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1784 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1785 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1786 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1787 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1788 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1789 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer1.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer1.org2.example.com | [178a 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org2.example.com | [178b 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [178c 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce a0 cf 5e 81 0b 65 4a d7 7d 5a |0E.!....^..eJ.}Z| +peer1.org2.example.com | 00000010 8a 95 e9 8b e2 f6 69 dc 51 d3 49 ab 5b 64 aa f4 |......i.Q.I.[d..| +peer1.org2.example.com | 00000020 2b 97 8a 69 ef 02 20 77 d9 43 f2 f5 43 98 7e 14 |+..i.. w.C..C.~.| +peer1.org2.example.com | 00000030 76 93 bd 4c e6 4c 56 6a 9b b7 24 9e 1a 1f ca 51 |v..L.LVj..$....Q| +peer1.org2.example.com | 00000040 d1 a8 06 63 4e 73 18 |...cNs.| +peer1.org2.example.com | [178d 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [178e 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [178f 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [16d9 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [16da 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [16db 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [16dc 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16dd 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [16de 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [16df 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [16e0 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [16e1 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e2 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e3 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e4 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1644 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1645 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1646 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1647 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1648 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1649 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164a 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [164b 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164c 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164d 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [164e 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [164f 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1650 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 gate 1602702090278347900 evaluation starts +peer0.org1.example.com | [1651 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1652 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1653 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 principal matched by identity 0 +peer0.org1.example.com | [1654 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 9a 36 2e 85 5c f6 d9 61 33 24 52 4c f0 32 d7 |..6..\..a3$RL.2.| +peer0.org1.example.com | 00000010 1a 60 a6 aa f7 14 f7 00 ce eb f7 c0 43 c0 98 70 |.`..........C..p| +peer0.org1.example.com | [1655 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 b0 e2 a1 e5 d1 03 49 a5 a3 cb 1e |0D. &......I....| +peer0.org1.example.com | 00000010 4b e0 e8 86 89 e7 b6 ed 6d 1a 3c 70 a3 20 c7 f1 |K.......m. DEBU 0xc003a8d6f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1657 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 gate 1602702090278347900 evaluation succeeds +peer0.org1.example.com | [1658 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1659 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [165b 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [165c 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [165a 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [165e 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [165f 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [165d 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1660 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1661 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1662 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1663 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1664 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1665 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1666 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1667 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1668 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1669 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [166a 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [166b 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [166c 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [166d 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [166e 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [166f 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1671 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1672 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1673 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1674 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1675 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b3 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b4 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14b5 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b6 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b7 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14b8 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14b9 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14ba 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14bb 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14bc 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14bd 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14be 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14bf 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c0 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c1 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14c2 10-14 19:01:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [14c3 10-14 19:01:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [14c4 10-14 19:01:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [14c5 10-14 19:01:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610071801 +peer1.org1.example.com | [14c6 10-14 19:01:33.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D7C24E9361879B8DF7898F1E3865F3243DBB3FFDFEB64F2ABE2BFE0628DAC085 +peer1.org1.example.com | [14c7 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [14c8 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c9 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14ca 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14cb 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14cc 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [14cd 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14cf 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14ce 10-14 19:01:33.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [14d0 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d1 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d2 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d3 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d4 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d5 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d6 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d7 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d8 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [14d9 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [14da 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14db 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14dc 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14dd 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14de 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14df 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e0 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e1 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e2 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e3 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14e4 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [14e5 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e6 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e7 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [14e8 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e9 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ea 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [14eb 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14ec 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [14ed 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16e5 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16e6 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e7 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16e8 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ea 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16eb 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16e9 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16ec 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ef 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ed 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16ee 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16f0 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16f1 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f2 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f3 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [16f4 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16f5 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16f6 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16f7 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [16f8 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16f9 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16fa 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16fb 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16fc 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [16fd 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [16fe 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ff 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1700 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1701 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1702 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1703 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1704 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1705 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 gate 1602702095605284700 evaluation starts +peer0.org2.example.com | [1706 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1707 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1708 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 principal matched by identity 0 +peer0.org2.example.com | [1709 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 97 27 c4 b2 c3 7d 92 12 ef 26 52 31 9c 21 f0 |..'...}...&R1.!.| +peer0.org2.example.com | 00000010 b6 8f 6f 3f 21 3e 8c 78 c0 47 99 1f 52 13 90 f3 |..o?!>.x.G..R...| +peer0.org2.example.com | [170a 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 1d 80 d5 ec 4c 63 e0 e0 5d 50 ff |0D. 6....Lc..]P.| +peer0.org2.example.com | 00000010 8b 3c 03 dd c5 42 2b e3 c2 f7 f8 a8 f5 23 e3 16 |.<...B+......#..| +peer0.org2.example.com | 00000020 e2 42 80 a9 02 20 02 bf 15 e4 c9 60 a3 89 b9 9d |.B... .....`....| +peer0.org2.example.com | 00000030 27 ee fb fa 03 1d d6 6b 4e 72 da 2b 90 51 65 d8 |'......kNr.+.Qe.| +peer0.org2.example.com | 00000040 ff 27 d7 5a b2 49 |.'.Z.I| +peer0.org2.example.com | [170b 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [170c 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ccda0 gate 1602702095605284700 evaluation succeeds +peer0.org2.example.com | [170d 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [170e 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [170f 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1710 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1711 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1712 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1713 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1714 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1715 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1716 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1717 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1718 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1719 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171a 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171b 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171c 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171d 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171e 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [171f 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1720 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1721 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1722 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1723 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1724 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1725 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1726 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1727 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1728 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1729 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [14ee 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [14ef 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1670 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1676 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1678 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1679 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1677 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [167a 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [167b 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [167c 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [167d 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [167e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [167f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1680 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1681 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1682 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1683 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1684 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1685 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1686 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1687 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 gate 1602702090318277900 evaluation starts +peer0.org1.example.com | [1688 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1689 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [168a 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 principal matched by identity 0 +peer0.org1.example.com | [168b 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer0.org1.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer0.org1.example.com | [168c 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer0.org1.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer0.org1.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer0.org1.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer0.org1.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer0.org1.example.com | [168d 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [168e 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 gate 1602702090318277900 evaluation succeeds +peer0.org1.example.com | [168f 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1690 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1691 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1692 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1693 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1694 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1695 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1696 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1697 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1698 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1699 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [169a 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [169b 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [169c 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [169d 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [169e 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [169f 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [16a0 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [16a1 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16a2 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16a3 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16a4 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16a5 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [16a6 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [16a7 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [16a8 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16a9 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16aa 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16ab 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [16ac 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [16ad 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [16ae 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16af 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b0 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16b1 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b2 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [16b3 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 ef 8b 78 10 4b 6b 46 c8 0b 7e 24 6b c4 92 4f |...x.KkF..~$k..O| +peer0.org1.example.com | 00000010 ce 4f 94 3d c1 3c f8 97 d5 f7 a2 d7 cf f2 26 dc |.O.=.<........&.| +peer0.org1.example.com | [16b4 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 1f 75 77 45 e6 a6 05 a0 00 5d 94 |0D. #.uwE.....].| +peer0.org1.example.com | 00000010 a3 56 5a ea 78 70 43 d3 f4 dd 04 ef ea 80 87 45 |.VZ.xpC........E| +peer0.org1.example.com | 00000020 b6 d4 61 e6 02 20 1b f9 e7 95 77 c8 15 bd 43 52 |..a.. ....w...CR| +peer0.org1.example.com | 00000030 03 4e d1 97 3c 32 b9 a4 3d 88 b1 a7 74 d2 d3 fe |.N..<2..=...t...| +peer0.org1.example.com | 00000040 a7 06 57 28 51 0c |..W(Q.| +peer0.org1.example.com | [16b5 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b6 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [16b7 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [16b8 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [16b9 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [16ba 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16bb 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16bc 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16bd 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [16be 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [16bf 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [16c0 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer0.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +orderer0.example.com | "2020-10-14 19:02:25.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.9µs " +peer1.org2.example.com | [1790 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1791 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [14f0 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [16c1 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +orderer0.example.com | "2020-10-14 19:02:26.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b35 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +peer1.org2.example.com | [1792 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1793 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f1 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +orderer0.example.com | "2020-10-14 19:02:26.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b36 Sending msg of 28 bytes to 3 on channel businesschannel took 26.6µs" +peer1.org2.example.com | [1794 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [172a 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f2 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 gate 1602702094170898100 evaluation starts +peer0.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +orderer0.example.com | "2020-10-14 19:02:26.095 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 903.7µs " +peer1.org2.example.com | [1795 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [172b 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [14f3 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +orderer0.example.com | "2020-10-14 19:02:26.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.3µs " +peer1.org2.example.com | [1796 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [172c 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f4 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer0.org1.example.com | [16c2 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-10-14 19:02:26.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b39 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [172d 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [14f5 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 principal matched by identity 0 +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-10-14 19:02:26.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1797 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [172e 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14f6 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org1.example.com | [16c3 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 e9 24 ec 95 ee 6a 72 f5 a6 c6 |0E.!...$...jr...| +orderer0.example.com | "2020-10-14 19:02:26.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1798 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [172f 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1730 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 02 64 cb 61 65 1d 93 d0 1b df ff 11 d5 9e 52 00 |.d.ae.........R.| +orderer0.example.com | "2020-10-14 19:02:26.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +peer1.org2.example.com | [1799 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [1731 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 2f bf c3 25 cf 02 20 22 ab 4d c7 3f 6a 60 56 9c |/..%.. ".M.?j`V.| +peer1.org1.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org1.example.com | 00000030 90 c8 52 ec 05 cf 94 6a af f6 9e 24 fc 75 29 e1 |..R....j...$.u).| +peer1.org1.example.com | [14f7 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org1.example.com | 00000040 b4 ca 6a 6f fb 21 2a |..jo.!*| +orderer0.example.com | "2020-10-14 19:02:26.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407.7µs " +orderer0.example.com | "2020-10-14 19:02:26.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3e Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +peer0.org1.example.com | [16c4 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:26.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +peer0.org1.example.com | [16c5 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [179a 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [179b 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [179c 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-10-14 19:02:26.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +peer0.org1.example.com | [16c6 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [179d 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1732 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +orderer0.example.com | "2020-10-14 19:02:26.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.3µs " +peer0.org1.example.com | [16c7 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [179e 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1733 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +orderer0.example.com | "2020-10-14 19:02:26.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b42 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16c8 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [179f 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1734 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer1.org1.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org1.example.com | [16c9 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17a0 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1735 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14f8 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [16ca 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:26.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b43 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [17a1 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1736 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [16cb 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:26.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b44 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [17a2 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1737 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1738 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [16cc 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | "2020-10-14 19:02:26.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b45 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +peer1.org2.example.com | [17a3 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [173b 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16cd 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14f9 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ef060 gate 1602702094170898100 evaluation succeeds +orderer0.example.com | "2020-10-14 19:02:26.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +peer1.org2.example.com | [17a4 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [16ce 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14fa 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:27.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b47 Sending msg of 28 bytes to 2 on channel businesschannel took 46.2µs" +peer0.org2.example.com | [1739 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [16cf 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14fb 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-10-14 19:02:27.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +peer0.org2.example.com | [173c 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16d0 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [16d1 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [17a5 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:27.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +peer0.org2.example.com | [173d 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [16d2 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17a6 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [17a7 10-14 19:01:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:27.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +peer0.org2.example.com | [173e 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16d3 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a8 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fc 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [14fd 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-10-14 19:02:27.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16d4 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a9 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:27.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [173a 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [16d5 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17aa 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fe 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-10-14 19:02:27.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [16d6 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [17ab 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ff 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-10-14 19:02:27.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4e Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +peer0.org1.example.com | [16d7 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [173f 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [17ac 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1500 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-10-14 19:02:27.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6613ms " +peer0.org1.example.com | [16d8 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [16d9 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17ad 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1501 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-10-14 19:02:27.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b50 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org1.example.com | [16da 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1741 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:27.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b51 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2020-10-14 19:02:27.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +peer1.org2.example.com | [17ae 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1502 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-10-14 19:02:27.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b53 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16db 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1742 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1743 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1503 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16dc 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16dd 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1744 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [16de 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:27.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +peer0.org2.example.com | [1745 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17af 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [16df 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1504 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1740 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e0 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1505 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1746 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17b0 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:27.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b55 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16e1 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1506 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [17b1 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e2 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1507 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17b2 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:27.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b56 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1747 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e3 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1508 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17b3 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:02:27.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b57 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +peer0.org2.example.com | [1748 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e4 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1509 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16e5 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [150a 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16e6 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17b4 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101B +peer0.org2.example.com | [1749 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-10-14 19:02:27.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +peer1.org1.example.com | [150b 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive: alive: alive: +peer0.org1.example.com | [16e7 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17b5 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C369C48152BD9A6215A86B40853616D91F8F07BCE83AC25DAFCB88166D7F0789 +peer0.org2.example.com | [174a 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101B +orderer0.example.com | "2020-10-14 19:02:28.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b59 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +peer1.org1.example.com | [150c 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e8 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [17b6 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [174b 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 25E17AC8CC4A65E1D1437174394E32EA7FBB76C9FB7D922ACAFBCFD65012E4B7 +orderer0.example.com | "2020-10-14 19:02:28.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5a Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +peer1.org1.example.com | [150d 10-14 19:01:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e9 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [17b7 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [174c 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [174d 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-10-14 19:02:28.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +peer0.org1.example.com | [16ea 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [17b8 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [174e 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2020-10-14 19:02:28.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [150e 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [17b9 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16eb 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [174f 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:28.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3689ms " +peer1.org1.example.com | [150f 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [17ba 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16ec 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-10-14 19:02:28.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1510 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17bb 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [16ed 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1750 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:28.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [17bc 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16ee 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [16ef 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16f0 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1511 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f1 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:28.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b60 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2020-10-14 19:02:28.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 656.5µs " +peer0.org1.example.com | [16f2 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:28.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b62 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +peer0.org2.example.com | [1751 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1512 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f3 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17bd 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-10-14 19:02:28.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b63 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +peer0.org2.example.com | [1752 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f4 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17be 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:28.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.7µs " +peer0.org2.example.com | [1753 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1513 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f5 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17bf 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:28.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 266.9µs " +peer0.org2.example.com | [1754 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1514 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f6 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c0 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:28.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b66 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1755 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1515 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16f7 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [16f8 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:28.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b67 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1756 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1516 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [16f9 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [17c1 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:28.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b68 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1758 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1517 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16fa 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c2 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:28.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b69 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +peer0.org2.example.com | [1757 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1518 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16fb 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17c3 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:28.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2020-10-14 19:02:29.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6b Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2020-10-14 19:02:29.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6c Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +peer0.org1.example.com | [16fc 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [17c4 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:29.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.5µs " +peer0.org2.example.com | [1759 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16fd 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1519 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [17c5 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:29.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " +peer0.org2.example.com | [175a 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [16fe 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [151b 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c6 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:29.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b6f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [175b 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16ff 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [151a 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17c7 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:29.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b70 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [175d 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1700 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101A +peer1.org1.example.com | [151c 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [17c8 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:29.485 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b71 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1701 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B108B4C839D3C53F0EC923ADE42BCC48BD2CE843826ED19BC71E48B18A96E02A +peer1.org1.example.com | [151e 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [17c9 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:29.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b72 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +peer0.org2.example.com | [175c 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1702 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [151d 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [17ca 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [175e 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1703 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1704 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [151f 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-10-14 19:02:29.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.9µs " +peer0.org2.example.com | [175f 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org1.example.com | [1705 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [17cb 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1521 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-10-14 19:02:29.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b74 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +peer0.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org1.example.com | [1706 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [17cc 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1524 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:29.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b75 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +peer0.org2.example.com | [1760 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org1.example.com | [1707 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101B +peer1.org2.example.com | [17cd 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1525 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-10-14 19:02:29.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 549.7µs " +peer0.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org1.example.com | [1708 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FAD4DD0C43D359566A73985AD3AA0C5E46E734CC958E6E0420679248075370AF +peer0.org1.example.com | [1709 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [17ce 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +orderer0.example.com | "2020-10-14 19:02:29.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.6µs " +orderer0.example.com | "2020-10-14 19:02:29.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b78 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [170a 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer1.org1.example.com | [1526 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-10-14 19:02:29.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b79 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [170b 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org2.example.com | [17cf 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org1.example.com | [1522 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:29.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [170c 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org1.example.com | [1523 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:29.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7b Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +peer0.org1.example.com | [170d 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org1.example.com | [1520 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-10-14 19:02:29.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +peer0.org1.example.com | [170e 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org1.example.com | [1527 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [170f 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org2.example.com | [1761 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | "2020-10-14 19:02:30.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 2 on channel businesschannel took 33.9µs" +peer0.org1.example.com | [1710 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1711 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1712 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:30.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7e Sending msg of 28 bytes to 3 on channel businesschannel took 71.7µs" +peer0.org1.example.com | [1713 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1715 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1716 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1528 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-10-14 19:02:30.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223µs " +peer0.org1.example.com | [1718 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1717 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1719 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [171a 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [171b 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [171c 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [171d 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [171e 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1714 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [171f 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1720 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1721 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1722 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1723 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1724 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1725 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1726 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1727 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1728 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer0.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer0.org1.example.com | [1729 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [172a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [172b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer0.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer0.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer0.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer0.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org1.example.com | [172c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [172d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 28 97 f0 36 6e 0e a8 34 07 1a |0E.!..(..6n..4..| +peer0.org1.example.com | 00000010 a7 a2 f0 1d 8a 51 ed 86 f0 f6 87 84 21 0e 99 05 |.....Q......!...| +peer0.org1.example.com | 00000020 7b e9 9e 1e 05 02 20 18 16 95 b2 41 ca 6d a2 6b |{..... ....A.m.k| +peer0.org1.example.com | 00000030 2e e6 65 f9 c3 42 f0 0e ac b9 15 5e 4b db 30 a8 |..e..B.....^K.0.| +peer0.org1.example.com | 00000040 2e 2e d9 20 2d 88 7f |... -..| +peer0.org1.example.com | [172e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [172f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1730 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1731 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1732 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1733 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1734 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1735 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer0.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer0.org1.example.com | [1736 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer0.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer0.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer0.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer0.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org1.example.com | [1737 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1738 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1739 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [173b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1529 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152a 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152b 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [152c 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 gate 1602702094301365900 evaluation starts +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [173c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [173d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [173e 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [173f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1740 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1741 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1742 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 gate 1602702090626140500 evaluation starts +peer0.org1.example.com | [1743 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1744 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1745 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 principal matched by identity 0 +peer0.org1.example.com | [1746 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +peer0.org1.example.com | 00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +peer0.org1.example.com | [1747 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +peer0.org1.example.com | 00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +peer0.org1.example.com | 00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +peer0.org1.example.com | 00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +peer0.org1.example.com | 00000040 69 89 86 06 4d ff |i...M.| +peer0.org1.example.com | [1748 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1749 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [174a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [174b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 gate 1602702090626140500 evaluation succeeds +peer0.org1.example.com | [174c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [174d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [174e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [174f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1750 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1751 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1752 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1753 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1754 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer0.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer0.org1.example.com | [1755 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer0.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer0.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer0.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer0.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer0.org1.example.com | [1756 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1757 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1758 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1759 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [175a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [175b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [175c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [175d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [175e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +peer0.org1.example.com | 00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +peer0.org1.example.com | [175f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +peer0.org1.example.com | 00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +peer0.org1.example.com | 00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +peer0.org1.example.com | 00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +peer0.org1.example.com | 00000040 d6 85 60 02 c6 cb 97 |..`....| +peer0.org1.example.com | [1760 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1761 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1762 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1763 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1764 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1765 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1766 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1767 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1768 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1769 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [176a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [176b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [176c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [176d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 gate 1602702090638488700 evaluation starts +peer0.org1.example.com | [176e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [176f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1770 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 principal matched by identity 0 +peer0.org1.example.com | [1771 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +peer0.org1.example.com | 00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +peer0.org1.example.com | [1772 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +peer0.org1.example.com | 00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +peer0.org1.example.com | 00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +peer0.org1.example.com | 00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +peer0.org1.example.com | 00000040 26 28 d0 1f 02 fb 98 |&(.....| +peer0.org1.example.com | [1773 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1774 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 gate 1602702090638488700 evaluation succeeds +peer0.org1.example.com | [1775 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1776 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1777 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17d0 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17d1 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17d2 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [17d3 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org2.example.com | [17d4 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer1.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org2.example.com | [17d5 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17d6 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17d7 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17d8 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17d9 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [17da 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [17db 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17dc 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [17dd 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [17de 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org2.example.com | [17df 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer1.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org2.example.com | [17e0 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [17e1 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 60 76 32 55 b8 3d 74 d8 00 90 |0E.!..`v2U.=t...| +peer1.org2.example.com | 00000010 3f 6c a5 4c 4c f8 c2 26 6f 03 1e a2 b7 d7 17 5b |?l.LL..&o......[| +peer1.org2.example.com | 00000020 e6 0b 8f 4b 6a 02 20 56 d7 62 7e 0f bc 76 52 02 |...Kj. V.b~..vR.| +peer1.org2.example.com | 00000030 6e 85 02 28 49 7a c0 a1 1d bb 87 f9 6d b9 5a 9c |n..(Iz......m.Z.| +peer1.org2.example.com | 00000040 af 51 1c f3 25 07 75 |.Q..%.u| +peer1.org2.example.com | [17e2 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [17e3 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [17e4 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17e5 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17e6 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [17e7 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [17e8 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17e9 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [17ea 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [17eb 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer1.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer1.org2.example.com | [17ec 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org2.example.com | [17ed 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17ee 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17ef 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [17f0 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org2.example.com | [17f1 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer1.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org2.example.com | [17f2 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17f3 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17f4 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f5 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f6 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f7 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f8 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [17f9 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fa 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fb 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fc 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fd 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fe 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17ff 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1800 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1801 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1762 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce a0 cf 5e 81 0b 65 4a d7 7d 5a |0E.!....^..eJ.}Z| +peer0.org2.example.com | 00000010 8a 95 e9 8b e2 f6 69 dc 51 d3 49 ab 5b 64 aa f4 |......i.Q.I.[d..| +peer0.org2.example.com | 00000020 2b 97 8a 69 ef 02 20 77 d9 43 f2 f5 43 98 7e 14 |+..i.. w.C..C.~.| +peer0.org2.example.com | 00000030 76 93 bd 4c e6 4c 56 6a 9b b7 24 9e 1a 1f ca 51 |v..L.LVj..$....Q| +peer0.org2.example.com | 00000040 d1 a8 06 63 4e 73 18 |...cNs.| +peer0.org2.example.com | [1763 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1764 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1765 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1766 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1767 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1768 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [176a 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1769 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [176b 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org2.example.com | [176c 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer0.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer0.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org2.example.com | [176d 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [176e 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [176f 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1770 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1771 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1772 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1773 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1774 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org2.example.com | [1775 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer0.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer0.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org2.example.com | [1776 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1777 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1778 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1779 10-14 19:01:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [177a 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [177b 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [177c 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [177d 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [177e 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [177f 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1780 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1781 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1802 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1803 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1804 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1805 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1806 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1807 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1808 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1809 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [180a 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [180b 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [180c 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [180d 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 gate 1602702098453766200 evaluation starts +peer1.org2.example.com | [180e 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [180f 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1810 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1811 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 principal evaluation fails +peer1.org2.example.com | [1812 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004003bb0 gate 1602702098453766200 evaluation fails +peer1.org2.example.com | [1813 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1814 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1815 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1816 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 gate 1602702098460198600 evaluation starts +peer1.org2.example.com | [1817 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1818 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1819 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 principal matched by identity 0 +peer1.org2.example.com | [181a 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org2.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org2.example.com | [181b 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org2.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org2.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org2.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org2.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org2.example.com | [181c 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [181d 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00402c120 gate 1602702098460198600 evaluation succeeds +peer1.org2.example.com | [181e 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [181f 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1820 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1821 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1822 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1823 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1824 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1825 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1826 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1827 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1828 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1829 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [182a 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [182b 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182c 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182d 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [182e 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [182f 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1830 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1831 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1832 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1833 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1834 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1835 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1836 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1837 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1838 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1839 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [183a 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [183b 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183c 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [183d 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183e 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [183f 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1840 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1841 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1842 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1843 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1844 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1845 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1846 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1847 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 gate 1602702098611202500 evaluation starts +peer1.org2.example.com | [1848 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1849 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [184a 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [184b 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 principal evaluation fails +peer1.org2.example.com | [184c 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff3ff0 gate 1602702098611202500 evaluation fails +peer1.org2.example.com | [184d 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [184e 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [184f 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1850 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 gate 1602702098615463700 evaluation starts +peer1.org2.example.com | [1851 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1852 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1853 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 principal matched by identity 0 +peer1.org2.example.com | [1854 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer1.org2.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer1.org2.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer1.org2.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer1.org2.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer1.org2.example.com | [1856 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1857 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004056560 gate 1602702098615463700 evaluation succeeds +peer1.org2.example.com | [1858 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1859 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [185a 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [185b 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [185c 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [185d 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [185e 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [185f 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1860 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1861 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1862 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1863 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1864 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1865 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1866 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1867 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1868 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1869 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [186a 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1778 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1779 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [177a 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [177b 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [177c 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer0.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer0.org1.example.com | [177d 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer0.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer0.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer0.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer0.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org1.example.com | [177e 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [177f 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1780 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1781 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1782 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1783 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1784 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1785 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1786 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1787 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1788 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1789 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 c2 4e 93 61 87 9b 8d f7 89 8f 1e 38 65 f3 24 |..N.a.......8e.$| +peer0.org1.example.com | 00000010 3d bb 3f fd fe b6 4f 2a be 2b fe 06 28 da c0 85 |=.?...O*.+..(...| +peer0.org1.example.com | [178a 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 1f b1 8b d5 1d 00 83 55 92 31 |0D. P........U.1| +peer0.org1.example.com | 00000010 06 c3 14 37 e3 e4 37 a8 0f 26 28 af 4d 97 b5 fb |...7..7..&(.M...| +peer0.org1.example.com | 00000020 d7 ff 6e 87 02 20 47 0c 33 3c 5d 6e 2d 53 a6 81 |..n.. G.3<]n-S..| +peer0.org1.example.com | 00000030 af 3a 5c 7a 68 ad 21 51 a9 b4 c4 91 79 5d 45 13 |.:\zh.!Q....y]E.| +peer0.org1.example.com | 00000040 06 5b 56 b9 8c b5 |.[V...| +peer0.org1.example.com | [178b 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [178c 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178d 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178e 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [178f 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [1790 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1791 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1792 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1793 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1794 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1795 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1796 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1797 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1798 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1799 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [179a 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [179c 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [179d 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [179e 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +orderer0.example.com | "2020-10-14 19:02:30.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +orderer0.example.com | "2020-10-14 19:02:30.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b81 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b82 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b84 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +orderer0.example.com | "2020-10-14 19:02:30.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1634ms " +orderer0.example.com | "2020-10-14 19:02:30.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b86 Sending msg of 28 bytes to 2 on channel businesschannel took 54.3µs" +orderer0.example.com | "2020-10-14 19:02:30.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b87 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2020-10-14 19:02:30.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.3µs " +orderer0.example.com | "2020-10-14 19:02:30.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.2µs " +orderer0.example.com | "2020-10-14 19:02:30.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:30.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8d Sending msg of 28 bytes to 3 on channel testchainid took 39.6µs" +orderer0.example.com | "2020-10-14 19:02:30.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +orderer0.example.com | "2020-10-14 19:02:31.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8f Sending msg of 28 bytes to 2 on channel businesschannel took 51.1µs" +orderer0.example.com | "2020-10-14 19:02:31.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.9µs " +orderer0.example.com | "2020-10-14 19:02:31.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b91 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +orderer0.example.com | "2020-10-14 19:02:31.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b92 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7417ms " +orderer0.example.com | "2020-10-14 19:02:31.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b94 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b95 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b96 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2020-10-14 19:02:31.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.7µs " +orderer0.example.com | "2020-10-14 19:02:31.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2020-10-14 19:02:31.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b99 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-10-14 19:02:31.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +orderer0.example.com | "2020-10-14 19:02:31.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.3µs " +orderer0.example.com | "2020-10-14 19:02:31.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:31.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9f Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +orderer0.example.com | "2020-10-14 19:02:31.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.5µs " +orderer0.example.com | "2020-10-14 19:02:32.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba1 Sending msg of 28 bytes to 2 on channel businesschannel took 48.8µs" +orderer0.example.com | "2020-10-14 19:02:32.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba2 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +orderer0.example.com | "2020-10-14 19:02:32.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +orderer0.example.com | "2020-10-14 19:02:32.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.5µs " +orderer0.example.com | "2020-10-14 19:02:32.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [179b 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [179f 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [17a0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [17a1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17a2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17a3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17a4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17a5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17a6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17a7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17a8 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17a9 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 gate 1602702093933031400 evaluation starts +peer0.org1.example.com | [17aa 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17ab 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [17ac 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 principal matched by identity 0 +peer0.org1.example.com | [17ad 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [17ae 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [17af 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17b0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 gate 1602702093933031400 evaluation succeeds +peer0.org1.example.com | [17b1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17b2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17b3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17b4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17b5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [186b 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [186c 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [186d 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [186e 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [186f 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1870 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1871 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1872 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1873 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1874 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1875 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1876 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1877 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1878 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1879 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610081801 +peer1.org2.example.com | [187a 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20A4CDE47A35D0476F3782807813F8B03450C90AAAACDB986450831B947DC73F +peer1.org2.example.com | [187b 10-14 19:01:38.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [187c 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [187d 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [187e 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [187f 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1880 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1881 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1882 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1883 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [1884 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1885 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1886 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1887 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1888 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1889 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [188a 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [188b 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [188c 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [188d 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [188e 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [188f 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1890 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1891 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1892 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1893 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1894 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1895 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1896 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1897 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1898 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1899 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [189a 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 gate 1602702098957187000 evaluation starts +peer1.org2.example.com | [189b 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [189c 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [189d 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [189e 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 principal evaluation fails +peer1.org2.example.com | [189f 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409a570 gate 1602702098957187000 evaluation fails +peer1.org2.example.com | [18a0 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18a1 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18a2 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [18a3 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 gate 1602702098962204600 evaluation starts +peer1.org2.example.com | [18a4 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18a5 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18a6 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 principal matched by identity 0 +peer1.org2.example.com | [18a7 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [18a8 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [18a9 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [18aa 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409aae0 gate 1602702098962204600 evaluation succeeds +peer1.org2.example.com | [18ab 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18ac 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18ad 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18ae 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18af 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b0 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b1 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18b2 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18b3 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18b4 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18b5 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18b6 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18b7 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 gate 1602702098964796500 evaluation starts +peer1.org2.example.com | [18b8 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18b9 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18ba 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [18bb 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 principal evaluation fails +peer1.org2.example.com | [18bc 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409bce0 gate 1602702098964796500 evaluation fails +peer1.org2.example.com | [18bd 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18be 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18bf 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [18c0 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 gate 1602702098965227600 evaluation starts +peer1.org2.example.com | [18c1 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18c2 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18c3 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 principal matched by identity 0 +peer1.org2.example.com | [18c4 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [18c5 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [18c6 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [18c7 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040b2250 gate 1602702098965227600 evaluation succeeds +peer1.org2.example.com | [18c8 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18c9 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18ca 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18cb 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18cc 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [18cd 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [18ce 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [18cf 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [18d0 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18d1 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [18d2 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18d3 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18d4 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18d5 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18d6 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18d7 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18d8 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18d9 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18da 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [152d 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [152e 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [152f 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 principal matched by identity 0 +peer1.org1.example.com | [1530 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer1.org1.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer1.org1.example.com | [1531 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer1.org1.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer1.org1.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer1.org1.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer1.org1.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer1.org1.example.com | [1532 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1533 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1534 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042250b0 gate 1602702094301365900 evaluation succeeds +peer1.org1.example.com | [1535 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1536 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1537 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1538 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1539 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [153a 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [153b 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [153c 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [153d 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [153e 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [153f 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1540 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1541 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1542 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1543 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1544 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1545 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1546 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1547 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [154a 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1549 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1548 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [154b 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [18db 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 gate 1602702098975078800 evaluation starts +peer1.org2.example.com | [18dc 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18dd 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18de 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [18df 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 principal evaluation fails +peer1.org2.example.com | [18e0 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce480 gate 1602702098975078800 evaluation fails +peer1.org2.example.com | [18e1 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18e2 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18e3 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [18e4 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 gate 1602702098976869100 evaluation starts +peer1.org2.example.com | [18e5 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18e6 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18e7 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 principal matched by identity 0 +orderer0.example.com | "2020-10-14 19:02:32.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:32.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:32.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba8 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2020-10-14 19:02:32.483 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +orderer0.example.com | "2020-10-14 19:02:32.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1baa Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2020-10-14 19:02:32.591 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bab Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2020-10-14 19:02:32.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.4µs " +orderer0.example.com | "2020-10-14 19:02:32.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +orderer0.example.com | "2020-10-14 19:02:32.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bae Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:32.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1baf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:32.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:32.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb1 Sending msg of 28 bytes to 3 on channel testchainid took 33.9µs" +orderer0.example.com | "2020-10-14 19:02:32.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.6µs " +orderer0.example.com | "2020-10-14 19:02:33.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb3 Sending msg of 28 bytes to 2 on channel businesschannel took 21.7µs" +orderer0.example.com | "2020-10-14 19:02:33.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.4µs " +orderer0.example.com | "2020-10-14 19:02:33.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bb5 Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-10-14 19:02:33.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257.7µs " +orderer0.example.com | "2020-10-14 19:02:33.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bb9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bba Sending msg of 28 bytes to 3 on channel testchainid took 20µs" +orderer0.example.com | "2020-10-14 19:02:33.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 537.8µs " +orderer0.example.com | "2020-10-14 19:02:33.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbc Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2020-10-14 19:02:33.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bbd Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-10-14 19:02:33.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +orderer0.example.com | "2020-10-14 19:02:33.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bbf Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.7µs " +orderer0.example.com | "2020-10-14 19:02:33.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:33.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc3 Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +orderer0.example.com | "2020-10-14 19:02:33.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +orderer0.example.com | "2020-10-14 19:02:34.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc5 Sending msg of 28 bytes to 3 on channel businesschannel took 39.2µs" +orderer0.example.com | "2020-10-14 19:02:34.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bc6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2020-10-14 19:02:34.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +orderer0.example.com | "2020-10-14 19:02:34.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bc8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 965.1µs " +orderer0.example.com | "2020-10-14 19:02:34.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bc9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:34.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bca Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:34.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bcb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [154d 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > alive: alive: alive: +peer1.org1.example.com | [154c 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [154e 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1551 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [154f 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1550 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1552 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1553 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1554 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1555 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1556 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 gate 1602702094326954500 evaluation starts +peer1.org1.example.com | [1557 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1558 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1559 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 principal matched by identity 0 +peer1.org1.example.com | [155a 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [155b 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [155c 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [155d 10-14 19:01:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004288920 gate 1602702094326954500 evaluation succeeds +peer1.org1.example.com | [155e 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [155f 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1560 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1561 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1562 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1563 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17b8 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17b9 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17ba 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17bb 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17bc 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17bd 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 gate 1602702093938388900 evaluation starts +peer0.org1.example.com | [17be 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17bf 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [17c0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 principal matched by identity 0 +peer0.org1.example.com | [17c1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [17c2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [17c3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17c4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 gate 1602702093938388900 evaluation succeeds +peer0.org1.example.com | [17c5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17c6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17c7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17c8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17c9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17ca 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [17cb 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17cc 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [17cd 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [17ce 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17cf 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1782 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1783 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1784 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1785 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1786 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1787 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer0.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer0.org2.example.com | [1788 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer0.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer0.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer0.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer0.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer0.org2.example.com | [1789 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [178a 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 60 76 32 55 b8 3d 74 d8 00 90 |0E.!..`v2U.=t...| +peer0.org2.example.com | 00000010 3f 6c a5 4c 4c f8 c2 26 6f 03 1e a2 b7 d7 17 5b |?l.LL..&o......[| +peer0.org2.example.com | 00000020 e6 0b 8f 4b 6a 02 20 56 d7 62 7e 0f bc 76 52 02 |...Kj. V.b~..vR.| +peer0.org2.example.com | 00000030 6e 85 02 28 49 7a c0 a1 1d bb 87 f9 6d b9 5a 9c |n..(Iz......m.Z.| +peer0.org2.example.com | 00000040 af 51 1c f3 25 07 75 |.Q..%.u| +peer0.org2.example.com | [178b 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [178c 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [178d 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [178e 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [178f 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1790 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1791 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1792 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1793 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1794 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1795 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1796 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1797 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1798 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1564 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1565 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1567 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1568 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1566 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1569 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [156b 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [156c 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 gate 1602702094336744500 evaluation starts +peer1.org1.example.com | [156d 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [156e 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [156f 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 principal matched by identity 0 +peer1.org1.example.com | [1570 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1571 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1572 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1573 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042845b0 gate 1602702094336744500 evaluation succeeds +peer1.org1.example.com | [1574 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1575 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1576 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1577 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1578 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1579 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [156a 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157a 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [157b 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [157c 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157d 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [157e 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157f 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1580 10-14 19:01:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1581 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1582 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1583 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1584 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1585 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1586 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1587 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1588 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1589 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [158a 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [158b 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [158c 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [158d 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [158e 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [158f 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1590 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 gate 1602702094355861300 evaluation starts +peer1.org1.example.com | [1591 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1592 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1593 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 principal matched by identity 0 +peer1.org1.example.com | [1594 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1595 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1596 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1597 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042beed0 gate 1602702094355861300 evaluation succeeds +peer1.org1.example.com | [1598 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1599 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [159a 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [159b 10-14 19:01:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [159c 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [159d 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [159e 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [159f 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15a0 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15a1 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [15a2 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [15a3 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15a4 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 gate 1602702094365396500 evaluation starts +peer1.org1.example.com | [15a5 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15a6 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [15a7 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 principal matched by identity 0 +peer1.org1.example.com | [15a8 10-14 19:01:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [15a9 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [15aa 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15ab 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d60d0 gate 1602702094365396500 evaluation succeeds +peer1.org1.example.com | [15ac 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15ad 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15ae 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15af 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15b0 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15b1 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b2 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [15b3 10-14 19:01:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [15b4 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +orderer0.example.com | "2020-10-14 19:02:34.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bcc Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +orderer0.example.com | "2020-10-14 19:02:34.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bcd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.7µs " +orderer0.example.com | "2020-10-14 19:02:34.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bce Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +orderer0.example.com | "2020-10-14 19:02:34.610 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bcf Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2020-10-14 19:02:34.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.3µs " +orderer0.example.com | "2020-10-14 19:02:34.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.3µs " +orderer0.example.com | "2020-10-14 19:02:34.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-10-14 19:02:34.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [18e8 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [18e9 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [18ea 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [18eb 10-14 19:01:38.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040ce9f0 gate 1602702098976869100 evaluation succeeds +peer1.org2.example.com | [18ec 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18ed 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [18ee 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18ef 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18f0 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18f1 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18f2 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18f3 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18f4 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18f5 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18f6 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18f7 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18f8 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 gate 1602702098985920200 evaluation starts +peer1.org2.example.com | [18f9 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18fa 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [18fb 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [18fc 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 principal evaluation fails +peer1.org2.example.com | [18fd 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18fe 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ff 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1900 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1901 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1902 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1903 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1904 10-14 19:01:38.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1906 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1905 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cfbf0 gate 1602702098985920200 evaluation fails +peer1.org2.example.com | [1907 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1908 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1909 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [190a 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 gate 1602702098995881900 evaluation starts +peer0.org1.example.com | [17d0 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17d2 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17d3 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17d4 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17d5 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17d1 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17d6 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17d7 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17d8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 gate 1602702093947397300 evaluation starts +peer0.org1.example.com | [17d9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17da 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [17db 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 principal matched by identity 0 +peer0.org1.example.com | [17dc 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [17de 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17df 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17e0 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17e1 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [17e2 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17dd 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [17e3 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [17e4 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17e5 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 gate 1602702093947397300 evaluation succeeds +peer0.org1.example.com | [17e6 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17e7 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17e8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17e9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17ea 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17eb 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17ec 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17ed 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17ee 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17ef 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17f0 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17f1 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17f2 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 gate 1602702093954590100 evaluation starts +peer0.org1.example.com | [17f3 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1799 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [179a 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [179b 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [179c 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [179d 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [179e 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [179f 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a0 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a1 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a2 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [17a3 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17a4 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17a5 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17a6 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17a7 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [17a8 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a9 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17aa 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17ab 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17ac 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [17ad 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17ae 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [17af 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 gate 1602702098460849600 evaluation starts +peer0.org2.example.com | [17b0 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17b1 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [17b2 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 principal matched by identity 0 +peer0.org2.example.com | [17b3 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer0.org2.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer0.org2.example.com | [17b4 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer0.org2.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer0.org2.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer0.org2.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer0.org2.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org2.example.com | [190b 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [190c 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [190d 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 principal matched by identity 0 +peer1.org2.example.com | [190e 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [190f 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1910 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1911 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f4160 gate 1602702098995881900 evaluation succeeds +peer1.org2.example.com | [1912 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1913 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1914 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1915 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1916 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1917 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1918 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1919 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [191a 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [191b 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [191c 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [191d 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [191e 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [191f 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1920 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1921 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1922 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1923 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1924 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 gate 1602702099001268300 evaluation starts +peer1.org2.example.com | [1925 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1926 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1927 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1928 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 principal evaluation fails +peer1.org2.example.com | [1929 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041102e0 gate 1602702099001268300 evaluation fails +peer1.org2.example.com | [192a 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [192b 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [192c 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [192d 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 gate 1602702099002623800 evaluation starts +peer1.org2.example.com | [192e 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [192f 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1930 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 principal matched by identity 0 +peer1.org2.example.com | [1931 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1932 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1933 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1934 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004110850 gate 1602702099002623800 evaluation succeeds +peer1.org2.example.com | [1935 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1936 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1937 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1938 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1939 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [193a 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [193b 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [193c 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [193d 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [193e 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [193f 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1940 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1941 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 gate 1602702099008502000 evaluation starts +peer1.org2.example.com | [1942 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1943 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1944 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1945 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 principal evaluation fails +peer1.org2.example.com | [1946 10-14 19:01:39.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111a50 gate 1602702099008502000 evaluation fails +peer0.org1.example.com | [17f4 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [17f5 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 principal matched by identity 0 +peer0.org1.example.com | [17f6 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [17f7 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [17f8 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17f9 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 gate 1602702093954590100 evaluation succeeds +peer0.org1.example.com | [17fa 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17fb 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17fc 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17fd 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17fe 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [17ff 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1800 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1801 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1802 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1803 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1804 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1805 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1806 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1807 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1808 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1809 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [180a 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [180b 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [180c 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [180d 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [15b5 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [15b6 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b7 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15b8 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15b9 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [180e 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 gate 1602702093967345300 evaluation starts +peer0.org1.example.com | [180f 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1810 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1811 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 principal matched by identity 0 +peer0.org1.example.com | [1812 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1813 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1814 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1815 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 gate 1602702093967345300 evaluation succeeds +peer0.org1.example.com | [1816 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1817 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1818 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1819 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [181a 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [181b 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [181c 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [181d 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [181e 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [181f 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1820 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1821 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1822 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 gate 1602702093970568300 evaluation starts +peer0.org1.example.com | [1823 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1824 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1825 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 principal matched by identity 0 +peer0.org1.example.com | [1826 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1827 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1828 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1829 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 gate 1602702093970568300 evaluation succeeds +peer0.org1.example.com | [182a 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [182b 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [182c 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [182d 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [182e 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ba 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15bb 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [15bc 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [15bd 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15be 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 gate 1602702094383695000 evaluation starts +peer1.org1.example.com | [15bf 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15c0 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [15c1 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 principal matched by identity 0 +peer1.org1.example.com | [15c2 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [15c3 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [15c4 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15c5 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fa250 gate 1602702094383695000 evaluation succeeds +peer1.org1.example.com | [15c6 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15c7 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15c8 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15c9 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15ca 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15cb 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15cc 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15cd 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15ce 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15cf 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [15d0 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [15d1 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15d2 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 gate 1602702094384910700 evaluation starts +peer1.org1.example.com | [15d3 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15d4 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [15d5 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 principal matched by identity 0 +peer1.org1.example.com | [15d6 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [15d7 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [15d8 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [15d9 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fb450 gate 1602702094384910700 evaluation succeeds +peer1.org1.example.com | [15da 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15db 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15dc 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15dd 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15de 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15df 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e0 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e1 10-14 19:01:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e2 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [15e3 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [15e4 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [15e5 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [15e6 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15e7 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [15e9 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [15ea 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15eb 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ec 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ed 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e8 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ee 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [15ef 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f1 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f2 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f3 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f4 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f0 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f5 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f6 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f7 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f8 10-14 19:01:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15f9 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [15fa 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161020 +peer1.org1.example.com | [15fb 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FE2677D11FF4D6891BF676B35EDE9AEAF101550E5720A112AD676CBCBA93F60 +peer1.org1.example.com | [15fc 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [15fd 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [15fe 10-14 19:01:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [15ff 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1600 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1601 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1602 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1604 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1606 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1603 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1605 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1609 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1607 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1608 10-14 19:01:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [160a 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [160b 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [160c 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17b5 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17b6 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004265c60 gate 1602702098460849600 evaluation succeeds +peer0.org2.example.com | [17b7 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17b8 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17b9 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17ba 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17bb 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [17bc 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [17bd 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [17be 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [17bf 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [17c0 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c1 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c2 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c3 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [17c4 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17c5 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17c6 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17c7 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17c8 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [17c9 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [17ca 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17cb 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [17cc 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [17cd 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17ce 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17cf 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d0 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d1 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d2 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d3 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [17d4 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17d5 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1947 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1948 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1949 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [194a 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 gate 1602702099010437400 evaluation starts +peer1.org2.example.com | [194b 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [194c 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [194d 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 principal matched by identity 0 +peer1.org2.example.com | [194e 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [194f 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1950 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1951 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004111fc0 gate 1602702099010437400 evaluation succeeds +peer1.org2.example.com | [1952 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1953 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1954 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1955 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1956 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1957 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1958 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1959 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [195a 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [195b 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [195c 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [195d 10-14 19:01:39.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [195e 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [195f 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1960 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org2.example.com | [1961 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1962 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [1963 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [1964 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1965 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1966 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160d 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [160e 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [160f 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer1.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer1.org1.example.com | [1610 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer1.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer1.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer1.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer1.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer0.org1.example.com | [182f 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1830 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1831 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1832 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1833 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1834 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1835 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1836 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1837 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1838 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1839 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [183a 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [183b 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [183c 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [183d 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [183e 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [183f 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1840 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1841 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1842 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1843 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1844 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1845 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1846 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1847 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17d6 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17d7 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17d8 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [17d9 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17da 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17db 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17dc 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17dd 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [17de 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17df 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [17e0 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 gate 1602702098608715800 evaluation starts +peer0.org2.example.com | [17e1 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17e2 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [17e3 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 principal matched by identity 0 +peer0.org2.example.com | [17e4 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer0.org2.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer0.org2.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer0.org2.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer0.org2.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer0.org2.example.com | [17e6 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17e7 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b0320 gate 1602702098608715800 evaluation succeeds +peer0.org2.example.com | [17e8 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17e9 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [17ea 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17eb 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17ec 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [17ed 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [17ee 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [17ef 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1611 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1612 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1613 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1614 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1615 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1616 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1617 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1618 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1619 10-14 19:01:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [161b 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [161a 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [161c 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 gate 1602702094469567900 evaluation starts +peer1.org1.example.com | [161d 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [161e 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [161f 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1620 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 principal matched by identity 0 +peer1.org1.example.com | [1621 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer1.org1.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer1.org1.example.com | [1622 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer1.org1.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer1.org1.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer1.org1.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer1.org1.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer1.org1.example.com | [1623 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1624 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b9dd0 gate 1602702094469567900 evaluation succeeds +peer1.org1.example.com | [1625 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1626 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1627 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1628 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1629 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [162a 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [162b 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [162c 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer1.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer1.org1.example.com | [162d 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer1.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer1.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer1.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer1.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer1.org1.example.com | [162e 10-14 19:01:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [162f 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1630 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1631 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1632 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1634 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1633 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1635 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer1.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer1.org1.example.com | [1636 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer1.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer1.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer1.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer1.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer1.org1.example.com | [1637 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1638 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1639 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 6e 1b c7 30 05 a1 93 b2 ce bd |0E.!..n..0......| +peer1.org1.example.com | 00000010 e4 41 4c e3 40 fd 38 23 80 d5 4d 45 41 f1 27 98 |.AL.@.8#..MEA.'.| +peer1.org1.example.com | 00000020 dc 01 92 24 f3 02 20 19 37 b8 b1 ec 42 14 23 22 |...$.. .7...B.#"| +peer1.org1.example.com | 00000030 ab 06 bc ca 86 ee 98 05 8d bf 58 65 b2 13 e4 41 |..........Xe...A| +peer1.org1.example.com | 00000040 4f 8e 7c 2b 7a 63 73 |O.|+zcs| +peer1.org1.example.com | [163a 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [163b 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [163c 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163d 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163e 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [163f 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1640 10-14 19:01:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1641 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +peer1.org1.example.com | 00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +peer1.org1.example.com | [1642 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +peer1.org1.example.com | 00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +peer1.org1.example.com | 00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +peer1.org1.example.com | 00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +peer1.org1.example.com | 00000040 8d e2 30 72 bd 47 fd |..0r.G.| +peer1.org1.example.com | [1643 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1644 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1645 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1646 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer1.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer1.org1.example.com | [1647 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer1.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer1.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer1.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer1.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer1.org1.example.com | [1648 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1649 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [164a 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [164b 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [164c 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [164d 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [164e 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [164f 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1650 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1651 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1652 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1653 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 gate 1602702094497182500 evaluation starts +peer1.org1.example.com | [1654 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1655 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1848 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1849 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1602702094171750200 evaluation starts +peer0.org1.example.com | [184a 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [184b 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [184c 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal matched by identity 0 +peer0.org1.example.com | [184d 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org1.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org1.example.com | [184e 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org1.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer0.org1.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer0.org1.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer0.org1.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org1.example.com | [184f 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1850 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1602702094171750200 evaluation succeeds +peer0.org1.example.com | [1851 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1852 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1853 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1854 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1855 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1856 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1857 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1858 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1859 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [185a 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185b 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185c 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [185d 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [185e 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [185f 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1860 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1861 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1862 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1863 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1864 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1865 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1866 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1867 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1868 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1869 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186a 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186b 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186c 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186d 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186e 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [186f 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1870 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1871 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1872 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1873 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1874 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1875 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1876 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1877 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1878 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1879 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [187a 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [187b 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [187c 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 gate 1602702094294460400 evaluation starts +peer0.org1.example.com | [187d 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [187e 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [187f 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 principal matched by identity 0 +peer0.org1.example.com | [1880 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer0.org1.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer0.org1.example.com | [1881 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer0.org1.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer0.org1.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer0.org1.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer0.org1.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer0.org1.example.com | [1882 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1883 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 gate 1602702094294460400 evaluation succeeds +peer0.org1.example.com | [1884 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1885 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1886 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1887 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1888 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1889 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [188a 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [188b 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [188c 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [188d 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [188e 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [188f 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1890 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1891 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1892 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1893 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1894 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1895 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1896 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1897 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1898 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1899 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [189a 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [189b 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [189c 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [189d 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [189e 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [189f 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a0 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a1 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a2 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [18a3 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a4 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a5 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a6 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a7 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [18a8 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer0.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer0.org1.example.com | [18a9 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer0.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer0.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer0.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer0.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer0.org1.example.com | [18aa 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [18ab 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 6e 1b c7 30 05 a1 93 b2 ce bd |0E.!..n..0......| +peer0.org1.example.com | 00000010 e4 41 4c e3 40 fd 38 23 80 d5 4d 45 41 f1 27 98 |.AL.@.8#..MEA.'.| +peer0.org1.example.com | 00000020 dc 01 92 24 f3 02 20 19 37 b8 b1 ec 42 14 23 22 |...$.. .7...B.#"| +peer0.org1.example.com | 00000030 ab 06 bc ca 86 ee 98 05 8d bf 58 65 b2 13 e4 41 |..........Xe...A| +peer0.org1.example.com | 00000040 4f 8e 7c 2b 7a 63 73 |O.|+zcs| +peer0.org1.example.com | [18ac 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [18ad 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [18ae 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [18af 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [18b0 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [18b1 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17f0 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [17f1 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17f2 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17f3 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17f4 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [17f5 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f6 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f7 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17f8 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17f9 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [17fa 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [17fb 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17fc 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fd 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fe 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [17ff 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1800 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1801 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1803 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1804 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1805 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1807 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1806 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1802 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1656 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 principal matched by identity 0 +peer1.org1.example.com | [1657 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer1.org1.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer1.org1.example.com | [1658 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer1.org1.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer1.org1.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer1.org1.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer1.org1.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer1.org1.example.com | [1659 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [165a 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043821b0 gate 1602702094497182500 evaluation succeeds +peer1.org1.example.com | [165b 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [165c 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [165d 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [165e 10-14 19:01:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [165f 10-14 19:01:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1660 10-14 19:01:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1661 10-14 19:01:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1662 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1663 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1664 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1665 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1967 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1968 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1969 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [196a 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [196b 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [196c 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [196d 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 gate 1602702099290160300 evaluation starts +peer1.org2.example.com | [196e 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [196f 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1970 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1971 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 principal evaluation fails +peer1.org2.example.com | [1972 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f0e10 gate 1602702099290160300 evaluation fails +peer1.org2.example.com | [1973 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1974 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1975 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1976 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 gate 1602702099291768900 evaluation starts +peer1.org2.example.com | [1977 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1978 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1979 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 principal matched by identity 0 +peer1.org2.example.com | [197a 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org2.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org2.example.com | [197b 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org2.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org2.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org2.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org2.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org2.example.com | [197c 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [197d 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1380 gate 1602702099291768900 evaluation succeeds +peer1.org2.example.com | [197e 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [197f 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1980 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1981 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1982 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1983 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1984 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1985 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer1.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer1.org2.example.com | [1986 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org2.example.com | [1987 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1988 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1989 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [198a 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org2.example.com | [198b 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer0.org1.example.com | [18b2 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18b3 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18b4 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [18b5 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18b6 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18b7 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18b8 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [18b9 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1666 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1667 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1668 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1669 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [166a 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [166b 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [166c 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer1.org1.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer1.org1.example.com | [166d 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer1.org1.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer1.org1.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer1.org1.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer1.org1.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer1.org1.example.com | [166e 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [166f 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 7d ff d6 13 c4 f9 e8 8a b8 a6 |0E.!..}.........| +peer1.org1.example.com | 00000010 31 1a de 06 ae 91 6a 5c a1 49 28 46 bb 76 4e 77 |1.....j\.I(F.vNw| +peer1.org1.example.com | 00000020 e8 a2 61 af ca 02 20 77 d6 16 b7 92 89 0d 10 2c |..a... w.......,| +peer1.org1.example.com | 00000030 4d f3 75 bb e3 cd be 87 9a 30 0c c3 b2 51 da 57 |M.u......0...Q.W| +peer1.org1.example.com | 00000040 55 74 d4 a7 68 0c d5 |Ut..h..| +peer1.org1.example.com | [1670 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1671 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1672 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1673 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1674 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1675 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1676 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1677 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1678 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1679 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167a 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167b 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [167c 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [167d 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [167e 10-14 19:01:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [167f 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1680 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1681 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1682 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1683 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1684 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1685 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1686 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1687 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1688 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1689 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [168a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [168b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [168c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [168d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [168e 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [168f 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1690 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1691 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1692 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1693 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1694 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1695 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1696 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 gate 1602702095151336500 evaluation starts +peer1.org1.example.com | [1697 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1698 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1699 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 principal matched by identity 0 +peer1.org1.example.com | [169a 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 39 46 16 ec 0d 8a e0 5a 98 4b 7b fd 95 0d 7a |.9F.....Z.K{...z| +peer1.org1.example.com | 00000010 fb 94 4b 7c 4e 2b 98 8b e6 fb d3 da 7e e8 de 7f |..K|N+......~...| +peer1.org1.example.com | [169b 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 74 09 f5 f0 95 fc 3b cb 80 ad 08 |0D. wt.....;....| +peer1.org1.example.com | 00000010 8e 84 c0 39 8b b8 2d c2 22 23 33 d3 fa 79 75 5c |...9..-."#3..yu\| +peer1.org1.example.com | 00000020 dd de 49 b4 02 20 7a 38 23 54 94 56 bd 0c fa e1 |..I.. z8#T.V....| +peer1.org1.example.com | 00000030 e5 1d 95 da 26 1c 34 10 56 ae aa a1 56 57 9e 3a |....&.4.V...VW.:| +peer1.org1.example.com | 00000040 6f da 4c 86 37 50 |o.L.7P| +peer1.org1.example.com | [169c 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [169d 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d540 gate 1602702095151336500 evaluation succeeds +peer1.org1.example.com | [169e 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [169f 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16a0 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [16a1 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [16a2 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16a3 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [16a4 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [16a5 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [16a6 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [16a7 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1808 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [180a 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [180b 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [180c 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [180d 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [180e 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [180f 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 gate 1602702098638765300 evaluation starts +peer0.org2.example.com | [1810 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1811 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1812 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 principal matched by identity 0 +peer0.org2.example.com | [1813 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1814 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1815 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1816 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d4480 gate 1602702098638765300 evaluation succeeds +peer0.org2.example.com | [1817 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1818 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1819 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [181a 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1809 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [181b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [181c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [181d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [181e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [181f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1820 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1821 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1822 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1823 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 gate 1602702098643861200 evaluation starts +peer0.org2.example.com | [1824 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1825 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1826 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 principal matched by identity 0 +peer0.org2.example.com | [1827 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1828 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1829 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18ba 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > alive: +peer0.org1.example.com | [18bb 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [18bc 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18bd 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [18be 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18bf 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [18c0 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18c1 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c2 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18c3 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c4 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18c5 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c6 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18c7 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c8 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [18c9 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [18ca 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18cb 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [18cc 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [18cd 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ce 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [18cf 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d0 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d1 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d2 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [18d3 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101C +peer0.org1.example.com | [18d4 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F781AB6DE5A451074A88C8967BEEE321030B51A9508D9799E1DF0584CD0E28FF +peer0.org1.example.com | [18d5 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [18d6 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [18d7 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [18d8 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18d9 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18da 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18db 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18dc 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [18dd 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [18de 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18df 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e0 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e1 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e2 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e3 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e4 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18e5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [18e6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [18e7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer0.org1.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer0.org1.example.com | [18e8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer0.org1.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer0.org1.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer0.org1.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer0.org1.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer0.org1.example.com | [18e9 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [18ea 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 7d ff d6 13 c4 f9 e8 8a b8 a6 |0E.!..}.........| +peer0.org2.example.com | [182a 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d5680 gate 1602702098643861200 evaluation succeeds +peer0.org2.example.com | [182b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [182c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [182d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [182e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [182f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1830 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1831 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1832 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1833 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1834 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1835 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1836 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1837 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1838 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1839 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [183a 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [183b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [183c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [183d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 gate 1602702098646052500 evaluation starts +peer0.org2.example.com | [183e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [183f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1840 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 principal matched by identity 0 +peer0.org2.example.com | [1841 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1842 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1843 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1844 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f5800 gate 1602702098646052500 evaluation succeeds +peer0.org2.example.com | [1845 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1846 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1847 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1848 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1849 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [184a 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [184b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [184c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [184d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [184e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [184f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1850 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1851 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1852 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1853 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1854 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1855 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 gate 1602702098649230800 evaluation starts +peer0.org2.example.com | [1856 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1857 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1858 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 principal matched by identity 0 +peer0.org2.example.com | [1859 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [185a 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [185b 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [185c 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043137e0 gate 1602702098649230800 evaluation succeeds +peer0.org2.example.com | [185d 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [185e 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [185f 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1860 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1861 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1862 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1863 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1864 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1865 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1866 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1867 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1868 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1869 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [186a 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [186b 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [186c 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 gate 1602702098655013200 evaluation starts +peer0.org2.example.com | [186d 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [186e 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [186f 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 principal matched by identity 0 +peer0.org2.example.com | [1870 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1871 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1872 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1873 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334c30 gate 1602702098655013200 evaluation succeeds +peer0.org2.example.com | [1874 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1875 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1876 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1877 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1878 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1879 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [187a 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [187b 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [187c 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [187d 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [187e 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [187f 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1880 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 gate 1602702098657520200 evaluation starts +peer0.org2.example.com | [1881 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1882 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1883 10-14 19:01:38.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 principal matched by identity 0 +peer0.org2.example.com | [1884 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1885 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1886 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1887 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004335e30 gate 1602702098657520200 evaluation succeeds +peer0.org2.example.com | [1888 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1889 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [188a 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [188b 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [188c 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [188d 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [188e 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | [16a8 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a9 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16aa 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ab 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ac 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ad 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ae 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16af 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b0 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b1 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [16b2 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16b3 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16b4 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b5 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [16b6 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16b7 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16b8 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b9 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16ba 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16bb 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org2.example.com | [198c 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [198d 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [198e 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [198f 10-14 19:01:39.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1990 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1991 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1992 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1993 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1994 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1995 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 ec b1 c2 56 8b 69 5e e5 1d cb d0 4b af 9c 63 |....V.i^....K..c| +peer1.org2.example.com | 00000010 79 c8 11 86 3a 3a 96 32 f3 0a da 29 72 ca 43 94 |y...::.2...)r.C.| +peer1.org2.example.com | [1996 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4a b1 31 e1 7e 54 36 25 a8 f9 |0E.!..J.1.~T6%..| +peer1.org2.example.com | 00000010 27 87 e6 6d f8 cd e2 4b f1 d5 90 22 3a 30 40 01 |'..m...K...":0@.| +peer1.org2.example.com | 00000020 f9 ee 8c be 83 02 20 12 fb fc fc d9 66 02 14 c3 |...... .....f...| +peer1.org2.example.com | 00000030 a9 9e fc 13 5c 44 b8 49 b8 0b 46 25 32 c8 39 91 |....\D.I..F%2.9.| +peer1.org2.example.com | 00000040 65 c8 f9 92 d7 f3 97 |e......| +peer1.org2.example.com | [1997 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1998 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1999 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [199a 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [199b 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [199c 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [199d 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [199e 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [199f 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a0 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a1 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a2 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19a3 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19a5 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000010 31 1a de 06 ae 91 6a 5c a1 49 28 46 bb 76 4e 77 |1.....j\.I(F.vNw| +peer0.org1.example.com | 00000020 e8 a2 61 af ca 02 20 77 d6 16 b7 92 89 0d 10 2c |..a... w.......,| +peer0.org1.example.com | 00000030 4d f3 75 bb e3 cd be 87 9a 30 0c c3 b2 51 da 57 |M.u......0...Q.W| +peer0.org1.example.com | 00000040 55 74 d4 a7 68 0c d5 |Ut..h..| +peer0.org1.example.com | [18eb 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [18ec 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [18ed 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ee 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18ef 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18f0 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18f1 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18f2 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [18f3 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [18f4 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18f5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18f6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18f7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18f8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18f9 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18fa 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18fb 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 gate 1602702094625274800 evaluation starts +peer0.org1.example.com | [18fc 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18fd 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [18fe 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 principal matched by identity 0 +peer0.org1.example.com | [18ff 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +peer0.org1.example.com | 00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +peer0.org1.example.com | [1900 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +peer0.org1.example.com | 00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +peer0.org1.example.com | 00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +peer0.org1.example.com | 00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +peer0.org1.example.com | 00000040 47 7a 54 a2 92 46 |GzT..F| +peer0.org1.example.com | [1901 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1902 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 gate 1602702094625274800 evaluation succeeds +peer0.org1.example.com | [1903 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1904 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1905 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1906 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19a6 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19a4 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19a7 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a8 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19a9 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19aa 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ab 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ac 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ad 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19ae 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19af 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19b0 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19b1 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19b2 10-14 19:01:40.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [19b3 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [19b4 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101C +peer1.org2.example.com | [19b5 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7829F344BD70967DA2CAE2058E4674130A88AE886D688F7BC2F81EB25993C55 +peer1.org2.example.com | [19b6 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [19b7 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [19b8 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [19b9 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [19ba 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19bb 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19bc 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19bd 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19be 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19bf 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19c0 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19c3 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c2 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19c1 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19c4 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c5 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19c6 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c7 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16bc 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16bd 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16be 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16bf 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16c0 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c1 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16c2 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c3 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16c4 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [16c5 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c6 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [16c7 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16c8 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16c9 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [16ca 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [16cb 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [16cc 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 gate 1602702095260736000 evaluation starts +peer1.org1.example.com | [16cd 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [16ce 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [16cf 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 principal matched by identity 0 +peer1.org1.example.com | [16d0 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 8c 58 4d 14 67 6f 56 d6 0d ff d7 70 04 bc |.2.XM.goV....p..| +peer1.org1.example.com | 00000010 8c 7f 4a dd af 40 ea 57 e4 ff b1 a8 7e 21 d6 8b |..J..@.W....~!..| +peer1.org1.example.com | [16d1 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 6c 3d ce 16 ac ec 6f e9 99 bd |0E.!..l=....o...| +peer1.org1.example.com | 00000010 b2 94 03 50 cc e1 05 f6 79 80 b6 9e e9 3d 50 a6 |...P....y....=P.| +peer1.org1.example.com | 00000020 ac 1b fd a3 fb 02 20 05 72 5b e6 a9 5b e3 f2 76 |...... .r[..[..v| +peer1.org1.example.com | 00000030 44 69 86 85 78 9f 7e 86 b5 87 4c 45 ab d1 ed 7b |Di..x.~...LE...{| +peer1.org1.example.com | 00000040 02 95 47 78 22 af c2 |..Gx"..| +peer1.org1.example.com | [16d2 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [16d3 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d5a80 gate 1602702095260736000 evaluation succeeds +peer1.org1.example.com | [16d4 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16d5 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16d6 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [16d7 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [188f 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1890 10-14 19:01:38.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1891 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1892 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1893 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1894 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1895 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1896 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1897 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1898 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1899 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [189a 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [189b 10-14 19:01:38.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c8 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19c9 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ca 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19cb 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [19cc 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19cd 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [19ce 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19cf 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19d0 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [19d1 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [19d2 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [19d3 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 gate 1602702100435851700 evaluation starts +peer1.org2.example.com | [19d4 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19d5 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [19d6 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [19d7 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 principal evaluation fails +peer1.org2.example.com | [19d8 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ae700 gate 1602702100435851700 evaluation fails +peer1.org2.example.com | [19d9 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19da 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19db 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [19dc 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 gate 1602702100437296300 evaluation starts +peer1.org2.example.com | [19dd 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [19de 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [19df 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 principal matched by identity 0 +peer1.org2.example.com | [19e0 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df d6 4f 0c b2 50 39 aa 05 28 45 bc a1 68 aa 85 |..O..P9..(E..h..| +peer1.org2.example.com | 00000010 c9 f9 71 7f bc 3f fa cc 12 41 3d 33 33 68 80 1c |..q..?...A=33h..| +peer1.org2.example.com | [19e1 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 7f a1 91 fc 9d de ab 98 77 90 7c |0D. R........w.|| +peer1.org2.example.com | 00000010 61 86 91 c1 31 3e 25 f6 de ba 84 d7 88 fc ef 4f |a...1>%........O| +peer1.org2.example.com | 00000020 7d 5b 09 89 02 20 0f 16 f4 c5 e5 01 b4 62 5a b6 |}[... .......bZ.| +peer1.org2.example.com | 00000030 ab e9 dd 31 e4 d0 34 ed 6f 26 1f 81 ce 2c 71 22 |...1..4.o&...,q"| +peer1.org2.example.com | 00000040 ec 47 fc 80 57 36 |.G..W6| +peer1.org2.example.com | [19e2 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19e3 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19e4 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19e5 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041aec70 gate 1602702100437296300 evaluation succeeds +peer1.org2.example.com | [19e6 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [16d8 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16d9 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [16da 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [16db 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [16dc 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [16dd 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16de 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16df 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16e1 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16e2 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e3 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16e4 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e5 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e6 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e7 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e8 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16e9 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ea 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16eb 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ec 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [16ed 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ee 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [16ef 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16f0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16f1 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16f2 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16f3 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16f4 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16f5 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16f6 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [16f7 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16f8 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16f9 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161021 +peer1.org1.example.com | [16fa 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8B7E98AB8635126BBE718E1363709F26D1BCDF4B8203702093A490D0445F05D +peer1.org1.example.com | [16fb 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16fc 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [19e7 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19e8 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19e9 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19ea 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19eb 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [19ec 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19ed 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19ee 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [19ef 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f0 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f1 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f2 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19f3 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f4 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f5 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19f6 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19f7 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f8 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19f9 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fa 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fb 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fc 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fd 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19fe 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19ff 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a00 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a01 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a02 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a03 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a04 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a05 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a06 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a07 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a08 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a09 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a0a 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1a0b 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189c 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [189d 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 a4 cd e4 7a 35 d0 47 6f 37 82 80 78 13 f8 b0 | ...z5.Go7..x...| +peer0.org2.example.com | 00000010 34 50 c9 0a aa ac db 98 64 50 83 1b 94 7d c7 3f |4P......dP...}.?| +peer0.org2.example.com | [189e 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 c0 74 2c 18 dd 54 82 ed 02 79 9f |0D. B.t,..T...y.| +peer0.org2.example.com | 00000010 a6 3b 03 b9 17 b6 6f 42 ff 01 a8 88 1b 29 46 df |.;....oB.....)F.| +peer0.org2.example.com | 00000020 02 61 9d 8d 02 20 3c 40 4a ee e5 63 e7 c3 58 4b |.a... <@J..c..XK| +peer0.org2.example.com | 00000030 39 6c 54 27 ae b2 68 df 3f fb fd 20 eb 15 c3 ff |9lT'..h.?.. ....| +peer0.org2.example.com | 00000040 cc 0a e6 94 42 ec |....B.| +peer0.org2.example.com | [189f 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a0 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18a1 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18a2 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [18a3 10-14 19:01:38.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [18a4 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18a5 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [18a6 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [18a7 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [18a9 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18aa 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [18ab 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [18ac 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer0.org2.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer0.org2.example.com | [18ad 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [18ae 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18af 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18b0 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18b1 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer0.org2.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer0.org2.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer0.org2.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer0.org2.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer0.org2.example.com | [18b2 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [18b3 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18b4 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [18b5 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1907 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1908 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1909 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [190a 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer0.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer0.org1.example.com | [190b 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer0.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer0.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer0.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer0.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer0.org1.example.com | [190c 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [190d 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [190e 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [190f 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer0.org1.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer0.org1.example.com | [1910 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer0.org1.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer0.org1.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer0.org1.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer0.org1.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer0.org1.example.com | [1911 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1912 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1913 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1914 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1915 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1916 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1917 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1918 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1919 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191a 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191b 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [191c 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [191d 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191e 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [191f 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1920 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a0c 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a0d 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a0e 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a0f 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a10 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a11 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1a12 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 gate 1602702100617984300 evaluation starts +peer1.org2.example.com | [1a13 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a14 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1a15 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1a16 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 principal evaluation fails +peer1.org2.example.com | [1a17 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041beca0 gate 1602702100617984300 evaluation fails +peer1.org2.example.com | [1a18 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a19 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a1a 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a1b 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 gate 1602702100619413200 evaluation starts +peer1.org2.example.com | [1a1c 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a1d 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1a1e 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 principal matched by identity 0 +peer1.org2.example.com | [1a1f 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 3a bf e4 ed 51 51 65 ff 35 0f db 60 cf 16 de |h:...QQe.5..`...| +peer1.org2.example.com | 00000010 87 bb 72 0b 23 1a 67 06 50 28 32 b8 97 b6 66 f4 |..r.#.g.P(2...f.| +peer1.org2.example.com | [1a20 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 95 ae f0 09 ec a2 74 65 8f fb |0E.!........te..| +peer1.org2.example.com | 00000010 14 9a 0a 9d b2 37 e3 7b 87 9f 45 3b d7 38 69 d2 |.....7.{..E;.8i.| +peer1.org2.example.com | 00000020 34 a2 22 19 78 02 20 23 91 76 d1 c5 03 82 4f 13 |4.".x. #.v....O.| +peer1.org2.example.com | 00000030 a8 ef 5e 54 e5 53 72 0a d2 77 cf 63 22 71 ba d9 |..^T.Sr..w.c"q..| +peer1.org2.example.com | 00000040 54 83 c6 82 6e e8 d0 |T...n..| +peer1.org2.example.com | [1a21 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1a22 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bf210 gate 1602702100619413200 evaluation succeeds +peer1.org2.example.com | [1a23 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a24 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a25 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a26 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a27 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a28 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a29 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a2a 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1a2b 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1a2c 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1a2d 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1a2e 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a2f 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a30 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a31 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a32 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a33 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a34 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a35 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a36 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a37 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a38 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a39 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3a 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3b 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3c 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3d 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3e 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a3f 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a40 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a41 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a43 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1a42 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a44 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a46 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a45 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a47 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a48 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a49 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a4a 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a4b 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a4c 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a4d 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a4e 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a4f 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1a50 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a51 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a52 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a53 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a54 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1a55 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a56 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer1.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer1.org2.example.com | [1a57 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer1.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer1.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer1.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer1.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer1.org2.example.com | [1a58 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1a59 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3f 7b db 4b 82 58 de a9 42 74 89 |0D. R?{.K.X..Bt.| +peer1.org2.example.com | 00000010 af c1 f2 62 1d 1d 05 72 44 9a 6c 7c b7 db 1d 5a |...b...rD.l|...Z| +peer1.org2.example.com | 00000020 f4 a8 e8 73 02 20 22 86 8f 25 fd db c5 e6 9b 9f |...s. "..%......| +peer1.org2.example.com | 00000030 61 cc f4 47 3f 32 44 6c 9a 28 e7 6b 42 36 dd 53 |a..G?2Dl.(.kB6.S| +peer1.org2.example.com | 00000040 8e ef 4b 25 3a bc |..K%:.| +peer1.org2.example.com | [1a5a 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1a5b 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [1a5c 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1a5d 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1a5e 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1a5f 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a60 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a61 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a62 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1a63 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a64 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a65 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a66 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a67 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a68 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1a69 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1a6a 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a6b 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1a6c 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a6d 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1a6e 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a6f 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a70 10-14 19:01:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a71 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a72 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a73 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a74 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a75 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a76 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a77 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a78 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a79 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7a 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7b 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a7c 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [18b6 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [18b7 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18b8 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18b9 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18ba 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18bb 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [18bc 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 gate 1602702098959059900 evaluation starts +peer0.org2.example.com | [18bd 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18be 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [18bf 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 principal matched by identity 0 +peer0.org2.example.com | [18c0 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer0.org2.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer0.org2.example.com | [18c1 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer0.org2.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer0.org2.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer0.org2.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer0.org2.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer0.org2.example.com | [18c2 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [18c3 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438c420 gate 1602702098959059900 evaluation succeeds +peer0.org2.example.com | [18c4 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18c5 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18c6 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18c7 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18c8 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18c9 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18ca 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [18cb 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org2.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org2.example.com | [18cc 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org2.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org2.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer0.org2.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer0.org2.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org2.example.com | [18cd 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18ce 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18cf 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d0 10-14 19:01:38.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d1 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [18d2 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [18d3 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [18d4 10-14 19:01:38.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d5 10-14 19:01:40.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [18d6 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [18d7 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101C +peer0.org2.example.com | [18d8 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 88ECB1C2568B695EE51DCBD04BAF9C6379C811863A3A9632F30ADA2972CA4394 +peer1.org1.example.com | [16fd 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [16fe 10-14 19:01:35.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [16ff 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1700 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1701 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1702 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1703 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1704 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1705 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1706 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1707 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1708 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1709 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170a 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [170b 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170c 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [170d 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [170e 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170f 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1710 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1711 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 97 27 c4 b2 c3 7d 92 12 ef 26 52 31 9c 21 f0 |..'...}...&R1.!.| +peer1.org1.example.com | 00000010 b6 8f 6f 3f 21 3e 8c 78 c0 47 99 1f 52 13 90 f3 |..o?!>.x.G..R...| +peer1.org1.example.com | [1712 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 36 1d 80 d5 ec 4c 63 e0 e0 5d 50 ff |0D. 6....Lc..]P.| +peer1.org1.example.com | 00000010 8b 3c 03 dd c5 42 2b e3 c2 f7 f8 a8 f5 23 e3 16 |.<...B+......#..| +peer1.org1.example.com | 00000020 e2 42 80 a9 02 20 02 bf 15 e4 c9 60 a3 89 b9 9d |.B... .....`....| +peer1.org1.example.com | 00000030 27 ee fb fa 03 1d d6 6b 4e 72 da 2b 90 51 65 d8 |'......kNr.+.Qe.| +peer1.org1.example.com | 00000040 ff 27 d7 5a b2 49 |.'.Z.I| +peer1.org1.example.com | [1713 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1714 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [18d9 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [18da 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [18db 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [18dc 10-14 19:01:40.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [18dd 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18de 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18df 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [18e0 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18e1 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [18e2 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18e3 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [18e4 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18e5 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [18e6 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18e8 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18e7 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18e9 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18ea 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18eb 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18ec 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18ed 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [18ee 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 82 9f 34 4b d7 09 67 da 2c ae 20 58 e4 67 41 |...4K..g.,. X.gA| +peer0.org2.example.com | 00000010 30 a8 8a e8 86 d6 88 f7 bc 2f 81 eb 25 99 3c 55 |0......../..%. DEBU Verify: sig = 00000000 30 45 02 21 00 ac 2e 2f db 6f e7 29 9d c2 60 ef |0E.!.../.o.)..`.| +peer0.org2.example.com | 00000010 fe 29 06 82 6f 61 a3 8e fb 1d 7c 7e 94 65 a5 1a |.)..oa....|~.e..| +peer0.org2.example.com | 00000020 c2 c0 cb 0d f0 02 20 13 d9 c1 7f c2 72 af 51 de |...... .....r.Q.| +peer0.org2.example.com | 00000030 f8 98 07 c9 a1 95 62 44 4a 8f ab 29 de 54 66 a5 |......bDJ..).Tf.| +peer0.org2.example.com | 00000040 9e ab 78 f5 f6 4a 64 |..x..Jd| +peer0.org2.example.com | [18f0 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18f1 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [18f2 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [18f3 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [18f4 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [18f5 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f6 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f7 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f8 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18f9 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fa 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fb 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [18fc 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fd 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [18fe 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1900 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18ff 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1901 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1902 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1903 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1904 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1905 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1906 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1907 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1908 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1909 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [190a 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [190b 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [190c 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [190d 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [190e 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [190f 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1910 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1911 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1912 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1913 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1914 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1915 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 gate 1602702100428559900 evaluation starts +peer0.org2.example.com | [1916 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1917 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1918 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 principal matched by identity 0 +peer0.org2.example.com | [1919 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df d6 4f 0c b2 50 39 aa 05 28 45 bc a1 68 aa 85 |..O..P9..(E..h..| +peer0.org2.example.com | 00000010 c9 f9 71 7f bc 3f fa cc 12 41 3d 33 33 68 80 1c |..q..?...A=33h..| +peer0.org2.example.com | [191a 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 7f a1 91 fc 9d de ab 98 77 90 7c |0D. R........w.|| +peer0.org2.example.com | 00000010 61 86 91 c1 31 3e 25 f6 de ba 84 d7 88 fc ef 4f |a...1>%........O| +peer0.org2.example.com | 00000020 7d 5b 09 89 02 20 0f 16 f4 c5 e5 01 b4 62 5a b6 |}[... .......bZ.| +peer0.org2.example.com | 00000030 ab e9 dd 31 e4 d0 34 ed 6f 26 1f 81 ce 2c 71 22 |...1..4.o&...,q"| +peer0.org2.example.com | 00000040 ec 47 fc 80 57 36 |.G..W6| +peer0.org2.example.com | [191b 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [191c 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd110 gate 1602702100428559900 evaluation succeeds +peer0.org2.example.com | [191d 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [191e 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [191f 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1920 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1921 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1922 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1923 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1924 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1925 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1926 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1921 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1922 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1923 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1924 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1925 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1926 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1927 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 gate 1602702094640439300 evaluation starts +peer0.org1.example.com | [1928 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1929 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [192a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 principal matched by identity 0 +peer0.org1.example.com | [192b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +peer0.org1.example.com | 00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +peer0.org1.example.com | [192c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +peer0.org1.example.com | 00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +peer0.org1.example.com | 00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +peer0.org1.example.com | 00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +peer0.org1.example.com | 00000040 9c 5d 85 81 45 d4 7f |.]..E..| +peer0.org1.example.com | [192d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [192e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 gate 1602702094640439300 evaluation succeeds +peer0.org1.example.com | [192f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1930 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1931 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1932 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1933 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1934 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1935 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1936 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +peer0.org1.example.com | 00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +peer0.org1.example.com | [1937 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +peer0.org1.example.com | 00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +peer0.org1.example.com | 00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +peer0.org1.example.com | 00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +peer0.org1.example.com | 00000040 9b 2f 31 92 b6 1d 58 |./1...X| +peer0.org1.example.com | [1938 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1939 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [193a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [193b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [193c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +peer0.org1.example.com | 00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +peer0.org1.example.com | [193d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +peer0.org1.example.com | 00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +peer0.org1.example.com | 00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +peer0.org1.example.com | 00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +peer0.org1.example.com | 00000040 1e 36 a6 c0 a9 dc |.6....| +peer0.org1.example.com | [193e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1940 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1941 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1942 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1943 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1944 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1945 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1946 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1947 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1948 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1949 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [194a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [194b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [194c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [194d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [194e 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [194f 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1950 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1951 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1952 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1953 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 gate 1602702095145564600 evaluation starts +peer0.org1.example.com | [1954 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1955 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1956 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 principal matched by identity 0 +peer0.org1.example.com | [1957 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 39 46 16 ec 0d 8a e0 5a 98 4b 7b fd 95 0d 7a |.9F.....Z.K{...z| +peer0.org1.example.com | 00000010 fb 94 4b 7c 4e 2b 98 8b e6 fb d3 da 7e e8 de 7f |..K|N+......~...| +peer0.org1.example.com | [1958 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 74 09 f5 f0 95 fc 3b cb 80 ad 08 |0D. wt.....;....| +peer0.org1.example.com | 00000010 8e 84 c0 39 8b b8 2d c2 22 23 33 d3 fa 79 75 5c |...9..-."#3..yu\| +peer0.org1.example.com | 00000020 dd de 49 b4 02 20 7a 38 23 54 94 56 bd 0c fa e1 |..I.. z8#T.V....| +peer0.org1.example.com | 00000030 e5 1d 95 da 26 1c 34 10 56 ae aa a1 56 57 9e 3a |....&.4.V...VW.:| +peer0.org1.example.com | 00000040 6f da 4c 86 37 50 |o.L.7P| +peer0.org1.example.com | [1959 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [195a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 gate 1602702095145564600 evaluation succeeds +peer0.org1.example.com | [195b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [195c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [195d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [195e 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [195f 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1960 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1961 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1962 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1963 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1964 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1965 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1966 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1967 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1968 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1969 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196a 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196b 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196c 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196d 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [196e 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196f 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1970 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1971 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1972 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1973 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1974 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1975 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1976 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1977 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1978 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [197a 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1979 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [197b 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [197c 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [197d 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [197e 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [197f 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1980 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1981 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1982 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1983 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1927 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1928 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1929 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192a 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192b 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192c 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192d 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192e 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192f 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1930 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1931 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1932 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1933 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1934 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1935 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1936 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1937 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1938 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1939 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [193a 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [193b 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [193c 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [193d 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [193e 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [193f 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1940 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1941 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1942 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1943 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1944 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1945 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1946 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1947 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1948 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1949 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [194a 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 gate 1602702100608501700 evaluation starts +peer0.org2.example.com | [194b 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [194c 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [194d 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 principal matched by identity 0 +peer0.org2.example.com | [194e 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 3a bf e4 ed 51 51 65 ff 35 0f db 60 cf 16 de |h:...QQe.5..`...| +peer0.org2.example.com | 00000010 87 bb 72 0b 23 1a 67 06 50 28 32 b8 97 b6 66 f4 |..r.#.g.P(2...f.| +peer0.org1.example.com | [1984 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1985 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1986 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1987 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1988 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1989 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [198a 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 gate 1602702095264912600 evaluation starts +peer0.org1.example.com | [198b 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [198c 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [198d 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 principal matched by identity 0 +peer0.org1.example.com | [198e 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 8c 58 4d 14 67 6f 56 d6 0d ff d7 70 04 bc |.2.XM.goV....p..| +peer0.org1.example.com | 00000010 8c 7f 4a dd af 40 ea 57 e4 ff b1 a8 7e 21 d6 8b |..J..@.W....~!..| +peer0.org1.example.com | [198f 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 6c 3d ce 16 ac ec 6f e9 99 bd |0E.!..l=....o...| +peer0.org1.example.com | 00000010 b2 94 03 50 cc e1 05 f6 79 80 b6 9e e9 3d 50 a6 |...P....y....=P.| +peer0.org1.example.com | 00000020 ac 1b fd a3 fb 02 20 05 72 5b e6 a9 5b e3 f2 76 |...... .r[..[..v| +peer0.org1.example.com | 00000030 44 69 86 85 78 9f 7e 86 b5 87 4c 45 ab d1 ed 7b |Di..x.~...LE...{| +peer0.org1.example.com | 00000040 02 95 47 78 22 af c2 |..Gx"..| +peer0.org1.example.com | [1990 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1991 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1992 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1993 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 gate 1602702095264912600 evaluation succeeds +peer0.org1.example.com | [1994 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1995 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1996 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1997 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1998 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1999 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [199a 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [199b 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [199c 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1a7d 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7e 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a7f 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a80 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a81 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a82 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a83 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a85 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a86 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a84 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a87 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101D +peer1.org2.example.com | [1a88 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FB4EFB97332C4CD7DE4392378CD25E393FAC42CA8AE7E0ABD91594F3D5382A2 +peer1.org2.example.com | [1a89 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a8a 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1a8b 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1a8c 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a8d 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a8e 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a8f 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a90 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a91 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a92 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a93 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a94 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a95 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a96 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1715 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1716 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1717 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1718 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1719 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [171a 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [171b 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [171c 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [171d 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [171e 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [171f 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1720 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1721 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1722 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1723 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1724 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1725 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1726 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1727 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1728 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1729 10-14 19:01:35.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172a 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [172b 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172c 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [172d 10-14 19:01:35.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172e 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [172f 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1730 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1731 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1732 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1733 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1734 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1735 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1736 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1737 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1738 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a97 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a98 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a99 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a9a 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1a9b 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer1.org2.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer1.org2.example.com | [1a9c 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer1.org2.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer1.org2.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer1.org2.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer1.org2.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer1.org2.example.com | [1a9d 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1a9e 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 2c c0 b3 e5 1a 0e 81 42 82 e9 |0E.!..,......B..| +peer1.org2.example.com | 00000010 64 c9 ea ba 56 58 f3 ce bf 93 ca 63 a0 d4 3a 56 |d...VX.....c..:V| +peer1.org2.example.com | 00000020 5e c1 ef 5a 29 02 20 4f 0b ce 3d 98 10 a7 76 63 |^..Z). O..=...vc| +peer1.org2.example.com | 00000030 20 b0 68 37 7e 0a ae 99 82 53 8b fb 21 8e b4 f7 | .h7~....S..!...| +peer1.org2.example.com | 00000040 b1 6d 9b 61 c8 e3 00 |.m.a...| +peer1.org2.example.com | [1a9f 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1aa0 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1aa1 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa2 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa3 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa4 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aa5 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aa6 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aa7 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1aa8 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer1.org2.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer1.org2.example.com | [1aa9 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer1.org2.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer1.org2.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer1.org2.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer1.org2.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer1.org2.example.com | [1aaa 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aab 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aac 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aad 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1aae 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer1.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer1.org2.example.com | [1aaf 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer1.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer1.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer1.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer1.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer1.org2.example.com | [1ab0 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ab1 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab2 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [194f 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 95 ae f0 09 ec a2 74 65 8f fb |0E.!........te..| +peer0.org2.example.com | 00000010 14 9a 0a 9d b2 37 e3 7b 87 9f 45 3b d7 38 69 d2 |.....7.{..E;.8i.| +peer0.org2.example.com | 00000020 34 a2 22 19 78 02 20 23 91 76 d1 c5 03 82 4f 13 |4.".x. #.v....O.| +peer0.org2.example.com | 00000030 a8 ef 5e 54 e5 53 72 0a d2 77 cf 63 22 71 ba d9 |..^T.Sr..w.c"q..| +peer0.org2.example.com | 00000040 54 83 c6 82 6e e8 d0 |T...n..| +peer0.org2.example.com | [1950 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1951 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b96f0 gate 1602702100608501700 evaluation succeeds +peer0.org2.example.com | [1952 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1953 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1954 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1955 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1956 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1957 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1958 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1959 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [195a 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [195b 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [195c 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [195d 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [195e 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [195f 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1960 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1961 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1962 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1963 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1964 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1965 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1966 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1967 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1968 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1969 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [196a 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [196b 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [196c 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [196d 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [196e 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [196f 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1970 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1971 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1972 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1973 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab3 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ab4 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ab5 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ab6 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1ab7 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer1.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer1.org2.example.com | [1ab8 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer1.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer1.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer1.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer1.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer1.org2.example.com | [1ab9 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aba 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1abb 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1abc 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer1.org2.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer1.org2.example.com | [1abd 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer1.org2.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer1.org2.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer1.org2.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer1.org2.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer1.org2.example.com | [1abe 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1abf 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ac0 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac1 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac2 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac3 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac4 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac5 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ac6 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac7 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac8 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac9 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1aca 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1acb 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1acc 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1acd 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ace 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1acf 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad0 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad1 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [199d 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [199e 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [199f 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19a1 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a2 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a3 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19a4 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a5 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19a6 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19a7 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a8 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19a9 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19aa 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ab 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ac 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ad 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [19ae 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19af 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19b0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [19b1 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19b2 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b3 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19b4 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b5 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19b6 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b7 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19b8 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [19b9 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b7 e9 8a b8 63 51 26 bb e7 18 e1 36 37 09 f2 |.....cQ&....67..| +peer0.org1.example.com | 00000010 6d 1b cd f4 b8 20 37 02 09 3a 49 0d 04 45 f0 5d |m.... 7..:I..E.]| +peer0.org1.example.com | [19ba 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 40 46 68 39 a7 a7 ec b0 cc 8c 6b |0D. 9@Fh9......k| +peer0.org1.example.com | 00000010 b7 58 8a d1 55 15 60 02 de 1d 57 1a d8 d2 16 c0 |.X..U.`...W.....| +peer0.org1.example.com | 00000020 6d 98 db 9f 02 20 78 06 7d 71 e1 ff 3f f7 bc 37 |m.... x.}q..?..7| +peer0.org1.example.com | 00000030 28 f1 00 40 48 78 85 2c 3d 2b 32 db 0c df c4 31 |(..@Hx.,=+2....1| +peer0.org1.example.com | 00000040 b0 eb 08 b3 ef cf |......| +peer0.org1.example.com | [19bb 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19bc 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [19bd 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [19be 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1739 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [173a 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [173b 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [173c 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [173d 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [173e 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [173f 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1740 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1741 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1742 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1743 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1744 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1745 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1746 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1747 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1748 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1749 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [174a 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [174b 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [174c 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [174d 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [174e 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [174f 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 gate 1602702098181571100 evaluation starts +peer1.org1.example.com | [1750 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1751 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1752 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 principal matched by identity 0 +peer1.org1.example.com | [1753 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer1.org1.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org1.example.com | [19bf 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [19c0 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c1 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c2 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c3 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c4 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c5 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c6 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19c7 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19c8 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19ca 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c9 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19cb 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19cc 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19cd 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19ce 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19cf 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d0 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d1 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d2 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d3 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d4 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d5 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19d6 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d7 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [19d8 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101D +peer0.org1.example.com | [19d9 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A99727C4B2C37D9212EF2652319C21F0B68F6F3F213E8C78C047991F521390F3 +peer0.org1.example.com | [19da 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [19db 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [19dc 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [19dd 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [19de 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19df 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e0 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e1 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19e2 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19e3 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19e5 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1754 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org1.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org1.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org1.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org1.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org1.example.com | [1755 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1756 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435980 gate 1602702098181571100 evaluation succeeds +peer1.org1.example.com | [1757 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1758 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1759 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [175a 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [175b 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [175c 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [175d 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [175e 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [175f 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1760 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1761 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1762 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1763 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1764 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1765 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1766 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1767 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1768 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1769 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [176a 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [176b 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [176c 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [176d 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [176e 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [176f 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1770 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1771 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1772 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1773 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1774 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1775 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e6 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19e7 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e4 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e8 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [19e9 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [19ea 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19eb 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ec 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ed 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [19ee 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f0 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19f1 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f2 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19ef 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f3 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19f4 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f5 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [19f6 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19f7 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [19f8 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [19f9 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19fa 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19fc 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19fd 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19fe 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19ff 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a00 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a01 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a02 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 gate 1602702097932577100 evaluation starts +peer0.org2.example.com | [1974 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1975 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1976 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1977 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1978 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1979 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [197a 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [197b 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [197c 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [197d 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [197e 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [197f 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1980 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1981 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1982 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1983 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1984 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1985 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1986 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1987 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1988 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1989 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [198a 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [198b 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [198c 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [198d 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [198e 10-14 19:01:42.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [198f 10-14 19:01:42.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101D +peer0.org2.example.com | [1990 10-14 19:01:42.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 169FC189EF255A8B476DE0B44D9CE715A45677D9209DD8FB9B4DBBFDFF895166 +peer0.org2.example.com | [1991 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1992 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1993 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [1a03 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a04 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1a05 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 principal matched by identity 0 +peer0.org1.example.com | [1a06 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1a07 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1a08 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a09 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 gate 1602702097932577100 evaluation succeeds +peer0.org1.example.com | [1a0a 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a0b 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a0c 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a0d 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a0e 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a0f 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a10 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a11 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a12 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a13 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a14 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a15 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a16 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 gate 1602702097933975300 evaluation starts +peer0.org1.example.com | [1a17 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a18 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [19fb 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a19 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 principal matched by identity 0 +peer0.org1.example.com | [1a1a 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | [1776 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1777 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1778 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1779 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [177a 10-14 19:01:38.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [177b 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [177c 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [177d 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [177f 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [177e 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1780 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1781 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1782 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1783 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1785 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1784 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1786 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1787 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1788 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1789 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [178a 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [178b 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [178c 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1994 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1995 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1996 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1997 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [199a 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [199b 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [199c 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1998 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [199d 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1999 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [199e 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [199f 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19a0 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19a1 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19a2 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [19a3 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer0.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer0.org2.example.com | [19a4 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer0.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer0.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer0.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer0.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer0.org2.example.com | [19a5 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [19a6 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [19a7 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19a8 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19a9 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [19aa 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19ab 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ac 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [19ad 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer0.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer0.org2.example.com | [19ae 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19af 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer0.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer0.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer0.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer0.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer0.org2.example.com | [19b0 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [19b1 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 3f 7b db 4b 82 58 de a9 42 74 89 |0D. R?{.K.X..Bt.| +peer0.org2.example.com | 00000010 af c1 f2 62 1d 1d 05 72 44 9a 6c 7c b7 db 1d 5a |...b...rD.l|...Z| +peer0.org2.example.com | 00000020 f4 a8 e8 73 02 20 22 86 8f 25 fd db c5 e6 9b 9f |...s. "..%......| +peer0.org2.example.com | 00000030 61 cc f4 47 3f 32 44 6c 9a 28 e7 6b 42 36 dd 53 |a..G?2Dl.(.kB6.S| +peer0.org2.example.com | 00000040 8e ef 4b 25 3a bc |..K%:.| +peer0.org2.example.com | [19b2 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [19b3 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [19b4 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b5 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b6 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [19b7 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19b8 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [19b9 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer0.org2.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer0.org2.example.com | [19ba 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer0.org2.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer0.org2.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer0.org2.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer0.org2.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer0.org2.example.com | [19bb 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [19bc 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [19bd 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19be 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19bf 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [19c0 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [19c1 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [19c2 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19c3 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [19c4 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c5 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c6 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19c7 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1a1b 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1a1c 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a1d 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 gate 1602702097933975300 evaluation succeeds +peer0.org1.example.com | [1a1e 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a1f 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a20 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a21 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a22 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1a23 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1a24 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a25 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a26 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1a27 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1a28 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1a29 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1a2a 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a2b 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a2c 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a2d 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a2e 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a2f 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a30 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a31 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a32 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 gate 1602702097948538000 evaluation starts +peer0.org1.example.com | [1a33 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a34 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1a35 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 principal matched by identity 0 +peer0.org1.example.com | [1a36 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1a37 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | [1ad2 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1ad3 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ad4 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ad5 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ad6 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ad7 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ad8 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ad9 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ada 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 gate 1602702102465114100 evaluation starts +peer1.org2.example.com | [1adb 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1adc 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1add 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ade 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 principal evaluation fails +peer1.org2.example.com | [1adf 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac580 gate 1602702102465114100 evaluation fails +peer1.org2.example.com | [1ae0 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ae1 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ae2 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ae3 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 gate 1602702102468820500 evaluation starts +peer1.org2.example.com | [1ae4 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ae5 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1ae6 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 principal matched by identity 0 +peer1.org2.example.com | [1ae7 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer1.org2.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer1.org2.example.com | [1ae8 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer1.org2.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer1.org2.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer1.org2.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer1.org2.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer1.org2.example.com | [1ae9 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1aea 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042acaf0 gate 1602702102468820500 evaluation succeeds +peer1.org2.example.com | [1aeb 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1aec 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1aed 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1aee 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1aef 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [19c8 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [19c9 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [178d 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [178e 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 gate 1602702098310288400 evaluation starts +peer1.org1.example.com | [178f 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1790 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1791 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 principal matched by identity 0 +peer1.org1.example.com | [1792 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org1.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org1.example.com | [1793 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org1.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org1.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer1.org1.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org1.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org1.example.com | [1794 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1795 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00447fe80 gate 1602702098310288400 evaluation succeeds +peer1.org1.example.com | [1796 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1797 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1798 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1799 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [179a 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [179b 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [179c 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [179d 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [179e 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [179f 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a0 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a1 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17a2 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [17a3 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a4 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a5 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a6 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [17a7 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [17a8 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17a9 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1af0 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1af1 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1af2 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1af3 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1af4 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1af5 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1af6 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1af7 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1af8 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1af9 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1afa 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1afb 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1afc 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1afd 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1afe 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aff 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b00 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b01 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b02 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b03 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b04 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b05 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b06 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b07 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1b08 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b09 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b0a 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b0b 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [17aa 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17ab 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17ac 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17ad 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17ae 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17af 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17b0 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 gate 1602702098324435300 evaluation starts +peer1.org1.example.com | [17b1 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17b2 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [17b3 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 principal matched by identity 0 +peer1.org1.example.com | [17b4 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [17b5 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [17b6 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [17b7 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [17b8 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [17b9 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17ba 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [17bb 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17bc 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044ad3a0 gate 1602702098324435300 evaluation succeeds +peer1.org1.example.com | [17bd 10-14 19:01:38.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17be 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17bf 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17c0 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17c1 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c2 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c3 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17c4 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17c5 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17c6 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17c7 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17c8 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17c9 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 gate 1602702098336446200 evaluation starts +peer1.org1.example.com | [17ca 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17cb 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [17cc 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 principal matched by identity 0 +peer1.org1.example.com | [17cd 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [17ce 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [17cf 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17d0 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e25a0 gate 1602702098336446200 evaluation succeeds +peer0.org2.example.com | [19ca 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [19cb 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [19cc 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer0.org2.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer0.org2.example.com | [19cd 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer0.org2.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer0.org2.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer0.org2.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer0.org2.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer0.org2.example.com | [19ce 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [19cf 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 2c c0 b3 e5 1a 0e 81 42 82 e9 |0E.!..,......B..| +peer0.org2.example.com | 00000010 64 c9 ea ba 56 58 f3 ce bf 93 ca 63 a0 d4 3a 56 |d...VX.....c..:V| +peer0.org2.example.com | 00000020 5e c1 ef 5a 29 02 20 4f 0b ce 3d 98 10 a7 76 63 |^..Z). O..=...vc| +peer0.org2.example.com | 00000030 20 b0 68 37 7e 0a ae 99 82 53 8b fb 21 8e b4 f7 | .h7~....S..!...| +peer0.org2.example.com | 00000040 b1 6d 9b 61 c8 e3 00 |.m.a...| +peer0.org2.example.com | [19d0 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [19d1 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [19d2 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [19d3 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [19d4 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [19d5 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d6 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d7 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d8 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [19d9 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19da 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19db 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [19dc 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [19dd 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [19de 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19df 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [19e0 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [19e1 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e2 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e3 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e4 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e5 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19e6 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b0c 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1b0d 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b0e 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b0f 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b10 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b11 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b12 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b13 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b14 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 gate 1602702102613441900 evaluation starts +peer1.org2.example.com | [1b15 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b16 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b17 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b18 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 principal evaluation fails +peer1.org2.example.com | [1b19 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e05e0 gate 1602702102613441900 evaluation fails +peer1.org2.example.com | [1b1a 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b1b 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b1c 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b1d 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e0b50 gate 1602702102616754400 evaluation starts +peer1.org2.example.com | [1b1e 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e0b50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b1f 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e0b50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b20 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e0b50 principal matched by identity 0 +peer1.org2.example.com | [1b21 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer1.org2.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer1.org2.example.com | [1b22 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer1.org2.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU 0xc0042e0b50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b24 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e0b50 gate 1602702102616754400 evaluation succeeds +peer1.org2.example.com | [1b25 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b26 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b27 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b28 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b29 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b2a 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1a38 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a39 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 gate 1602702097948538000 evaluation succeeds +peer0.org1.example.com | [1a3a 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a3b 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a3c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a3d 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19e7 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [19e8 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19e9 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ea 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19eb 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [19ec 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [19ed 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ee 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [19ef 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19f0 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19f1 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [19f2 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [19f3 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [19f4 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 gate 1602702102463989700 evaluation starts +peer0.org2.example.com | [19f5 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19f6 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [19f7 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 principal matched by identity 0 +peer0.org2.example.com | [19f8 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer0.org2.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer0.org2.example.com | [19f9 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer0.org2.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer0.org2.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer0.org2.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer0.org2.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer0.org2.example.com | [19fa 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [19fb 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482cb0 gate 1602702102463989700 evaluation succeeds +peer0.org2.example.com | [19fc 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19fd 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19fe 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19ff 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a00 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [17d1 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17d2 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17d3 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17d4 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17d5 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17d6 10-14 19:01:38.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [17d7 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d8 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d9 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17da 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [17db 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17dc 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17dd 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [17de 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [17df 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17e0 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17e1 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [17e2 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [17e3 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17e4 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a01 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1a02 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a03 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a04 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1a05 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a06 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a07 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a08 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1a09 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a0a 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a0b 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a0c 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1a0d 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1a0e 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a0f 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a10 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a11 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a12 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a13 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a14 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a15 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a16 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a17 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a18 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1a19 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a1a 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a1b 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a1c 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a1d 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1a1e 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b2b 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b2c 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b2d 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1b2e 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b2f 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b30 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b31 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1b32 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b33 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b34 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b35 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1b36 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1b37 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b38 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b39 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b3a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b3b 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b3c 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b3d 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b3e 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b3f 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b40 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b41 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1b42 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b43 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b44 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b45 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1b46 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b48 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b47 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4a 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b49 10-14 19:01:42.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4b 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b4c 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a1f 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a20 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a21 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a22 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a23 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a24 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a25 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e69a0 gate 1602702102613158300 evaluation starts +peer0.org2.example.com | [1a26 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e69a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a27 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e69a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1a28 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e69a0 principal matched by identity 0 +peer0.org2.example.com | [1a29 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer0.org2.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer0.org2.example.com | [1a2a 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer0.org2.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU 0xc0044e69a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a2c 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e69a0 gate 1602702102613158300 evaluation succeeds +peer0.org2.example.com | [1a2d 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a2e 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a2f 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a30 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a31 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a32 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1a33 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1a34 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a35 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1a36 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a37 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a38 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a39 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1a3a 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a3b 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a3c 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a3d 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a3e 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a3f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a40 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a3e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a42 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a43 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a44 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a45 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a46 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a41 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a47 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a48 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a49 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a4a 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a4b 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a4c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a4d 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a4e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 gate 1602702097954802300 evaluation starts +peer0.org1.example.com | [1a4f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a50 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1a51 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 principal matched by identity 0 +peer0.org1.example.com | [1a52 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1a53 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1a54 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a55 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 gate 1602702097954802300 evaluation succeeds +peer0.org1.example.com | [1a56 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a57 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a58 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a59 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a5a 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a5b 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a5c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a5d 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1a5e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1a5f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1a60 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | [1b4d 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4e 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4f 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b50 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b51 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b52 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b53 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b54 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b55 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b56 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b57 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 gate 1602702102959739000 evaluation starts +peer1.org2.example.com | [1b58 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b59 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b5a 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b5b 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 principal evaluation fails +peer1.org2.example.com | [1b5c 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043070c0 gate 1602702102959739000 evaluation fails +peer1.org2.example.com | [1b5d 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b5e 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b5f 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b60 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 gate 1602702102961932200 evaluation starts +peer1.org2.example.com | [1b61 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b62 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b63 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 principal matched by identity 0 +peer1.org2.example.com | [1b64 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1b65 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1b66 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b67 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004307630 gate 1602702102961932200 evaluation succeeds +peer1.org2.example.com | [1b68 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b69 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b6a 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b6b 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b6c 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b6d 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a3f 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a40 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1a41 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a42 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1a44 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a43 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a45 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a46 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a47 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a48 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a49 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a4a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a4b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a4c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a4d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a4e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a4f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a50 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a51 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a52 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a53 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 gate 1602702102641582200 evaluation starts +peer0.org2.example.com | [1a54 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a55 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b6e 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b6f 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b70 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b71 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b72 10-14 19:01:42.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b73 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b74 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 gate 1602702102970099300 evaluation starts +peer1.org2.example.com | [1b75 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b76 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b77 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b78 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 principal evaluation fails +peer1.org2.example.com | [1b79 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338830 gate 1602702102970099300 evaluation fails +peer1.org2.example.com | [1b7a 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b7b 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b7c 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b7d 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 gate 1602702102971054500 evaluation starts +peer1.org2.example.com | [1b7e 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b7f 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b80 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 principal matched by identity 0 +peer1.org2.example.com | [1b81 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1b82 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1b83 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b84 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004338da0 gate 1602702102971054500 evaluation succeeds +peer1.org2.example.com | [1b85 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b86 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b87 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b88 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b89 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1b8a 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1b8b 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1b8c 10-14 19:01:42.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1b8d 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a56 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 principal matched by identity 0 +peer0.org2.example.com | [1a57 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1a58 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1a59 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a5a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045208d0 gate 1602702102641582200 evaluation succeeds +peer0.org2.example.com | [1a5b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a5c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a5d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a5e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a5f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1a60 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1a61 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1a62 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1a63 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a64 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a65 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a66 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a67 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a68 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a69 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a6a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a6b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 gate 1602702102645462100 evaluation starts +peer0.org2.example.com | [1a6c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a6d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1a6e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 principal matched by identity 0 +peer0.org2.example.com | [1a6f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [17e5 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17e6 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17e7 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17e8 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17e9 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17ea 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17eb 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 gate 1602702098348277700 evaluation starts +peer1.org1.example.com | [17ec 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17ed 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [17ee 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 principal matched by identity 0 +peer1.org1.example.com | [17ef 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [17f0 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [17f1 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17f2 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045080e0 gate 1602702098348277700 evaluation succeeds +peer1.org1.example.com | [17f4 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17f5 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17f6 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [17f7 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17f8 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17f3 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [17f9 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17fb 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17fc 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17fd 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17fa 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [17fe 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17ff 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1801 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610081801 +peer1.org1.example.com | [1800 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1803 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1802 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 50CF663FB56B71F8A63918555D53D31F8B04ADFFE5AE83C5D6E8AE0FD3810B2B +peer1.org2.example.com | [1b8e 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b8f 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b90 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b91 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b92 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b93 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b94 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b95 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b96 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b97 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b98 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 gate 1602702102984953400 evaluation starts +peer1.org2.example.com | [1b99 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b9a 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1b9b 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b9c 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 principal evaluation fails +peer1.org2.example.com | [1b9d 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434cfd0 gate 1602702102984953400 evaluation fails +peer1.org2.example.com | [1b9e 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b9f 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ba0 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ba1 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 gate 1602702102986266000 evaluation starts +peer1.org2.example.com | [1ba2 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ba3 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1ba4 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 principal matched by identity 0 +peer1.org2.example.com | [1ba5 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1ba6 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1ba7 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ba8 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00434d540 gate 1602702102986266000 evaluation succeeds +peer1.org2.example.com | [1ba9 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1baa 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bab 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1bac 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1bad 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bae 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1baf 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1bb0 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bb1 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bb2 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1bb3 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1bb4 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1bb5 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 gate 1602702102989278500 evaluation starts +peer1.org2.example.com | [1bb6 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bb7 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1bb8 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1bb9 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 principal evaluation fails +peer1.org2.example.com | [1bba 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368740 gate 1602702102989278500 evaluation fails +peer1.org2.example.com | [1bbb 10-14 19:01:42.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bbc 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bbd 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1bbe 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 gate 1602702102990340700 evaluation starts +peer1.org2.example.com | [1bbf 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bc0 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bc1 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1bc3 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 principal matched by identity 0 +peer1.org2.example.com | [1bc4 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1bc5 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1bc6 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bc2 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bc7 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1bc8 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004368cb0 gate 1602702102990340700 evaluation succeeds +peer1.org2.example.com | [1bca 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bcb 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bcc 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1bcd 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1bc9 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bce 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bcf 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1bd0 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bd1 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bd2 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bd3 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1bd4 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1bd5 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1bd6 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1bd7 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bd8 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bd9 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bda 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bdb 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bdc 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1bdd 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bde 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bdf 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1be0 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1be1 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1be2 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 gate 1602702102999382400 evaluation starts +peer1.org2.example.com | [1be3 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1be4 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1be5 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1be6 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 principal evaluation fails +peer1.org2.example.com | [1be7 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004313fb0 gate 1602702102999382400 evaluation fails +peer1.org2.example.com | [1be8 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1be9 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bea 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1a61 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a62 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a63 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a64 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a65 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a66 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a67 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a68 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a69 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 gate 1602702097960424900 evaluation starts +peer0.org1.example.com | [1a6a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a6b 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1a6c 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 principal matched by identity 0 +peer0.org1.example.com | [1a6d 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1a6e 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1a6f 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a70 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 gate 1602702097960424900 evaluation succeeds +peer0.org1.example.com | [1a71 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a72 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a73 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a74 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a75 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a76 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1805 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1804 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 gate 1602702098356865100 evaluation starts +peer1.org1.example.com | [1806 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1807 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1808 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 principal matched by identity 0 +peer1.org1.example.com | [1809 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [180a 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [180b 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [180c 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b7ad0 gate 1602702098356865100 evaluation succeeds +peer1.org1.example.com | [180d 10-14 19:01:38.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [180e 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [180f 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1810 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1811 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1812 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1813 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1814 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1815 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1816 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1818 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1819 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [181b 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [181c 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [181d 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [181a 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1817 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [181e 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1820 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1821 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1822 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1823 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a70 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1beb 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 gate 1602702103000789400 evaluation starts +peer1.org2.example.com | [1bec 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bed 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1bee 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 principal matched by identity 0 +peer1.org2.example.com | [1bef 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1a77 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a78 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a79 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a7a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a7b 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a7c 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a7d 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 gate 1602702097966467300 evaluation starts +peer0.org1.example.com | [1a7e 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a7f 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1a80 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 principal matched by identity 0 +peer0.org1.example.com | [1a81 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1a82 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1a83 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a84 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 gate 1602702097966467300 evaluation succeeds +peer0.org1.example.com | [1a85 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a86 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a87 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a88 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a89 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8b 10-14 19:01:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8c 10-14 19:01:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8d 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8e 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a8f 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a90 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a91 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a92 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a93 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a94 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a95 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a96 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1a97 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a98 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a99 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1824 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1825 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1826 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1827 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [181f 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1828 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1829 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [182a 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 gate 1602702098370306700 evaluation starts +peer1.org1.example.com | [182b 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [182c 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [182d 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 principal matched by identity 0 +peer1.org1.example.com | [182e 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [182f 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1830 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1831 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045332f0 gate 1602702098370306700 evaluation succeeds +peer1.org1.example.com | [1832 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1833 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1834 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1835 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1836 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1837 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1838 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1839 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [183a 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [183b 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [183c 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [183d 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [183e 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 gate 1602702098376263700 evaluation starts +peer1.org1.example.com | [183f 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1840 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1841 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 principal matched by identity 0 +peer1.org1.example.com | [1842 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1843 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1844 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1845 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455e4f0 gate 1602702098376263700 evaluation succeeds +peer1.org1.example.com | [1846 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1847 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1848 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1849 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [184a 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [184b 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [184c 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [184d 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [184e 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [184f 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1850 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1852 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1851 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1853 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1854 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1855 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1856 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1857 10-14 19:01:38.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1858 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [185a 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [185b 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [185c 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [185d 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [185e 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [185f 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1859 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1860 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bf0 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1bf1 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bf2 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a0520 gate 1602702103000789400 evaluation succeeds +peer1.org2.example.com | [1bf3 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bf4 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1bf5 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1bf6 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1bf7 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bf8 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bf9 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1bfa 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bfb 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bfc 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1bfd 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1bfe 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1bff 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 gate 1602702103005090200 evaluation starts +peer1.org2.example.com | [1c00 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c01 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1c02 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c03 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 principal evaluation fails +peer1.org2.example.com | [1c04 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1720 gate 1602702103005090200 evaluation fails +peer1.org2.example.com | [1c05 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c06 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c07 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c08 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 gate 1602702103009616000 evaluation starts +peer1.org2.example.com | [1c09 10-14 19:01:43.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c0a 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1c0b 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 principal matched by identity 0 +peer1.org2.example.com | [1c0c 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1c0d 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1c0e 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c0f 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a1c90 gate 1602702103009616000 evaluation succeeds +peer1.org2.example.com | [1c10 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c11 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1a9a 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a9b 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a9c 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1a9d 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9e 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a9f 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aa0 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1aa1 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1aa2 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1aa3 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1aa4 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 gate 1602702098171213500 evaluation starts +peer0.org1.example.com | [1aa5 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1aa6 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1aa7 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 principal matched by identity 0 +peer0.org1.example.com | [1aa8 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org1.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org1.example.com | [1aa9 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org1.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org1.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer0.org1.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer0.org1.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org1.example.com | [1aaa 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1aab 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 gate 1602702098171213500 evaluation succeeds +peer0.org1.example.com | [1aac 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1aad 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1aae 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1aaf 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ab0 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ab1 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1ab2 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ab3 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1a71 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a72 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453c8b0 gate 1602702102645462100 evaluation succeeds +peer0.org2.example.com | [1a73 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a74 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a75 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a76 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a77 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a78 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a79 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a7a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a7b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a7c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a7d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a7e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a7f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a80 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a81 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a82 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 gate 1602702102646610100 evaluation starts +peer0.org2.example.com | [1a83 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a84 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1a85 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 principal matched by identity 0 +peer0.org2.example.com | [1a86 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1a87 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1a88 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a89 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453dd30 gate 1602702102646610100 evaluation succeeds +peer0.org2.example.com | [1a8a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a8b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a8c 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a8d 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a8e 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a8f 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c12 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c13 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c14 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1c15 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1c16 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1c17 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1c18 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c19 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c1a 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c1b 10-14 19:01:43.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c1c 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1c1d 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1c1e 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c1f 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610091801 +peer1.org2.example.com | [1c20 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F11808A87325784C0BD4800B047BC2EE3C5A8E0A89750026CEBFD1E33C454CBE +peer1.org2.example.com | [1c21 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1c22 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c23 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c24 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c25 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c26 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c27 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c28 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c29 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c2a 10-14 19:01:43.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c2b 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c2c 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c2d 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c2e 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c2f 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1c30 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d c0 d5 37 60 6c ee f2 75 b0 fa 74 d3 90 16 4b |M..7`l..u..t...K| +peer1.org2.example.com | 00000010 51 3e 53 ef 2f 15 02 47 63 50 16 ae bb fd 74 e5 |Q>S./..GcP....t.| +peer1.org2.example.com | [1c31 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af de c6 3a 6f 91 e8 6e 9a da bc |0E.!....:o..n...| +peer1.org2.example.com | 00000010 24 e0 3a 99 0a e6 1a 58 26 6f 9f 32 ef 9f 76 fa |$.:....X&o.2..v.| +peer1.org2.example.com | 00000020 3b 59 b4 66 6a 02 20 28 68 d3 6a fa 40 64 37 cf |;Y.fj. (h.j.@d7.| +peer1.org2.example.com | 00000030 a0 47 3f 34 03 a8 09 36 aa 20 85 b3 54 e1 40 07 |.G?4...6. ..T.@.| +peer1.org2.example.com | 00000040 28 11 45 2e 29 c9 0a |(.E.)..| +peer0.org2.example.com | [1a90 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a91 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a92 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a93 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a94 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a95 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1a96 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 gate 1602702102653547300 evaluation starts +peer0.org2.example.com | [1a97 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a98 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1a99 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 principal matched by identity 0 +peer0.org2.example.com | [1a9a 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1a9b 10-14 19:01:42.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1a9c 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a9d 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004554f30 gate 1602702102653547300 evaluation succeeds +peer0.org2.example.com | [1a9e 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a9f 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1aa0 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1aa1 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1aa2 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1aa3 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1aa4 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1aa5 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1aa6 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aa7 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aa8 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aa9 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aaa 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c32 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c33 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1c34 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1c35 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1c36 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1c37 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c38 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c39 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c3a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c3b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c3c 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c3d 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c3e 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c3f 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c40 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c41 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c42 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c43 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c44 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c45 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c46 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c47 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c48 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c49 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c4a 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c4b 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c4c 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c4d 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c4e 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101E +peer1.org2.example.com | [1c4f 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 27FD4265780208250B6A9AD049E3D09C94A09B845E071EB1BB8E6328D91BB962 +peer1.org2.example.com | [1c50 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c51 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1c52 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1c53 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1c54 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1861 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1862 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1863 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1864 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1865 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1866 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161022 +peer1.org1.example.com | [1867 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8D02052B1024AF3F7FEEE1A5182E89B0FC4D24D76B00EC76679592945EF41974 +peer1.org1.example.com | [1868 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1869 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [186a 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [186b 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [186c 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [186e 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [186d 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1870 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1871 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [186f 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1872 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1874 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1873 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1875 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab4 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1ab5 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab6 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab7 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab8 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1ab9 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aba 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1abb 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1abc 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1abd 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1abe 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1abf 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1ac0 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac1 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac2 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac3 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac4 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac5 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac6 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac7 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac8 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac9 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1aca 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1acb 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1acc 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1acd 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ace 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1acf 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1ad0 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c55 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c56 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c57 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c59 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c5a 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c5b 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1c58 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1c5d 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c5c 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c5e 10-14 19:01:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c5f 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1c60 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c61 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c62 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c63 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c64 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c65 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1c66 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c67 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c68 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c69 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c6a 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c6b 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c6c 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c6d 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 gate 1602702105435788400 evaluation starts +peer1.org2.example.com | [1c6e 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c6f 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1c70 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c71 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 principal evaluation fails +peer1.org2.example.com | [1c72 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f7370 gate 1602702105435788400 evaluation fails +peer1.org2.example.com | [1c73 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c74 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c75 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c76 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 gate 1602702105442270100 evaluation starts +peer1.org2.example.com | [1c77 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c78 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1c79 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 principal matched by identity 0 +peer1.org2.example.com | [1c7a 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a cc f9 94 84 77 83 f5 1e 8d 48 77 ec a3 ad af |*....w....Hw....| +peer1.org2.example.com | 00000010 3d f4 b3 71 d8 80 ba 17 3b 0d ad 74 85 02 16 a2 |=..q....;..t....| +peer1.org2.example.com | [1c7b 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c7c 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 24 49 15 22 93 d5 f1 59 82 1f 2d |0D. c$I."...Y..-| +peer1.org2.example.com | 00000010 29 13 44 5c 32 47 6d 52 66 be 89 ff 57 08 c0 54 |).D\2GmRf...W..T| +peer1.org2.example.com | 00000020 8f 22 1f 6d 02 20 7a f6 07 13 c9 3b 87 6f ef b5 |.".m. z....;.o..| +peer1.org2.example.com | 00000030 c3 0c 75 29 85 27 26 e3 54 14 a7 bd ba 05 91 26 |..u).'&.T......&| +peer1.org2.example.com | 00000040 ee df 14 f9 95 ca |......| +peer1.org2.example.com | [1c7d 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c7e 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f78e0 gate 1602702105442270100 evaluation succeeds +peer1.org2.example.com | [1c7f 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c80 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c81 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c82 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c83 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c84 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1c85 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c86 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1c87 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1c88 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1c89 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c8a 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c8b 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c8c 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c8d 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c8e 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c8f 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c90 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c91 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1aab 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1aac 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1aad 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1aae 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1aaf 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ab0 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1ab1 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 gate 1602702102665606500 evaluation starts +peer0.org2.example.com | [1ab2 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ab3 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1ab4 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 principal matched by identity 0 +peer0.org2.example.com | [1ab5 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1ab6 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1ab7 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ab8 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004571160 gate 1602702102665606500 evaluation succeeds +peer0.org2.example.com | [1ab9 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1aba 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1abb 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1abc 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1abd 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1abe 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1abf 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ac0 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ac1 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ac2 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ac3 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ac4 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1ac5 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 gate 1602702102668788900 evaluation starts +peer0.org2.example.com | [1ac6 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ad1 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ad2 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ad3 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ad4 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ad5 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ad6 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ad7 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 gate 1602702098296070300 evaluation starts +peer0.org1.example.com | [1ad8 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ad9 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1ada 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 principal matched by identity 0 +peer0.org1.example.com | [1adb 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer0.org1.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer0.org1.example.com | [1adc 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer0.org1.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer0.org1.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer0.org1.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer0.org1.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer0.org1.example.com | [1add 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ade 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 gate 1602702098296070300 evaluation succeeds +peer0.org1.example.com | [1adf 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ae0 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ae1 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ae2 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ae3 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ae4 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ae5 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ae7 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ae8 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ae6 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1ae9 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1aea 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ac7 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1ac8 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 principal matched by identity 0 +peer0.org2.example.com | [1ac9 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1aca 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1acb 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1acc 10-14 19:01:42.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594360 gate 1602702102668788900 evaluation succeeds +peer0.org2.example.com | [1acd 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ace 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1acf 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ad0 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ad1 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad2 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad3 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1ad4 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad5 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ad6 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ad7 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ad8 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ad9 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1ada 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1adb 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1adc 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1add 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ade 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1adf 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae0 10-14 19:01:42.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ae1 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae2 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae3 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae4 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1876 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1877 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [1878 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1879 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [187a 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [187b 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [187c 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [187d 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [187e 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org1.example.com | [187f 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org1.example.com | [1880 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1881 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 f4 02 83 1c 76 63 d2 92 2c 34 ee |0D. 7....vc..,4.| +peer1.org1.example.com | 00000010 1a 2f 03 8d 06 27 a6 c8 4a f3 7e cb a6 7e 7f d1 |./...'..J.~..~..| +peer1.org1.example.com | 00000020 b0 da b7 08 02 20 25 36 db 7b 4e 86 a2 98 a5 57 |..... %6.{N....W| +peer1.org1.example.com | 00000030 33 e9 06 eb a3 c5 64 6a 2d 29 92 21 bb 1c 05 5e |3.....dj-).!...^| +peer1.org1.example.com | 00000040 ea 58 13 87 2f 5b |.X../[| +peer1.org1.example.com | [1882 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1883 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1884 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1885 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1886 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1887 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1888 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1889 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [188a 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [188b 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1aeb 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1aec 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aed 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aee 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aef 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1af0 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af1 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af2 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af3 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1af4 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1af5 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1af6 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1af7 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1af8 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1af9 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1afa 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1afb 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1afc 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 cf 66 3f b5 6b 71 f8 a6 39 18 55 5d 53 d3 1f |P.f?.kq..9.U]S..| +peer0.org1.example.com | 00000010 8b 04 ad ff e5 ae 83 c5 d6 e8 ae 0f d3 81 0b 2b |...............+| +peer0.org1.example.com | [1afd 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 9e e2 ad 36 7a 66 cf 1e 29 85 |0E.!.....6zf..).| +peer0.org1.example.com | 00000010 48 e0 c2 8f 71 21 36 31 b8 b2 6f be d7 10 26 0b |H...q!61..o...&.| +peer0.org1.example.com | 00000020 f6 d1 60 a7 f7 02 20 38 eb 95 75 ab 58 65 74 d7 |..`... 8..u.Xet.| +peer0.org1.example.com | 00000030 07 9b 45 4a 4d e5 f4 3f e3 f8 0f aa 22 ba c9 e4 |..EJM..?...."...| +peer0.org1.example.com | 00000040 53 28 8e bd cd 7e 44 |S(...~D| +peer0.org1.example.com | [1afe 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1aff 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b00 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b01 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [1b02 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [1b03 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [1b04 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [1b05 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [1b06 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b07 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b08 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1b09 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [188c 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [188d 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [188e 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [188f 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1890 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1891 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1892 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 gate 1602702098478582900 evaluation starts +peer1.org1.example.com | [1893 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1894 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1895 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 principal matched by identity 0 +peer1.org1.example.com | [1896 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer1.org1.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer1.org1.example.com | [1897 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer1.org1.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer1.org1.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer1.org1.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer1.org1.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer1.org1.example.com | [1898 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1899 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a02c0 gate 1602702098478582900 evaluation succeeds +peer1.org1.example.com | [189a 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [189b 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [189c 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [189d 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [189e 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [189f 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a0 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [18a1 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org1.example.com | [18a2 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org1.example.com | [18a3 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18a4 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18a5 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a6 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a7 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [18a8 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a9 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [18aa 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [18ab 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ae5 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae6 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ae7 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1ae8 10-14 19:01:42.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ae9 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aea 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 18 08 a8 73 25 78 4c 0b d4 80 0b 04 7b c2 ee |....s%xL.....{..| +peer0.org2.example.com | 00000010 3c 5a 8e 0a 89 75 00 26 ce bf d1 e3 3c 45 4c be | DEBU Verify: sig = 00000000 30 45 02 21 00 81 4f ef f0 c3 7c ea 08 ef 22 ad |0E.!..O...|...".| +peer0.org2.example.com | 00000010 19 d4 24 ae 76 b5 90 ae bc 43 0e a0 6f c2 38 99 |..$.v....C..o.8.| +peer0.org2.example.com | 00000020 30 b9 31 fe 4b 02 20 34 ef 73 e4 50 a4 91 ca 13 |0.1.K. 4.s.P....| +peer0.org2.example.com | 00000030 bc 66 2c a1 2d b9 53 77 22 1e 6c 1f 76 32 b0 0c |.f,.-.Sw".l.v2..| +peer0.org2.example.com | 00000040 7a a6 da 39 15 ef 81 |z..9...| +peer1.org2.example.com | [1c92 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c93 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c94 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c95 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c96 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c97 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c98 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c99 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9a 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1c9b 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9c 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1c9d 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c9e 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1c9f 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ca0 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca1 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ca2 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca3 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ca4 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1ca5 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ca6 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ca7 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ca8 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ca9 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1caa 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1cab 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1cac 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 gate 1602702105618498000 evaluation starts +peer1.org2.example.com | [1cad 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1cae 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1caf 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1cb0 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 principal evaluation fails +peer1.org1.example.com | [18ac 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [18ad 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18ae 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18af 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [18b0 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [18b1 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18b2 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 gate 1602702098486922900 evaluation starts +peer1.org1.example.com | [18b3 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18b4 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [18b5 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 principal matched by identity 0 +peer1.org1.example.com | [18b6 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer1.org1.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer1.org1.example.com | [18b7 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer1.org1.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer1.org1.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer1.org1.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer1.org1.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer1.org1.example.com | [18b9 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [18ba 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc2d0 gate 1602702098486922900 evaluation succeeds +peer1.org1.example.com | [18bb 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [18bc 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [18bd 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [18be 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [18b8 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes +peer1.org1.example.com | [18bf 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18c1 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c2 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [18c0 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c3 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org1.example.com | [18c4 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org1.example.com | [18c5 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18c6 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18c7 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c8 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c9 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ca 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes +peer1.org1.example.com | [18cb 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [18cc 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer1.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer1.org1.example.com | [18cd 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer1.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer1.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer1.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer1.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer1.org1.example.com | [18ce 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [1aec 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aed 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aee 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1aef 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1af0 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1af1 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [1af2 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1af3 10-14 19:01:43.69 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [1af4 10-14 19:01:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1af5 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101E +peer0.org2.example.com | [1af6 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4DC0D537606CEEF275B0FA74D390164B513E53EF2F150247635016AEBBFD74E5 +peer0.org2.example.com | [1af7 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1af8 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1af9 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1afa 10-14 19:01:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1afb 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1afc 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1afd 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1afe 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1aff 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1b00 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b01 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1b02 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b03 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b04 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b05 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b06 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b07 10-14 19:01:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b08 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b09 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b0a 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b0b 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1b0c 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 fd 42 65 78 02 08 25 0b 6a 9a d0 49 e3 d0 9c |'.Bex..%.j..I...| +peer0.org2.example.com | 00000010 94 a0 9b 84 5e 07 1e b1 bb 8e 63 28 d9 1b b9 62 |....^.....c(...b| +peer0.org2.example.com | [1b0d 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 6b dd 52 2c 78 e7 17 1d 7f 8e |0E.!..k.R,x.....| +peer0.org2.example.com | 00000010 96 d7 dc 2d 41 84 ca 93 dc ea de 22 52 27 6e f6 |...-A......"R'n.| +peer0.org2.example.com | 00000020 e1 49 46 6e c6 02 20 20 6a 61 6e 7e 3b 9d 4c ba |.IFn.. jan~;.L.| +peer0.org2.example.com | 00000030 9b c8 ad 5b 3a 7f d5 8d 47 a3 d6 54 e5 42 b2 d3 |...[:...G..T.B..| +peer0.org2.example.com | 00000040 d4 d0 f7 98 1d 2b ba |.....+.| +peer0.org2.example.com | [1b0e 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b0f 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1b0a 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b0b 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b0c 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b0d 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b0e 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer0.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer0.org1.example.com | [1b0f 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer0.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer0.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer0.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer0.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer0.org1.example.com | [1b10 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1b11 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 f4 02 83 1c 76 63 d2 92 2c 34 ee |0D. 7....vc..,4.| +peer0.org1.example.com | 00000010 1a 2f 03 8d 06 27 a6 c8 4a f3 7e cb a6 7e 7f d1 |./...'..J.~..~..| +peer0.org1.example.com | 00000020 b0 da b7 08 02 20 25 36 db 7b 4e 86 a2 98 a5 57 |..... %6.{N....W| +peer0.org1.example.com | 00000030 33 e9 06 eb a3 c5 64 6a 2d 29 92 21 bb 1c 05 5e |3.....dj-).!...^| +peer0.org1.example.com | 00000040 ea 58 13 87 2f 5b |.X../[| +peer0.org1.example.com | [1b12 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1b13 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1b14 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1b15 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1b16 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1b17 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b18 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b19 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b1a 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1b1b 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b1c 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b1d 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b1e 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1b1f 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b20 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b21 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b22 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b23 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b24 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b25 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 52 c1 e7 b5 a1 dc ab 70 8c c6 e0 3d f9 e7 b1 |.R......p...=...| +peer0.org1.example.com | 00000010 e2 38 8c ef ea 9b 19 eb a1 0b 54 7d 5b 25 b0 d9 |.8........T}[%..| +peer0.org1.example.com | [1b26 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 c2 cb 71 1d b0 f4 58 20 45 be |0E.!....q...X E.| +peer0.org1.example.com | 00000010 70 26 3e b0 b5 68 3d 99 67 88 ff 89 ac 29 6c ad |p&>..h=.g....)l.| +peer0.org1.example.com | 00000020 35 7d 5d 6b b5 02 20 3f 32 66 6f 62 5c bf 13 de |5}]k.. ?2fob\...| +peer0.org1.example.com | 00000030 48 67 7b bd ef 4c 70 9f 7f c5 27 6d 4a de 79 63 |Hg{..Lp...'mJ.yc| +peer0.org1.example.com | 00000040 20 6b cb 2f 95 43 fa | k./.C.| +peer0.org1.example.com | [1b27 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1b28 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 61 44 60 f1 ec fc 31 52 5b 50 |0E.!..aD`...1R[P| +peer0.org1.example.com | 00000010 62 62 ea 9a 2c 47 03 24 e0 e5 4b 28 ae 1f 8c 94 |bb..,G.$..K(....| +peer0.org1.example.com | 00000020 08 5a ff e7 21 02 20 0a a5 fc 90 71 2f 34 3d b2 |.Z..!. ....q/4=.| +peer0.org1.example.com | 00000030 1a 0a e8 10 22 6a cd d2 2f c3 56 91 23 86 a2 ef |...."j../.V.#...| +peer0.org1.example.com | 00000040 8b ba 5d c4 c6 2e 10 |..]....| +peer0.org1.example.com | [1b29 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b2a 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1b2b 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b2c 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b2d 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b2e 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1b2f 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b30 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b31 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1b32 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b33 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1b34 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b35 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1b36 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b37 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b38 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b39 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18cf 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 f4 02 83 1c 76 63 d2 92 2c 34 ee |0D. 7....vc..,4.| +peer1.org1.example.com | 00000010 1a 2f 03 8d 06 27 a6 c8 4a f3 7e cb a6 7e 7f d1 |./...'..J.~..~..| +peer1.org1.example.com | 00000020 b0 da b7 08 02 20 25 36 db 7b 4e 86 a2 98 a5 57 |..... %6.{N....W| +peer1.org1.example.com | 00000030 33 e9 06 eb a3 c5 64 6a 2d 29 92 21 bb 1c 05 5e |3.....dj-).!...^| +peer1.org1.example.com | 00000040 ea 58 13 87 2f 5b |.X../[| +peer1.org1.example.com | [18d0 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [18d1 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [18d2 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18d3 10-14 19:01:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18d4 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18d5 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18d6 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [18d7 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [18d8 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18d9 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [18da 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [18db 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18dc 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [18dd 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [18de 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer1.org1.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer1.org1.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer1.org1.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer0.org2.example.com | [1b10 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1b11 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1b12 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1b13 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b14 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b15 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b16 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b17 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b18 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b19 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1b1a 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b1b 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b1c 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b1d 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1b1e 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b1f 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b20 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b21 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b22 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b23 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b24 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b25 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b26 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b27 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b28 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b29 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b2a 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b2b 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1b2c 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b2d 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b2e 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b2f 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b30 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b31 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b32 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b33 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 gate 1602702105432534600 evaluation starts +peer0.org2.example.com | [1b34 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b35 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1b36 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 principal matched by identity 0 +peer0.org2.example.com | [1b37 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a cc f9 94 84 77 83 f5 1e 8d 48 77 ec a3 ad af |*....w....Hw....| +peer0.org2.example.com | 00000010 3d f4 b3 71 d8 80 ba 17 3b 0d ad 74 85 02 16 a2 |=..q....;..t....| +peer0.org2.example.com | [1b38 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 24 49 15 22 93 d5 f1 59 82 1f 2d |0D. c$I."...Y..-| +peer0.org2.example.com | 00000010 29 13 44 5c 32 47 6d 52 66 be 89 ff 57 08 c0 54 |).D\2GmRf...W..T| +peer0.org2.example.com | 00000020 8f 22 1f 6d 02 20 7a f6 07 13 c9 3b 87 6f ef b5 |.".m. z....;.o..| +peer0.org2.example.com | 00000030 c3 0c 75 29 85 27 26 e3 54 14 a7 bd ba 05 91 26 |..u).'&.T......&| +peer0.org2.example.com | 00000040 ee df 14 f9 95 ca |......| +peer0.org2.example.com | [1b39 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b3a 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3750 gate 1602702105432534600 evaluation succeeds +peer0.org2.example.com | [1b3b 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b3c 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b3d 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b3e 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b3f 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b40 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1b41 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1b42 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1b43 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1b44 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b45 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b46 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b47 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b48 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b49 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b4a 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b4b 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b3a 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3b 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3c 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb1 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b080 gate 1602702105618498000 evaluation fails +peer1.org2.example.com | [1cb2 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1cb3 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1cb4 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1cb5 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 gate 1602702105624965900 evaluation starts +peer1.org2.example.com | [1cb6 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1cb7 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1cb8 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 principal matched by identity 0 +peer1.org2.example.com | [1cb9 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 9c 71 9f 67 23 2b ac 2c e5 b3 88 8c fb d1 f3 |..q.g#+.,.......| +peer1.org2.example.com | 00000010 26 c7 45 93 8a a1 19 14 cc 08 ce 63 d6 bc 4a 9c |&.E........c..J.| +peer1.org2.example.com | [1cba 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 cf 81 47 03 b3 b8 20 05 81 49 0a |0D. I..G... ..I.| +peer1.org2.example.com | 00000010 c7 5a 91 9a 2a 4e 90 94 56 a8 fa 66 08 66 af d4 |.Z..*N..V..f.f..| +peer1.org2.example.com | 00000020 9e fd 5a 8a 02 20 0a 41 fb 98 74 b9 8f df 2e 98 |..Z.. .A..t.....| +peer1.org2.example.com | 00000030 0e f4 ae b8 59 b4 63 8c 2b 7c 27 af 70 48 1f 3c |....Y.c.+|'.pH.<| +peer1.org2.example.com | 00000040 14 e6 14 1b f2 e2 |......| +peer1.org2.example.com | [1cbb 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1cbc 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b5f0 gate 1602702105624965900 evaluation succeeds +peer1.org2.example.com | [1cbd 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cbe 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cc0 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cc1 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cbf 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cc2 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1cc3 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1cc4 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cc5 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1cc6 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1cc7 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1cc8 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1cc9 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cca 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ccb 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ccc 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cce 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ccf 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cd0 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd1 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ccd 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd2 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd3 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cd5 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd4 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd6 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cd7 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd8 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd9 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer1.org1.example.com | [18e0 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [18e1 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 e0 ea 4f 22 39 08 0d 11 9d |0E.!..7..O"9....| +peer1.org1.example.com | 00000010 a6 33 22 b5 26 d5 f6 d9 f1 2c df 27 be 88 41 5e |.3".&....,.'..A^| +peer1.org1.example.com | 00000020 f6 e0 35 c5 e4 02 20 6e 98 00 40 f4 5a 0c 2e a1 |..5... n..@.Z...| +peer1.org1.example.com | 00000030 50 7e a7 9c da e5 1c 53 a4 5a 08 72 b0 79 76 14 |P~.....S.Z.r.yv.| +peer1.org1.example.com | 00000040 18 ad 55 d9 bb ba f5 |..U....| +peer1.org1.example.com | [18e2 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [18e3 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [18e4 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [18e5 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [18e6 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [18e7 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e8 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18e9 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ea 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [18eb 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18ec 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18ed 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [18ee 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [18ef 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [18f0 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18f1 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [18f2 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [18f3 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f4 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f5 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f6 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18f7 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [18f8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f9 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18fa 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18fb 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18fc 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18fd 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18fe 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ff 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1900 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1901 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1902 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1903 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1904 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1905 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1906 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1907 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1908 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 gate 1602702100151076700 evaluation starts +peer1.org1.example.com | [1909 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [190a 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [190b 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 principal matched by identity 0 +peer1.org1.example.com | [190c 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 ec b1 c2 56 8b 69 5e e5 1d cb d0 4b af 9c 63 |....V.i^....K..c| +peer1.org1.example.com | 00000010 79 c8 11 86 3a 3a 96 32 f3 0a da 29 72 ca 43 94 |y...::.2...)r.C.| +peer1.org1.example.com | [190d 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4a b1 31 e1 7e 54 36 25 a8 f9 |0E.!..J.1.~T6%..| +peer1.org1.example.com | 00000010 27 87 e6 6d f8 cd e2 4b f1 d5 90 22 3a 30 40 01 |'..m...K...":0@.| +peer1.org1.example.com | 00000020 f9 ee 8c be 83 02 20 12 fb fc fc d9 66 02 14 c3 |...... .....f...| +peer1.org1.example.com | 00000030 a9 9e fc 13 5c 44 b8 49 b8 0b 46 25 32 c8 39 91 |....\D.I..F%2.9.| +peer1.org1.example.com | 00000040 65 c8 f9 92 d7 f3 97 |e......| +peer1.org1.example.com | [190e 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [190f 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046220b0 gate 1602702100151076700 evaluation succeeds +peer1.org1.example.com | [1910 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1911 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1912 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1913 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1914 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1915 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1916 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1917 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1918 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1919 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [191a 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [191b 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [191c 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [191d 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [191e 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [191f 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1920 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1921 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1922 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1923 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1924 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1925 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1926 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1927 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1928 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1929 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [192a 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [192b 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [192c 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [192d 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [192e 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [192f 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1930 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1931 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1932 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1933 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1934 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1935 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1936 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1937 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1938 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1939 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [193a 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [193b 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [193c 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [193d 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [193e 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 gate 1602702100271576000 evaluation starts +peer1.org1.example.com | [193f 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1940 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1941 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 principal matched by identity 0 +peer1.org1.example.com | [1942 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 82 9f 34 4b d7 09 67 da 2c ae 20 58 e4 67 41 |...4K..g.,. X.gA| +peer1.org1.example.com | 00000010 30 a8 8a e8 86 d6 88 f7 bc 2f 81 eb 25 99 3c 55 |0......../..%. DEBU Verify: sig = 00000000 30 45 02 21 00 ac 2e 2f db 6f e7 29 9d c2 60 ef |0E.!.../.o.)..`.| +peer1.org1.example.com | 00000010 fe 29 06 82 6f 61 a3 8e fb 1d 7c 7e 94 65 a5 1a |.)..oa....|~.e..| +peer1.org1.example.com | 00000020 c2 c0 cb 0d f0 02 20 13 d9 c1 7f c2 72 af 51 de |...... .....r.Q.| +peer1.org1.example.com | 00000030 f8 98 07 c9 a1 95 62 44 4a 8f ab 29 de 54 66 a5 |......bDJ..).Tf.| +peer1.org1.example.com | 00000040 9e ab 78 f5 f6 4a 64 |..x..Jd| +peer1.org1.example.com | [1944 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1945 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648920 gate 1602702100271576000 evaluation succeeds +peer1.org1.example.com | [1946 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1947 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1948 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1949 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [194a 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [194b 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [194c 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [194d 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [194e 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [194f 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1950 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1951 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1952 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1953 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1954 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b4c 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b4d 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b4e 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b4f 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b50 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b51 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b3d 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3e 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3f 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b40 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b41 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b42 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b43 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b44 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b45 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b46 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b47 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b48 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b49 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101E +peer0.org1.example.com | [1b4a 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C4441523DE4024064A73FF405AD1CE35D5E8C43469AE8C64DA81398E24CA0E0 +peer0.org1.example.com | [1b4b 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b4c 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1b4d 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1b4e 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b4f 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b50 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b51 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b52 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b53 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b54 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b55 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b56 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b58 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b57 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b59 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b5a 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b5b 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b5c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1b5d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer0.org1.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer0.org1.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer0.org1.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer0.org1.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer0.org1.example.com | [1b5f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1b60 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 e0 ea 4f 22 39 08 0d 11 9d |0E.!..7..O"9....| +peer0.org1.example.com | 00000010 a6 33 22 b5 26 d5 f6 d9 f1 2c df 27 be 88 41 5e |.3".&....,.'..A^| +peer0.org1.example.com | 00000020 f6 e0 35 c5 e4 02 20 6e 98 00 40 f4 5a 0c 2e a1 |..5... n..@.Z...| +peer0.org1.example.com | 00000030 50 7e a7 9c da e5 1c 53 a4 5a 08 72 b0 79 76 14 |P~.....S.Z.r.yv.| +peer0.org1.example.com | 00000040 18 ad 55 d9 bb ba f5 |..U....| +peer0.org1.example.com | [1b61 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1b62 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1b63 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b64 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b65 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b66 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b67 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b68 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1955 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1956 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1957 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1958 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1959 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [195a 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [195b 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [195c 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [195d 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [195e 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [195f 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1960 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1961 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1962 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1965 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1966 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1967 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1968 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1963 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1969 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1964 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [196a 10-14 19:01:40.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [196b 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [196c 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161023 +peer1.org1.example.com | [196d 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DFD64F0CB25039AA052845BCA168AA85C9F9717FBC3FFACC12413D333368801C +peer1.org1.example.com | [196e 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [196f 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1970 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1971 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1972 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1973 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1974 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1975 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1976 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1977 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1978 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1979 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [197a 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197b 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [197d 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197c 10-14 19:01:40.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [197e 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197f 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1980 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1981 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1982 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1983 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1984 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 3a bf e4 ed 51 51 65 ff 35 0f db 60 cf 16 de |h:...QQe.5..`...| +peer1.org1.example.com | 00000010 87 bb 72 0b 23 1a 67 06 50 28 32 b8 97 b6 66 f4 |..r.#.g.P(2...f.| +peer1.org1.example.com | [1985 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c 95 ae f0 09 ec a2 74 65 8f fb |0E.!........te..| +peer1.org1.example.com | 00000010 14 9a 0a 9d b2 37 e3 7b 87 9f 45 3b d7 38 69 d2 |.....7.{..E;.8i.| +peer1.org1.example.com | 00000020 34 a2 22 19 78 02 20 23 91 76 d1 c5 03 82 4f 13 |4.".x. #.v....O.| +peer1.org1.example.com | 00000030 a8 ef 5e 54 e5 53 72 0a d2 77 cf 63 22 71 ba d9 |..^T.Sr..w.c"q..| +peer1.org1.example.com | 00000040 54 83 c6 82 6e e8 d0 |T...n..| +peer1.org1.example.com | [1986 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1987 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1988 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1989 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [198a 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [198b 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [198c 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [198d 10-14 19:01:40.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [198e 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [198f 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1990 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1991 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1992 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1993 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1994 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1995 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1996 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1997 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1998 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1999 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [199a 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199b 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [199c 10-14 19:01:40.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199d 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [199e 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199f 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19a0 10-14 19:01:40.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19a1 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a2 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a3 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19a4 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19a5 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19a6 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a7 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a8 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a9 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [19aa 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19ab 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ac 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ad 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ae 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19af 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b0 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b1 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b2 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b3 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b4 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [19b5 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b6 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [19b7 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [19b8 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b9 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ba 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [19bb 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b52 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1b53 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b54 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1b55 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b56 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b57 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b58 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b59 10-14 19:01:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b5a 10-14 19:01:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5b 10-14 19:01:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b5c 10-14 19:01:45.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5d 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b5e 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5f 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b60 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1b61 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b62 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b63 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b64 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b65 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b66 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b67 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b68 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 gate 1602702105619418200 evaluation starts +peer0.org2.example.com | [1b69 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b6a 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1b6b 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 principal matched by identity 0 +peer0.org2.example.com | [1b6c 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 9c 71 9f 67 23 2b ac 2c e5 b3 88 8c fb d1 f3 |..q.g#+.,.......| +peer0.org2.example.com | 00000010 26 c7 45 93 8a a1 19 14 cc 08 ce 63 d6 bc 4a 9c |&.E........c..J.| +peer0.org2.example.com | [1b6d 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 cf 81 47 03 b3 b8 20 05 81 49 0a |0D. I..G... ..I.| +peer0.org2.example.com | 00000010 c7 5a 91 9a 2a 4e 90 94 56 a8 fa 66 08 66 af d4 |.Z..*N..V..f.f..| +peer0.org2.example.com | 00000020 9e fd 5a 8a 02 20 0a 41 fb 98 74 b9 8f df 2e 98 |..Z.. .A..t.....| +peer0.org2.example.com | 00000030 0e f4 ae b8 59 b4 63 8c 2b 7c 27 af 70 48 1f 3c |....Y.c.+|'.pH.<| +peer0.org2.example.com | 00000040 14 e6 14 1b f2 e2 |......| +peer0.org2.example.com | [1b6e 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b6f 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004615740 gate 1602702105619418200 evaluation succeeds +peer0.org2.example.com | [1b70 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b71 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b72 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b73 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b74 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b75 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1b76 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1b77 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1b78 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1b79 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b7a 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b7b 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b7c 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b7d 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b7e 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b7f 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b80 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b81 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b82 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b83 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1b84 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b85 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1b86 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b87 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b88 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b89 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8a 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b8b 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8c 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b8d 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8e 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b8f 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b90 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b91 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b92 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b93 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b94 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b95 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b96 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b97 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1b98 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b99 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1b9a 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b9b 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1b9c 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b9d 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b9e 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba0 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b9f 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba1 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba2 10-14 19:01:46.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba3 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba4 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba5 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba6 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba7 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba8 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba9 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1baa 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bab 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bac 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1bad 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16101F +peer0.org2.example.com | [1bae 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2DAD6D8139A2B34089D08C19A42D900AD18E23D9ABC20CEBA3F55FB12EEE5A4A +peer0.org2.example.com | [1baf 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1bb0 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1bb1 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [1cda 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cdb 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cdc 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cdd 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cde 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cdf 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ce0 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce1 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce2 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce3 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce4 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce5 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce6 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce7 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce8 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ce9 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1cea 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ceb 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cec 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ced 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cee 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cef 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1cf0 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer1.org2.example.com | [1cf1 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer1.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer1.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer1.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer1.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer1.org2.example.com | [1cf2 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1cf3 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 60 b4 7e a1 d9 8c 2b 3e b7 b3 |0E.!..`.~...+>..| +peer0.org1.example.com | [1b69 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1b6a 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b6b 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b6c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b6d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b6e 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b6f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b70 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b71 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 gate 1602702098624680800 evaluation starts +peer0.org1.example.com | [1b72 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b73 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1b74 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 principal matched by identity 0 +peer0.org1.example.com | [1b75 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +peer0.org1.example.com | 00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +peer0.org1.example.com | [1b76 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b78 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b77 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +peer0.org1.example.com | 00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +peer0.org1.example.com | 00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +peer0.org1.example.com | 00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +peer0.org1.example.com | 00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +peer0.org1.example.com | [1b79 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b7a 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 gate 1602702098624680800 evaluation succeeds +peer0.org1.example.com | [1b7b 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b7c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b7d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b7e 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b7f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b80 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b81 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1b82 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer0.org1.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer0.org1.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer0.org1.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer0.org1.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer0.org1.example.com | [1b84 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1bb2 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bb3 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bb4 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bb5 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bb7 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bb6 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bb9 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bba 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbb 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bbc 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbd 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bbe 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bb8 10-14 19:01:46.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bbf 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc0 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1bc1 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer0.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer0.org2.example.com | [1bc2 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer0.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer0.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer0.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer0.org2.example.com | [1bc3 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1bc4 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ee 60 b4 7e a1 d9 8c 2b 3e b7 b3 |0E.!..`.~...+>..| +peer0.org2.example.com | 00000010 28 13 42 73 88 90 13 33 a9 a1 29 3b d2 95 30 5c |(.Bs...3..);..0\| +peer0.org2.example.com | 00000020 5c 8c ab 46 7a 02 20 0e a9 6b d4 c1 29 e2 ea ef |\..Fz. ..k..)...| +peer0.org2.example.com | 00000030 46 05 2b bf a0 48 4b 71 bd 14 c9 7b 93 7d 89 b4 |F.+..HKq...{.}..| +peer0.org2.example.com | 00000040 fc 07 6d c5 fe e6 2b |..m...+| +peer0.org2.example.com | [1bc5 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1bc6 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1bc7 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc8 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bc9 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bca 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bcb 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bcc 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1bcd 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer0.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer0.org2.example.com | [1bce 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer0.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer0.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer0.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer0.org2.example.com | [1bcf 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1bd0 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1bd1 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd2 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd3 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd4 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bd5 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bd6 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1bd7 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org2.example.com | 00000010 28 13 42 73 88 90 13 33 a9 a1 29 3b d2 95 30 5c |(.Bs...3..);..0\| +peer1.org2.example.com | 00000020 5c 8c ab 46 7a 02 20 0e a9 6b d4 c1 29 e2 ea ef |\..Fz. ..k..)...| +peer1.org2.example.com | 00000030 46 05 2b bf a0 48 4b 71 bd 14 c9 7b 93 7d 89 b4 |F.+..HKq...{.}..| +peer1.org2.example.com | 00000040 fc 07 6d c5 fe e6 2b |..m...+| +peer1.org2.example.com | [1cf4 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1cf5 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1cf6 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1cf7 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1cf8 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1cf9 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfa 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfb 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfc 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1cfd 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cfe 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cff 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d00 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d01 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d02 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\267\263(\023Bs\210\220\0233\251\241);\322\2250\\\\\214\253Fz\002 \016\251k\324\301)\342\352\357F\005+\277\240HKq\275\024\311{\223}\211\264\374\007m\305\376\346+" > > alive: +peer1.org2.example.com | [1d03 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1d04 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d05 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1d06 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d08 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1d09 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d0a 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d0b 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d0c 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d0d 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d07 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d0e 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d0f 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d10 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d11 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d12 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d13 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d14 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d15 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d16 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d17 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d18 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d19 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d1a 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d1b 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d1c 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d1d 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d1e 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d1f 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d20 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d21 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16101F +peer1.org2.example.com | [1d22 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6973C3E7ACFE3F42D8721C469E55382A018CC84DDDE3B21AFCA2F7729B01F9BE +peer1.org2.example.com | [1d23 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d24 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1d25 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1d26 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer0.org2.example.com | [1bd8 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer0.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer0.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer0.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer0.org2.example.com | [1bd9 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1bda 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1bdb 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bdc 10-14 19:01:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bdd 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bde 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bdf 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1be0 10-14 19:01:46.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1be1 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1be2 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1be3 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1be4 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1be5 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1be6 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1be7 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b85 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b86 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b87 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b88 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer0.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer0.org1.example.com | [1b89 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer0.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer0.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer0.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer0.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer0.org1.example.com | [1b8a 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b8b 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b8d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b8e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b90 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1b91 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b8c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b92 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b93 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b94 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b95 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b96 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b97 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b98 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b99 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b9a 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b9b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b9c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b9d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 gate 1602702098645382100 evaluation starts +peer0.org1.example.com | [1b9e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b9f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1ba0 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 principal matched by identity 0 +peer0.org1.example.com | [1ba1 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +peer0.org1.example.com | 00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +peer0.org1.example.com | [1ba2 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +peer0.org1.example.com | 00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +peer0.org1.example.com | 00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +peer0.org1.example.com | 00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +peer0.org1.example.com | 00000040 a2 7d 93 18 07 62 |.}...b| +peer0.org1.example.com | [1ba3 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ba4 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 gate 1602702098645382100 evaluation succeeds +peer0.org1.example.com | [1ba5 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba6 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba7 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ba8 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ba9 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1baa 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bab 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1bac 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +peer0.org1.example.com | 00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +peer0.org1.example.com | [1bad 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +peer0.org1.example.com | 00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +peer0.org1.example.com | 00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +peer0.org1.example.com | 00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +peer0.org1.example.com | 00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +peer0.org1.example.com | [1bae 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1baf 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb0 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1bb1 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +peer0.org1.example.com | 00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +peer0.org1.example.com | 00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +peer0.org1.example.com | 00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +peer0.org1.example.com | 00000040 e1 08 58 bc 0d 86 2e |..X....| +peer0.org1.example.com | [1bb3 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bb4 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1bb5 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb6 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb7 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bb8 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bb9 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bba 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bbb 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1bbc 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d27 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d28 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d29 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19bc 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19bd 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19be 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19bf 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19c0 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19c1 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19c2 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 gate 1602702102182824500 evaluation starts +peer1.org1.example.com | [19c3 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19c4 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [19c5 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 principal matched by identity 0 +peer1.org1.example.com | [19c6 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer1.org1.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer1.org1.example.com | [19c7 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer1.org1.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer1.org1.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer1.org1.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer1.org1.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer1.org1.example.com | [19c8 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [19c9 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bee60 gate 1602702102182824500 evaluation succeeds +peer1.org1.example.com | [19ca 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19cb 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19cc 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19cd 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19ce 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19cf 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [19d0 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [19d1 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [19d2 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [19d3 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19d4 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19d5 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19d6 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [19d7 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19d8 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19d9 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19da 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [19db 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [19dc 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1be8 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1be9 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1bea 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer0.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer0.org2.example.com | [1beb 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer0.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer0.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer0.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer0.org2.example.com | [1bec 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1bed 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 bc 5f 54 81 bf 36 16 6e 00 9f |0E.!..._T..6.n..| +peer0.org2.example.com | 00000010 72 d2 a4 75 2b 0d 0b 91 65 6c 37 8b 31 23 10 84 |r..u+...el7.1#..| +peer0.org2.example.com | 00000020 de c3 ee 24 ff 02 20 77 c0 2e f7 68 a7 c0 2c 3b |...$.. w...h..,;| +peer0.org2.example.com | 00000030 d2 fa f8 1c 8c c9 8c 74 a9 b6 4a 00 a1 d2 de 2b |.......t..J....+| +peer0.org2.example.com | 00000040 c8 62 b5 2a e5 74 ff |.b.*.t.| +peer0.org2.example.com | [1bee 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1bef 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1bf0 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1bf1 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1bf2 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1bf3 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bf4 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bf5 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bf6 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1bf7 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bf8 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bf9 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1bfa 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" secret_envelope: > alive: +peer0.org2.example.com | [1bfb 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bfc 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bfd 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bfe 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bff 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c00 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c01 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c02 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c03 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c04 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bbd 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1bbe 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bbf 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bc0 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bc1 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bc2 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1bc3 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 gate 1602702098941738600 evaluation starts +peer0.org1.example.com | [1bc4 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1bc5 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1bc6 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 principal matched by identity 0 +peer0.org1.example.com | [1bc7 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 df b8 a8 68 2c e0 15 94 32 63 fd e5 3a ac c3 |....h,...2c..:..| +peer0.org1.example.com | 00000010 48 3d ab dd 76 0b bd d7 7d f5 95 97 31 fe 71 e3 |H=..v...}...1.q.| +peer0.org1.example.com | [1bc8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 ee 5b 5b e8 2b df 7b f9 ac 2c 00 |0D. ..[[.+.{..,.| +peer0.org1.example.com | 00000010 5f b1 19 91 7e 62 1b ea cf 25 32 5b ac 73 c9 9a |_...~b...%2[.s..| +peer0.org1.example.com | 00000020 8c 90 4d 53 02 20 5c 4e fa 00 39 83 32 91 19 71 |..MS. \N..9.2..q| +peer0.org1.example.com | 00000030 4a fa 02 38 69 e9 d6 91 7b 53 f4 73 43 71 98 cb |J..8i...{S.sCq..| +peer0.org1.example.com | 00000040 9c a9 db 22 08 a5 |..."..| +peer0.org1.example.com | [1bc9 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1bca 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 gate 1602702098941738600 evaluation succeeds +peer0.org1.example.com | [1bcb 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bcc 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bcd 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1bce 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1bcf 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd0 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1bd1 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bd2 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bd3 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bd4 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bd5 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bd6 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd7 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1d2c 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d2d 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d2e 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d2a 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d2f 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d2b 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d30 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d31 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d32 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d33 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d35 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d34 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d36 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer1.org2.example.com | [1d37 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer1.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer1.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer1.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer1.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer1.org2.example.com | [1d38 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1d39 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 bc 5f 54 81 bf 36 16 6e 00 9f |0E.!..._T..6.n..| +peer1.org2.example.com | 00000010 72 d2 a4 75 2b 0d 0b 91 65 6c 37 8b 31 23 10 84 |r..u+...el7.1#..| +peer1.org2.example.com | 00000020 de c3 ee 24 ff 02 20 77 c0 2e f7 68 a7 c0 2c 3b |...$.. w...h..,;| +peer1.org2.example.com | 00000030 d2 fa f8 1c 8c c9 8c 74 a9 b6 4a 00 a1 d2 de 2b |.......t..J....+| +peer1.org2.example.com | 00000040 c8 62 b5 2a e5 74 ff |.b.*.t.| +peer1.org2.example.com | [1d3a 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1d3b 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1d3c 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d3d 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d3e 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d3f 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d40 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d41 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1d42 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer1.org2.example.com | [1d43 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer1.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org2.example.com | [1c05 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1c06 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c07 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c08 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c09 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c0a 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1c0b 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c0c 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c0d 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c0e 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c0f 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c10 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c11 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c12 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 gate 1602702106483597300 evaluation starts +peer0.org2.example.com | [1c13 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c14 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1c15 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 principal matched by identity 0 +peer0.org2.example.com | [1c16 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org2.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org2.example.com | [1c17 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org2.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org2.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org2.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org2.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org2.example.com | [1c18 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c19 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a3c00 gate 1602702106483597300 evaluation succeeds +peer0.org2.example.com | [1c1a 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c1b 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c1c 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c1d 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c1e 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bd8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bd9 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bda 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bdb 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bdc 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bdd 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bde 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bdf 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [1be1 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [1be2 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1be3 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be4 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1be5 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1be6 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1be7 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1be8 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1be9 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1bea 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 gate 1602702099283801000 evaluation starts +peer0.org1.example.com | [1beb 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1bec 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1bed 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 principal matched by identity 0 +peer1.org1.example.com | [19dd 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > +peer1.org1.example.com | [19de 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19df 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19e0 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e1 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e2 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e3 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e4 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e5 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e6 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [19e7 10-14 19:01:42.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19e8 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19e9 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ea 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [19eb 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ec 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19ed 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19ee 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19ef 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f0 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19f1 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f2 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f3 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [19f4 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f5 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [19f6 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [19f7 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f8 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c1f 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1c20 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c21 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1c22 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1c23 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c24 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c25 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1c26 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c27 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c28 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c29 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1c2a 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +peer0.org2.example.com | [1c2b 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c2c 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c2d 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c2e 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c2f 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c30 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c31 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c32 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c33 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c34 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c35 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c36 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1c37 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c38 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c39 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c3a 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c3b 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1c3c 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19f9 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19fa 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19fb 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19fc 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19fd 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19fe 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19ff 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 gate 1602702102318765600 evaluation starts +peer1.org1.example.com | [1a00 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a01 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a02 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 principal matched by identity 0 +peer1.org1.example.com | [1a03 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1a04 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1a05 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a06 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f93d0 gate 1602702102318765600 evaluation succeeds +peer1.org1.example.com | [1a07 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a08 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a09 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a0a 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a0b 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a0c 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a0d 10-14 19:01:42.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a0e 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a0f 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a10 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a11 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a12 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a13 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 gate 1602702102332392200 evaluation starts +peer1.org1.example.com | [1a14 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a15 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a16 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 principal matched by identity 0 +peer0.org2.example.com | [1c3d 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c3e 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c3f 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c40 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c41 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c42 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c43 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 gate 1602702106616949200 evaluation starts +peer0.org2.example.com | [1c44 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c45 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1c46 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 principal matched by identity 0 +peer0.org2.example.com | [1c47 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer0.org2.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer0.org2.example.com | [1c48 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer0.org2.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer0.org2.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer0.org2.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer0.org2.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer0.org2.example.com | [1c49 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c4a 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046eb540 gate 1602702106616949200 evaluation succeeds +peer0.org2.example.com | [1c4b 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c4c 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c4d 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c4e 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c4f 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c50 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1c51 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1c52 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1c53 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1c54 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c55 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c56 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c57 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1c58 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c59 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c5a 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c5b 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bee 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 0b 3f a8 ef b8 c8 24 a4 2a b1 b4 b3 66 b2 86 |..?....$.*...f..| +peer0.org1.example.com | 00000010 07 d4 66 76 2a fe 0e 3b 46 d8 27 87 dd ee 11 ac |..fv*..;F.'.....| +peer0.org1.example.com | [1bef 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 19 e7 1c 38 89 65 19 7b 34 47 |0E.!.....8.e.{4G| +peer0.org1.example.com | 00000010 d8 e9 3d 3e 5f dd 5a 14 d7 0e 8c 67 a7 ed 58 dd |..=>_.Z....g..X.| +peer0.org1.example.com | 00000020 0d b8 e5 f6 36 02 20 23 14 20 19 19 db bc f8 4a |....6. #. .....J| +peer0.org1.example.com | 00000030 51 b3 92 df 82 3b 7e 03 76 14 17 94 be 1a 4c 33 |Q....;~.v.....L3| +peer0.org1.example.com | 00000040 46 82 39 5b e3 c2 59 |F.9[..Y| +peer0.org1.example.com | [1bf0 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1bf1 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 gate 1602702099283801000 evaluation succeeds +peer0.org1.example.com | [1bf2 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bf3 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bf4 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1bf5 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1bf6 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf7 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1bf8 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bf9 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfa 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfb 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bfc 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1bfd 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bfe 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be0 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bff 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c00 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c01 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c02 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c03 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1c04 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer1.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer1.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer1.org2.example.com | [1d44 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d45 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d46 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d47 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer1.org2.example.com | [1d48 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer1.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer1.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer1.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer1.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer1.org2.example.com | [1d49 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d4a 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d4b 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4c 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4d 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4e 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d4f 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d50 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d51 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1d52 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org2.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer1.org2.example.com | [1d53 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer1.org2.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer1.org2.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer1.org2.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer1.org2.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer1.org2.example.com | [1d54 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d55 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d56 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d57 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer1.org2.example.com | [1d58 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer1.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer1.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer1.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer1.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer1.org2.example.com | [1d59 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d5a 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1d5b 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d5c 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d5d 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d5e 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d5f 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d60 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d61 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d62 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d63 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d64 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d65 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d66 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1d67 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d68 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d69 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6a 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d6b 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6c 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1d6d 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d6e 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d6f 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d70 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d71 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d72 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d73 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d74 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 gate 1602702106471034500 evaluation starts +peer1.org2.example.com | [1d75 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d76 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1d77 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d78 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 principal evaluation fails +peer1.org2.example.com | [1d79 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004500fa0 gate 1602702106471034500 evaluation fails +peer1.org2.example.com | [1d7a 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d7b 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d7c 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d7d 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 gate 1602702106475287900 evaluation starts +peer1.org2.example.com | [1d7e 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d7f 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1d80 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 principal matched by identity 0 +peer0.org1.example.com | [1c05 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c06 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c07 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c08 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c09 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c0a 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c0b 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 gate 1602702100153293000 evaluation starts +peer0.org1.example.com | [1c0c 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c0d 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1c0e 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 principal matched by identity 0 +peer0.org1.example.com | [1c0f 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 ec b1 c2 56 8b 69 5e e5 1d cb d0 4b af 9c 63 |....V.i^....K..c| +peer0.org1.example.com | 00000010 79 c8 11 86 3a 3a 96 32 f3 0a da 29 72 ca 43 94 |y...::.2...)r.C.| +peer0.org1.example.com | [1c10 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4a b1 31 e1 7e 54 36 25 a8 f9 |0E.!..J.1.~T6%..| +peer0.org1.example.com | 00000010 27 87 e6 6d f8 cd e2 4b f1 d5 90 22 3a 30 40 01 |'..m...K...":0@.| +peer0.org1.example.com | 00000020 f9 ee 8c be 83 02 20 12 fb fc fc d9 66 02 14 c3 |...... .....f...| +peer0.org1.example.com | 00000030 a9 9e fc 13 5c 44 b8 49 b8 0b 46 25 32 c8 39 91 |....\D.I..F%2.9.| +peer0.org1.example.com | 00000040 65 c8 f9 92 d7 f3 97 |e......| +peer0.org1.example.com | [1c11 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c12 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 gate 1602702100153293000 evaluation succeeds +peer0.org1.example.com | [1c13 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c14 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c15 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c16 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c17 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c18 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1c19 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c1a 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c1b 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c1c 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1c1d 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c1e 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c1f 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c20 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c21 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c22 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c23 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c24 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c25 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c26 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c27 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c28 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c29 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c2a 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c2b 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c2c 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c2e 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c2f 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c30 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2d 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c31 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c32 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c33 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c34 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c35 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c36 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c37 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c38 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c39 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c3a 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1c3b 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c3c 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c3d 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c3e 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c3f 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c40 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c41 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c42 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 gate 1602702100262536400 evaluation starts +peer0.org1.example.com | [1c43 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c44 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1c45 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 principal matched by identity 0 +peer0.org1.example.com | [1c46 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 82 9f 34 4b d7 09 67 da 2c ae 20 58 e4 67 41 |...4K..g.,. X.gA| +peer0.org1.example.com | 00000010 30 a8 8a e8 86 d6 88 f7 bc 2f 81 eb 25 99 3c 55 |0......../..%. DEBU Verify: sig = 00000000 30 45 02 21 00 ac 2e 2f db 6f e7 29 9d c2 60 ef |0E.!.../.o.)..`.| +peer0.org1.example.com | 00000010 fe 29 06 82 6f 61 a3 8e fb 1d 7c 7e 94 65 a5 1a |.)..oa....|~.e..| +peer0.org1.example.com | 00000020 c2 c0 cb 0d f0 02 20 13 d9 c1 7f c2 72 af 51 de |...... .....r.Q.| +peer0.org1.example.com | 00000030 f8 98 07 c9 a1 95 62 44 4a 8f ab 29 de 54 66 a5 |......bDJ..).Tf.| +peer0.org1.example.com | 00000040 9e ab 78 f5 f6 4a 64 |..x..Jd| +peer0.org1.example.com | [1c48 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c49 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 gate 1602702100262536400 evaluation succeeds +peer0.org1.example.com | [1c4a 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a17 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1a18 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1a19 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a1a 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00471e5d0 gate 1602702102332392200 evaluation succeeds +peer1.org1.example.com | [1a1b 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a1c 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a1d 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a1e 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a1f 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1a20 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1a21 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a22 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a23 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a24 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1a25 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1a26 10-14 19:01:42.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1a27 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1a28 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a29 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a2b 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a2a 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a2c 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a2d 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a2e 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a2f 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a30 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c5c 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: alive: alive: +peer0.org2.example.com | [1c5d 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c5e 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c5f 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c60 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c61 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1c62 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c63 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c64 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c65 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c66 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c67 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c68 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c69 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c6a 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c6b 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c6c 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c6d 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c6e 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c6f 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c70 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c71 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c72 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 gate 1602702106636374700 evaluation starts +peer0.org2.example.com | [1c73 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c74 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1c75 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 principal matched by identity 0 +peer1.org1.example.com | [1a31 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a32 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 gate 1602702102345236000 evaluation starts +peer1.org1.example.com | [1a33 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a34 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a35 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 principal matched by identity 0 +peer1.org1.example.com | [1a36 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1a37 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1a38 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a39 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046e1740 gate 1602702102345236000 evaluation succeeds +peer1.org1.example.com | [1a3a 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a3b 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a3c 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a3d 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a3e 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a3f 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a40 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a41 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a42 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a43 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a44 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a45 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a46 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 gate 1602702102348492000 evaluation starts +peer1.org1.example.com | [1a47 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a48 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a49 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 principal matched by identity 0 +peer1.org1.example.com | [1a4a 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1a4b 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1a4c 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a4d 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474e940 gate 1602702102348492000 evaluation succeeds +peer1.org1.example.com | [1a4e 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a4f 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a50 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a51 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a52 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a53 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a54 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1a55 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1a56 10-14 19:01:42.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1a57 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a58 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1a59 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | [1c76 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | [1c4b 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | [1d81 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1c4c 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org2.example.com | [1c77 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | [1c4d 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a5a 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d82 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | [1c4e 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a5b 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | [1c4f 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1a5c 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a5d 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | [1c50 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1a5e 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1c51 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1a5f 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org2.example.com | [1c78 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c52 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1a60 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org2.example.com | [1c79 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c5ee0 gate 1602702106636374700 evaluation succeeds +peer0.org1.example.com | [1c53 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a61 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d83 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c7a 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c54 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a62 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c55 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c7b 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1a63 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d84 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004501510 gate 1602702106475287900 evaluation succeeds +peer0.org1.example.com | [1c56 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c7c 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d85 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c57 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c7d 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a64 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d86 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1c58 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c7e 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a65 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d87 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c59 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1c7f 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a66 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d88 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c5a 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c80 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a67 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 gate 1602702102357565000 evaluation starts +peer1.org2.example.com | [1d89 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c5b 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c81 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c82 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c83 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c84 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c85 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c86 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 gate 1602702106645094300 evaluation starts +peer0.org2.example.com | [1c87 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c88 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1c89 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 principal matched by identity 0 +peer0.org2.example.com | [1c8a 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1c8b 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1c8c 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c8d 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047490e0 gate 1602702106645094300 evaluation succeeds +peer0.org2.example.com | [1c8e 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c8f 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c90 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c91 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c92 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1c93 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | [1a68 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a69 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a6a 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 principal matched by identity 0 +peer1.org1.example.com | [1a6b 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1a6c 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1a6d 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a6e 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004766ac0 gate 1602702102357565000 evaluation succeeds +peer1.org2.example.com | [1d8a 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1d8b 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1d8c 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1d8d 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1d8e 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d8f 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d90 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d91 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1d92 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d93 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d94 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d95 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d96 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1d97 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d98 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d99 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d9a 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d9b 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9c 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9d 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9e 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d9f 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da0 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da1 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [1c5c 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5d 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5e 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5f 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c60 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c61 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c62 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c63 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c65 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c64 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c66 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1c94 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1c95 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1c96 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c97 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c98 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c99 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c9a 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c9b 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c9c 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c9d 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c9e 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c9f 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1ca0 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 gate 1602702106655941900 evaluation starts +peer0.org2.example.com | [1ca1 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ca2 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1ca3 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 principal matched by identity 0 +peer0.org2.example.com | [1ca4 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1ca5 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1ca6 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ca7 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b260 gate 1602702106655941900 evaluation succeeds +peer0.org2.example.com | [1ca8 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ca9 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1caa 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1cab 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1cac 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1cad 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1cae 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1caf 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1cb0 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cb1 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cb2 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1cb3 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cb4 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cb5 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1cb6 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1cb7 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1cb8 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 gate 1602702106674922400 evaluation starts +peer0.org2.example.com | [1cb9 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1cba 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1cbb 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 principal matched by identity 0 +peer0.org2.example.com | [1cbd 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1cbe 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1cbc 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cbf 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cc0 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1cc1 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004787240 gate 1602702106674922400 evaluation succeeds +peer0.org2.example.com | [1cc2 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cc4 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cc3 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1cc5 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1cc7 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cc8 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cc9 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1cc6 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1cca 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccb 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ccc 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ccd 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cce 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ccf 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd0 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cd1 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1cd2 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cd3 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1cd4 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1cd5 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1cd6 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1cd7 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 gate 1602702106692118200 evaluation starts +peer0.org2.example.com | [1cd8 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1cd9 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1cda 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 principal matched by identity 0 +peer0.org2.example.com | [1cdb 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1cdc 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1cdd 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1cde 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ac690 gate 1602702106692118200 evaluation succeeds +peer0.org2.example.com | [1cdf 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ce0 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1da2 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1da3 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1da4 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1da5 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1da6 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1da7 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da8 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1da9 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1daa 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1dab 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1dac 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1dad 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1dae 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 gate 1602702106627770300 evaluation starts +peer1.org2.example.com | [1daf 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1db0 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1db1 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1db2 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 principal evaluation fails +peer1.org2.example.com | [1db3 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546ab0 gate 1602702106627770300 evaluation fails +peer1.org2.example.com | [1db4 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1db5 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1db6 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1db7 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 gate 1602702106629410000 evaluation starts +peer1.org2.example.com | [1db8 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1db9 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1dba 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 principal matched by identity 0 +peer1.org2.example.com | [1dbb 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer1.org2.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer1.org2.example.com | [1dbc 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer1.org2.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer1.org2.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer1.org2.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer1.org2.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer1.org2.example.com | [1dbd 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1dbf 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004547020 gate 1602702106629410000 evaluation succeeds +peer1.org2.example.com | [1dc0 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dc1 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dc2 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dc3 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1dc4 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1dc5 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1dc6 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1dc7 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1dbe 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dc8 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1dca 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dc9 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dcb 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dcc 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dcd 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dce 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1dcf 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dd0 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dd1 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dd2 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1dd3 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1dd4 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dd5 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd6 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dd7 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd8 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dd9 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dda 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ddb 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1ddc 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ddd 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dde 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ddf 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1ce1 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ce2 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ce3 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce4 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ce5 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ce6 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ce7 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ce8 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ce9 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1cea 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1ceb 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 gate 1602702106696771800 evaluation starts +peer0.org2.example.com | [1cec 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ced 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1cee 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 principal matched by identity 0 +peer0.org2.example.com | [1cef 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1cf0 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1cf1 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1cf2 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ad890 gate 1602702106696771800 evaluation succeeds +peer0.org2.example.com | [1cf3 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cf4 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cf5 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1cf6 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1cf7 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1cf8 10-14 19:01:46.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1cf9 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1cfa 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1cfb 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cfc 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cfd 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cfe 10-14 19:01:46.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cff 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d00 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d01 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d02 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d03 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d04 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d05 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1d06 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d07 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d08 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 dc 45 39 bc 73 41 b1 eb 9f fd 30 80 52 d0 5a |V.E9.sA....0.R.Z| +peer0.org2.example.com | 00000010 75 ec 1c 8e b7 b7 88 13 11 b7 5e 6c be 3a c8 61 |u.........^l.:.a| +peer0.org2.example.com | [1d09 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da d3 2d b8 6c 57 93 11 f4 1f 63 |0E.!...-.lW....c| +peer0.org2.example.com | 00000010 b3 17 6f b7 50 b3 09 e4 03 60 f3 43 ce 0e cf 8f |..o.P....`.C....| +peer0.org2.example.com | 00000020 65 cc 22 f5 cd 02 20 77 23 8a 8b 4b de 3e 09 df |e."... w#..K.>..| +peer0.org2.example.com | 00000030 8f 03 bd 2e 1f f5 b0 85 3b e8 54 de a9 56 47 33 |........;.T..VG3| +peer0.org2.example.com | 00000040 01 30 46 18 38 da bf |.0F.8..| +peer0.org2.example.com | [1d0a 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d0b 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0c 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0d 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1d0e 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1d0f 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d10 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d11 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d12 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d13 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d14 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1d15 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d16 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1d18 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d17 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1a 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d19 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1d1b 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d1c 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d1d 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d1f 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d20 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d1e 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d21 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d22 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d23 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d24 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d25 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de0 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de1 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de2 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de3 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de4 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de5 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de6 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de7 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de8 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1de9 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dea 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1deb 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1dec 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ded 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1dee 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1def 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1df0 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1df1 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 gate 1602702106954831800 evaluation starts +peer1.org2.example.com | [1df2 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1df3 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1df4 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1df5 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 principal evaluation fails +peer1.org2.example.com | [1df6 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004564ff0 gate 1602702106954831800 evaluation fails +peer1.org2.example.com | [1df7 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1df8 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1df9 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1dfa 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 gate 1602702106957277800 evaluation starts +peer1.org2.example.com | [1dfb 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1dfc 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1dfd 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 principal matched by identity 0 +peer1.org2.example.com | [1dfe 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1dff 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1e00 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e01 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e02 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004565560 gate 1602702106957277800 evaluation succeeds +peer1.org2.example.com | [1e03 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e04 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e05 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e06 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e07 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e08 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e09 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e0a 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e0b 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e0c 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e0d 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e0e 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e0f 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 gate 1602702106962967000 evaluation starts +peer1.org2.example.com | [1e10 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e11 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e12 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e13 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 principal evaluation fails +peer1.org2.example.com | [1e14 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594760 gate 1602702106962967000 evaluation fails +peer1.org2.example.com | [1e15 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e16 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a6f 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a70 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a71 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a72 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a73 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a74 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a75 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a76 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a77 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a78 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a79 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a7a 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a7b 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 gate 1602702102362116300 evaluation starts +peer1.org1.example.com | [1a7c 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a7d 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a7e 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 principal matched by identity 0 +peer1.org1.example.com | [1a7f 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1a80 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1a81 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a82 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004767cc0 gate 1602702102362116300 evaluation succeeds +peer1.org1.example.com | [1a83 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a84 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a85 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a86 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a87 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a88 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a89 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a8a 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1a8b 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d26 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d27 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d28 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d29 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d2a 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161020 +peer0.org2.example.com | [1d2b 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 335FF23BFC57F678E3335CBE31AE407B3531B85C5D2C21CA9AF061EA04273335 +peer0.org2.example.com | [1d2c 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d2d 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1d2e 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1d2f 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1d30 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d31 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d32 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d33 10-14 19:01:50.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d34 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d35 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d36 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d37 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d38 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d39 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d3a 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d3b 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d3c 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d3d 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d3e 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d3f 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d40 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1d41 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 5f f2 3b fc 57 f6 78 e3 33 5c be 31 ae 40 7b |3_.;.W.x.3\.1.@{| +peer0.org2.example.com | 00000010 35 31 b8 5c 5d 2c 21 ca 9a f0 61 ea 04 27 33 35 |51.\],!...a..'35| +peer0.org2.example.com | [1d42 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0a 4e 6b ac 0c 9f 08 f0 87 66 9c |0D. r.Nk......f.| +peer0.org2.example.com | 00000010 bf 03 eb 4e 08 f0 b4 ac b0 b0 90 35 cf c6 b0 36 |...N.......5...6| +peer0.org2.example.com | 00000020 16 48 af c1 02 20 5e 5d f7 a1 0a a7 26 23 5e 97 |.H... ^]....&#^.| +peer0.org2.example.com | 00000030 46 1e 47 4d 3e 03 9c d8 7e ac 0a 15 ba 87 e5 af |F.GM>...~.......| +peer0.org2.example.com | 00000040 91 9c 8a 8a 82 fc |......| +peer0.org2.example.com | [1d43 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d44 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d45 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d46 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161021 +peer0.org2.example.com | [1d47 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FB5765F9D2AC06598C2AA3499C9E5B68DE40823CFFFFA0F6850E88C207E76C27 +peer0.org2.example.com | [1d48 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d49 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1a8c 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a8d 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a8e 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a8f 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a90 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a91 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a92 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 gate 1602702102368487300 evaluation starts +peer1.org1.example.com | [1a93 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a94 10-14 19:01:42.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1a95 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 principal matched by identity 0 +peer1.org1.example.com | [1a96 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer1.org1.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer1.org1.example.com | [1a97 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer1.org1.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer1.org1.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer1.org1.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer1.org1.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer1.org1.example.com | [1a98 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a99 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004733900 gate 1602702102368487300 evaluation succeeds +peer1.org1.example.com | [1a9a 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a9b 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a9c 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a9d 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a9e 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a9f 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1aa0 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1aa1 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1aa2 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1aa3 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa4 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa5 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa6 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1aa7 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa8 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa9 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aaa 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1aab 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aac 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > +peer1.org1.example.com | [1aad 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1aae 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aaf 10-14 19:01:42.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ab0 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ab1 10-14 19:01:42.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab2 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1ab3 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ab4 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1ab5 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ab6 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1ab7 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ab8 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ab9 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aba 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1abb 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1abc 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1abd 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1abe 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1abf 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac0 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac1 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac2 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac3 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac4 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac5 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac6 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac7 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ac8 10-14 19:01:42.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac9 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1aca 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161024 +peer1.org1.example.com | [1acb 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F0D9037FBC0CE7A0A8DCFFAD9A458FEC8F5BC3EF5B35262340CCAF827057166B +peer1.org1.example.com | [1acc 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1acd 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1ace 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1acf 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ad0 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ad1 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ad2 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ad3 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ad4 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c67 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c68 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c69 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c6a 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6b 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c6c 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6d 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c6e 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c6f 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c70 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1c71 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df d6 4f 0c b2 50 39 aa 05 28 45 bc a1 68 aa 85 |..O..P9..(E..h..| +peer0.org1.example.com | 00000010 c9 f9 71 7f bc 3f fa cc 12 41 3d 33 33 68 80 1c |..q..?...A=33h..| +peer0.org1.example.com | [1c72 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 7f a1 91 fc 9d de ab 98 77 90 7c |0D. R........w.|| +peer0.org1.example.com | 00000010 61 86 91 c1 31 3e 25 f6 de ba 84 d7 88 fc ef 4f |a...1>%........O| +peer0.org1.example.com | 00000020 7d 5b 09 89 02 20 0f 16 f4 c5 e5 01 b4 62 5a b6 |}[... .......bZ.| +peer0.org1.example.com | 00000030 ab e9 dd 31 e4 d0 34 ed 6f 26 1f 81 ce 2c 71 22 |...1..4.o&...,q"| +peer0.org1.example.com | 00000040 ec 47 fc 80 57 36 |.G..W6| +peer0.org1.example.com | [1c73 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c74 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1c75 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c76 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c77 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1c78 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c79 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c7a 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c7b 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c7c 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c7d 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c7e 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c7f 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c80 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c81 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c82 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c83 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c84 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c85 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c86 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c87 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c88 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c89 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8a 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c8b 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c8c 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8d 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c8e 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8f 10-14 19:01:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [1c90 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c91 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101F +peer0.org1.example.com | [1c92 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 683ABFE4ED515165FF350FDB60CF16DE87BB720B231A6706502832B897B666F4 +peer0.org1.example.com | [1c93 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c94 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1c95 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1c96 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1c97 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c98 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c99 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c9a 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c9b 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c9c 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c9d 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c9e 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1ca0 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ca1 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca2 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ca3 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c9f 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca4 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ca5 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d4a 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1d4b 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\2035\tOP\201s`\027\031\360" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d4c 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d4d 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d4e 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d4f 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\2035\tOP\201s`\027\031\360" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d50 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d51 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d52 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d53 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d54 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d55 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d56 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d57 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d58 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d59 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1d5a 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer0.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer0.org2.example.com | [1d5b 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer0.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer0.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer0.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer0.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer0.org2.example.com | [1d5c 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1e17 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e18 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 gate 1602702106964779800 evaluation starts +peer1.org2.example.com | [1e19 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e1a 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e1b 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 principal matched by identity 0 +peer1.org2.example.com | [1e1c 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1e1d 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1e1e 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e1f 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004594cd0 gate 1602702106964779800 evaluation succeeds +peer1.org2.example.com | [1e20 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e21 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e22 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e23 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ad5 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ad6 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ad7 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ad8 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ad9 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ada 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1adb 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1adc 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1add 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ade 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1adf 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer1.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer1.org1.example.com | [1ae0 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer1.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer1.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer1.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer1.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer1.org1.example.com | [1ae1 10-14 19:01:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1ae2 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 ff db 5f 61 62 01 e1 9f ef c3 |0E.!...._ab.....| +peer1.org1.example.com | 00000010 72 28 f2 8c 3b d1 b2 46 22 9d 35 49 7f 70 3f 7c |r(..;..F".5I.p?|| +peer1.org1.example.com | 00000020 e9 3f b1 1c 04 02 20 77 e3 65 2e 5b 09 13 9c 34 |.?.... w.e.[...4| +peer1.org1.example.com | 00000030 81 9a 99 57 48 b5 8c e4 ce c0 84 15 b9 36 98 78 |...WH........6.x| +peer1.org1.example.com | 00000040 26 64 44 18 25 1d 19 |&dD.%..| +peer1.org1.example.com | [1ae3 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1ae4 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1ae5 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae6 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae7 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ae8 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae9 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1aea 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1aeb 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aec 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1aed 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1aee 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1aef 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1af0 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1af1 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1af2 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 gate 1602702102489310200 evaluation starts +peer1.org1.example.com | [1af3 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1af4 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1af5 10-14 19:01:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 principal matched by identity 0 +peer1.org1.example.com | [1af6 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer1.org1.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer1.org1.example.com | [1af7 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer1.org1.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer1.org1.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer1.org1.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer1.org1.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer1.org1.example.com | [1af8 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1af9 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ec270 gate 1602702102489310200 evaluation succeeds +peer1.org1.example.com | [1afa 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1afb 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1afc 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1afd 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1afe 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aff 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b00 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b01 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer1.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer1.org1.example.com | [1b02 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer1.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer1.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer1.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer1.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer1.org1.example.com | [1b03 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b04 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b05 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b06 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b07 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b08 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b09 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0a 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b0b 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1b0c 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b0d 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b0e 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b0f 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b10 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b11 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1b12 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1b13 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 gate 1602702102499111100 evaluation starts +peer1.org1.example.com | [1b14 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b15 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1b16 10-14 19:01:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 principal matched by identity 0 +peer1.org1.example.com | [1b17 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer1.org1.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer1.org1.example.com | [1b18 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer1.org1.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer1.org1.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer1.org1.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer1.org1.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer1.org1.example.com | [1b19 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1b1a 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048060c0 gate 1602702102499111100 evaluation succeeds +peer1.org1.example.com | [1b1b 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b1c 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b1d 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1b1e 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1b1f 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b20 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b21 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b22 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer1.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer1.org1.example.com | [1b23 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer1.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer1.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer1.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer1.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer1.org1.example.com | [1b24 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b25 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b26 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b27 10-14 19:01:42.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca6 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1ca7 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca8 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca9 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1caa 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cab 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cac 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d5d 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 14 d4 b6 dc 33 9e 55 e0 4c f7 be |0D. $....3.U.L..| +peer0.org2.example.com | 00000010 f4 0d 27 2a ad 21 4d 9e e0 f6 34 c8 32 96 1b 30 |..'*.!M...4.2..0| +peer0.org2.example.com | 00000020 af ba ef 2d 02 20 26 5c 3b 62 b1 23 14 34 ec fd |...-. &\;b.#.4..| +peer0.org2.example.com | 00000030 44 2e de b6 a5 8c a0 a5 81 e1 3e 83 35 09 4f 50 |D.........>.5.OP| +peer0.org2.example.com | 00000040 81 73 60 17 19 f0 |.s`...| +peer0.org2.example.com | [1d5e 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1d5f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1d60 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d61 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d62 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d63 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d64 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d65 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1d66 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d67 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d68 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d69 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d6a 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d6b 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d6c 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d6d 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 gate 1602702110163099600 evaluation starts +peer0.org2.example.com | [1d6e 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d6f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1d70 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 principal matched by identity 0 +peer0.org2.example.com | [1d71 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer0.org2.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer0.org2.example.com | [1d72 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer0.org2.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer0.org2.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer0.org2.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer0.org2.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer0.org2.example.com | [1d73 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d74 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048543a0 gate 1602702110163099600 evaluation succeeds +peer0.org2.example.com | [1d75 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d76 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d77 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d78 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d79 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d7a 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7b 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1d7c 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer0.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer0.org2.example.com | [1d7d 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer0.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer0.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer0.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer0.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer0.org2.example.com | [1d7e 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d7f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d80 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d81 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1d82 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer0.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer0.org2.example.com | [1d83 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer0.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer0.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer0.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer0.org2.example.com | [1d84 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d85 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d86 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d87 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d88 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d89 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d8a 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1d8b 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8c 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d8d 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d8e 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d8f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d90 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d91 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1b28 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b29 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2a 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2b 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1b2c 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b2d 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2e 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2f 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b30 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b31 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1b32 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer1.org1.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer1.org1.example.com | [1b33 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer1.org1.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1b35 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 68 e8 9a 99 fc 12 bc c5 83 de |0E.!..h.........| +peer1.org1.example.com | 00000010 71 57 4f c2 9e 92 d1 0e f4 75 fc 3f 32 62 8f af |qWO......u.?2b..| +peer1.org1.example.com | 00000020 89 80 17 59 fd 02 20 20 f9 8e c3 97 3f 53 ab e1 |...Y.. ....?S..| +peer1.org1.example.com | 00000030 0b 17 63 89 88 72 2b 09 12 69 d8 5d 4d 93 5d ec |..c..r+..i.]M.].| +peer1.org1.example.com | 00000040 fc 46 9e 0d 38 d7 74 |.F..8.t| +peer1.org1.example.com | [1b36 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1b37 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1b38 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b39 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b3a 10-14 19:01:42.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1b3b 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3c 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3d 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b3e 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1b3f 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b40 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b41 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e24 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1e25 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1e26 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1e27 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1e28 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e29 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e2a 10-14 19:01:46.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e2b 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e2c 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e2d 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e2e 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e2f 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e30 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e31 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e32 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 gate 1602702106971120600 evaluation starts +peer1.org2.example.com | [1e33 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e34 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e35 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e36 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 principal evaluation fails +peer1.org2.example.com | [1e37 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aae50 gate 1602702106971120600 evaluation fails +peer1.org2.example.com | [1e38 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e39 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e3a 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e3b 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 gate 1602702106972374100 evaluation starts +peer1.org2.example.com | [1e3c 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e3d 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e3e 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 principal matched by identity 0 +peer1.org2.example.com | [1e3f 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1e40 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1e41 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e42 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ab3c0 gate 1602702106972374100 evaluation succeeds +peer1.org2.example.com | [1e43 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e44 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e45 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e46 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e47 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e48 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e49 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e4a 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e4b 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e4c 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e4d 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e4e 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e4f 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 gate 1602702106976179500 evaluation starts +peer1.org2.example.com | [1e50 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e51 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e52 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e53 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 principal evaluation fails +peer1.org2.example.com | [1e54 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c65c0 gate 1602702106976179500 evaluation fails +peer1.org2.example.com | [1e55 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e56 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e57 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e58 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 gate 1602702106977392600 evaluation starts +peer1.org2.example.com | [1e59 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e5a 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e5b 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 principal matched by identity 0 +peer1.org2.example.com | [1e5c 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1e5d 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1e5e 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e5f 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c6b30 gate 1602702106977392600 evaluation succeeds +peer1.org2.example.com | [1e60 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e61 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e62 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e63 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e64 10-14 19:01:46.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1e65 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1e66 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1e67 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | [1d92 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 gate 1602702110168239400 evaluation starts +peer0.org2.example.com | [1d93 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d94 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1d95 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 principal matched by identity 0 +peer0.org2.example.com | [1d96 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org2.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org2.example.com | [1d97 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org2.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org2.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org2.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org2.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org2.example.com | [1d98 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1d99 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004870c70 gate 1602702110168239400 evaluation succeeds +peer0.org2.example.com | [1d9a 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d9b 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d9c 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d9d 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d9e 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d9f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1da0 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1da1 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer0.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer0.org2.example.com | [1da2 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer0.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer0.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer0.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer0.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer0.org2.example.com | [1da3 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1da4 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1da5 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1da6 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1da7 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer0.org2.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer0.org2.example.com | [1da8 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer0.org2.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer0.org2.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer0.org2.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org2.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer0.org2.example.com | [1da9 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1daa 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dab 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dac 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dad 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dae 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1daf 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1db0 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f7 c2 85 6f 12 61 82 a6 ae e3 60 2d a4 ca a4 |/...o.a....`-...| +peer0.org2.example.com | 00000010 c5 d7 fa e0 72 bb f9 2e 9c 43 00 18 c7 e7 b4 34 |....r....C.....4| +peer0.org2.example.com | [1db1 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 b0 f2 f0 6f 0d c3 f5 ac 77 30 |0E.!.....o....w0| +peer0.org2.example.com | 00000010 1d a9 c3 35 fd b1 76 44 fe be c3 f5 36 4b 95 ff |...5..vD....6K..| +peer0.org2.example.com | 00000020 d4 52 7e f2 38 02 20 72 6e b5 33 6d e5 d1 29 a4 |.R~.8. rn.3m..).| +peer0.org2.example.com | 00000030 61 c4 fc 8e 56 0e af b7 5e 57 03 78 44 ae 38 e9 |a...V...^W.xD.8.| +peer0.org2.example.com | 00000040 0e a3 b9 3a e5 35 57 |...:.5W| +peer1.org1.example.com | [1b42 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > +peer1.org1.example.com | [1b43 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b44 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b45 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b46 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b47 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b48 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b49 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b4b 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b4c 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4d 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4e 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4f 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b50 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1b51 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [1b52 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b53 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610091801 +peer1.org1.example.com | [1b54 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 42B9A9AFCE4AD2555E3D590F6962E741D6766A0D7158ABC288BB4732C58B590F +peer1.org1.example.com | [1b55 10-14 19:01:43.35 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1b56 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b57 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b58 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b59 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b5a 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1b5b 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b5c 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b5d 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b5e 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b5f 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b60 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b61 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b62 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b63 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1b64 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b65 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b66 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b67 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b68 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b69 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1b6a 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1b6b 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 gate 1602702105173967200 evaluation starts +peer1.org1.example.com | [1b6c 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b6d 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1b6e 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 principal matched by identity 0 +peer1.org1.example.com | [1b6f 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d c0 d5 37 60 6c ee f2 75 b0 fa 74 d3 90 16 4b |M..7`l..u..t...K| +peer1.org1.example.com | 00000010 51 3e 53 ef 2f 15 02 47 63 50 16 ae bb fd 74 e5 |Q>S./..GcP....t.| +peer1.org1.example.com | [1b70 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af de c6 3a 6f 91 e8 6e 9a da bc |0E.!....:o..n...| +peer1.org1.example.com | 00000010 24 e0 3a 99 0a e6 1a 58 26 6f 9f 32 ef 9f 76 fa |$.:....X&o.2..v.| +peer1.org1.example.com | 00000020 3b 59 b4 66 6a 02 20 28 68 d3 6a fa 40 64 37 cf |;Y.fj. (h.j.@d7.| +peer1.org1.example.com | 00000030 a0 47 3f 34 03 a8 09 36 aa 20 85 b3 54 e1 40 07 |.G?4...6. ..T.@.| +peer1.org1.example.com | 00000040 28 11 45 2e 29 c9 0a |(.E.)..| +peer1.org1.example.com | [1b71 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1b72 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485aa70 gate 1602702105173967200 evaluation succeeds +peer1.org1.example.com | [1b73 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b74 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b75 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1b76 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1b77 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b78 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1b79 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b7a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b7b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1b7c 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7d 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7e 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cad 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cae 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1caf 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1cb0 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1cb1 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1cb2 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cb3 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cb4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1cb5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cb6 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cb7 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cb8 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cb9 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cba 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cbb 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 gate 1602702101931799300 evaluation starts +peer0.org1.example.com | [1cbc 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cbd 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1cbe 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 principal matched by identity 0 +peer0.org1.example.com | [1cbf 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cc0 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1cc1 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1cc2 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cc3 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 gate 1602702101931799300 evaluation succeeds +peer0.org1.example.com | [1cc4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cc5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cc6 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cc7 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cc8 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1e68 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e69 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e6a 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e6b 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e6c 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e6d 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e6e 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e6f 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e70 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e71 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e72 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e73 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 gate 1602702106985142200 evaluation starts +peer1.org2.example.com | [1e74 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e75 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e76 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e77 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 principal evaluation fails +peer1.org2.example.com | [1e78 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4d60 gate 1602702106985142200 evaluation fails +peer1.org2.example.com | [1e79 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e7a 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e7b 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e7c 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 gate 1602702106986769900 evaluation starts +peer1.org2.example.com | [1e7d 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e7e 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e7f 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 principal matched by identity 0 +peer1.org2.example.com | [1e80 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [1e81 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [1e82 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e83 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e52d0 gate 1602702106986769900 evaluation succeeds +peer1.org2.example.com | [1e84 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e85 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e86 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e87 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e88 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e89 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e8a 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e8b 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e8c 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e8d 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e8e 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e8f 10-14 19:01:46.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e90 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 gate 1602702106989979300 evaluation starts +peer1.org2.example.com | [1e91 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e92 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e93 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e94 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 principal evaluation fails +peer1.org2.example.com | [1e95 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046084d0 gate 1602702106989979300 evaluation fails +peer1.org2.example.com | [1e96 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e97 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e98 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1b7f 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b80 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b81 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b82 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b83 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b84 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b85 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b86 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b87 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b88 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b89 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b8a 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8b 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b8c 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b8d 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b8e 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b8f 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b90 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b91 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b93 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b92 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b94 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b95 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b96 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b97 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b98 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b99 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1b9a 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b9b 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b9c 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b9d 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b9e 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b9f 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ba0 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ba1 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 gate 1602702105269786100 evaluation starts +peer1.org2.example.com | [1e99 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 gate 1602702106990880800 evaluation starts +peer1.org2.example.com | [1e9a 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e9b 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1e9c 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 principal matched by identity 0 +peer1.org2.example.com | [1e9d 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [1e9e 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [1e9f 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ea0 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004608a40 gate 1602702106990880800 evaluation succeeds +peer1.org2.example.com | [1ea1 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ea2 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ea3 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ea4 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1ea5 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [1ea6 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ea7 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ea8 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1ea9 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eaa 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eab 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1eac 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ead 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eae 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [1eaf 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [1eb1 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb0 10-14 19:01:46.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [1eb2 10-14 19:01:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eb3 10-14 19:01:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb4 10-14 19:01:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eb5 10-14 19:01:47.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eb6 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1eb7 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1eb8 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1eb9 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100A1801 +peer0.org2.example.com | [1db2 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1db3 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1db4 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1db5 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1db6 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1db7 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1db8 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1db9 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dba 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbb 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbc 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbd 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1dbe 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbf 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1dc0 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dc1 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc2 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dc3 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc4 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dc5 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dc6 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1dc7 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc8 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dc9 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dca 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dcb 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dcc 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dcd 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dce 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dcf 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dd0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dd1 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd2 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ba2 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ba3 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1ba4 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 principal matched by identity 0 +peer1.org1.example.com | [1ba5 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 fd 42 65 78 02 08 25 0b 6a 9a d0 49 e3 d0 9c |'.Bex..%.j..I...| +peer1.org1.example.com | 00000010 94 a0 9b 84 5e 07 1e b1 bb 8e 63 28 d9 1b b9 62 |....^.....c(...b| +peer1.org1.example.com | [1ba6 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ba8 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ba7 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 6b dd 52 2c 78 e7 17 1d 7f 8e |0E.!..k.R,x.....| +peer1.org1.example.com | 00000010 96 d7 dc 2d 41 84 ca 93 dc ea de 22 52 27 6e f6 |...-A......"R'n.| +peer1.org1.example.com | 00000020 e1 49 46 6e c6 02 20 20 6a 61 6e 7e 3b 9d 4c ba |.IFn.. jan~;.L.| +peer1.org1.example.com | 00000030 9b c8 ad 5b 3a 7f d5 8d 47 a3 d6 54 e5 42 b2 d3 |...[:...G..T.B..| +peer1.org1.example.com | 00000040 d4 d0 f7 98 1d 2b ba |.....+.| +peer1.org1.example.com | [1ba9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1baa 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c8e0 gate 1602702105269786100 evaluation succeeds +peer1.org1.example.com | [1bab 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bac 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bad 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bae 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1baf 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bb0 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1bb1 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bb2 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bb3 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bb4 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb5 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb6 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb7 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bb9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb8 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bba 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbb 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbc 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbd 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbe 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbf 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bc0 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1bc1 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bc2 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bc3 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1bc4 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bc6 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bc5 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bc7 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cc9 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cca 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ccb 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ccc 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ccd 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cce 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ccf 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cd0 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 gate 1602702101938824500 evaluation starts +peer0.org1.example.com | [1cd1 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cd2 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1cd3 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 principal matched by identity 0 +peer0.org1.example.com | [1cd4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1cd5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1cd6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cd7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 gate 1602702101938824500 evaluation succeeds +peer0.org1.example.com | [1cd8 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cd9 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cda 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cdb 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cdc 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cdd 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cde 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cdf 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1ce0 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1ce1 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1ce2 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1dd3 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd4 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1dd5 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer0.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer0.org2.example.com | [1dd6 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer0.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer0.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer0.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org2.example.com | [1dd7 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1dd8 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 38 06 88 7f 94 4b cc 7f da 87 |0E.!..8....K....| +peer0.org2.example.com | 00000010 aa 74 76 b7 88 7b bf 3f d0 ed 89 07 b3 07 34 f2 |.tv..{.?......4.| +peer0.org2.example.com | 00000020 d3 d1 f6 21 7c 02 20 18 7c 58 4b 87 4f a1 2b 6c |...!|. .|XK.O.+l| +peer0.org2.example.com | 00000030 4c b5 e7 27 be 08 11 8b 6c 78 2a 1a 14 87 af 18 |L..'....lx*.....| +peer0.org2.example.com | 00000040 ce 4f 71 98 61 ea 4b |.Oq.a.K| +peer0.org2.example.com | [1dd9 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1dda 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1ddb 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1ddc 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ddd 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1dde 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ddf 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de0 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de1 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1de2 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de3 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1de4 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1de5 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org2.example.com | [1de6 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de7 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de8 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1de9 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dea 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1deb 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bc8 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bc9 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bca 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bcb 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1bcc 10-14 19:01:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bcd 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1bce 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161025 +peer1.org1.example.com | [1bcf 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2ACCF994847783F51E8D4877ECA3ADAF3DF4B371D880BA173B0DAD74850216A2 +peer1.org1.example.com | [1bd0 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1bd1 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1bd2 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1bd3 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1bd4 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd5 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd6 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd7 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1bd8 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bd9 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1bda 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1bdb 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bdc 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdd 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bde 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdf 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1be0 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1be1 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1be2 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1be3 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1be4 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1be5 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1be6 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 9c 71 9f 67 23 2b ac 2c e5 b3 88 8c fb d1 f3 |..q.g#+.,.......| +peer1.org1.example.com | 00000010 26 c7 45 93 8a a1 19 14 cc 08 ce 63 d6 bc 4a 9c |&.E........c..J.| +peer1.org1.example.com | [1be7 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 49 cf 81 47 03 b3 b8 20 05 81 49 0a |0D. I..G... ..I.| +peer1.org1.example.com | 00000010 c7 5a 91 9a 2a 4e 90 94 56 a8 fa 66 08 66 af d4 |.Z..*N..V..f.f..| +peer1.org1.example.com | 00000020 9e fd 5a 8a 02 20 0a 41 fb 98 74 b9 8f df 2e 98 |..Z.. .A..t.....| +peer1.org1.example.com | 00000030 0e f4 ae b8 59 b4 63 8c 2b 7c 27 af 70 48 1f 3c |....Y.c.+|'.pH.<| +peer1.org1.example.com | 00000040 14 e6 14 1b f2 e2 |......| +peer1.org1.example.com | [1be8 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1eba 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 56DC4539BC7341B1EB9FFD308052D05A75EC1C8EB7B7881311B75E6CBE3AC861 +peer1.org2.example.com | [1ebb 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1ebc 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ebd 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ebe 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ebf 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec0 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1ec1 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec2 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec3 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ec4 10-14 19:01:48.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ec5 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ec6 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec7 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec8 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ec9 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eca 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ecb 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ecc 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ecd 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1ece 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ecf 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ed0 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ed1 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed2 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ed3 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1ed4 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 5f f2 3b fc 57 f6 78 e3 33 5c be 31 ae 40 7b |3_.;.W.x.3\.1.@{| +peer1.org2.example.com | 00000010 35 31 b8 5c 5d 2c 21 ca 9a f0 61 ea 04 27 33 35 |51.\],!...a..'35| +peer1.org2.example.com | [1ed5 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0a 4e 6b ac 0c 9f 08 f0 87 66 9c |0D. r.Nk......f.| +peer1.org2.example.com | 00000010 bf 03 eb 4e 08 f0 b4 ac b0 b0 90 35 cf c6 b0 36 |...N.......5...6| +peer1.org2.example.com | 00000020 16 48 af c1 02 20 5e 5d f7 a1 0a a7 26 23 5e 97 |.H... ^]....&#^.| +peer1.org2.example.com | 00000030 46 1e 47 4d 3e 03 9c d8 7e ac 0a 15 ba 87 e5 af |F.GM>...~.......| +peer1.org2.example.com | 00000040 91 9c 8a 8a 82 fc |......| +peer1.org2.example.com | [1ed6 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ed7 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1ed8 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ed9 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1eda 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1edb 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1edc 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1edd 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ede 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dec 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ded 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dee 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1def 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df0 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df1 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df2 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df3 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1df4 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1df5 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df6 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1df7 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df8 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1df9 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1dfa 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dfb 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1dfc 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dfd 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1dfe 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1dff 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e00 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e01 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 gate 1602702110405221800 evaluation starts +peer0.org2.example.com | [1e02 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e03 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1e04 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 principal matched by identity 0 +peer0.org2.example.com | [1e05 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 4a 8d 3c 07 fd d1 a3 2c 7b 0b 1b ad 48 91 1c |.J.<....,{...H..| +peer0.org2.example.com | 00000010 01 b1 3f 2f 9d 50 db b0 2a 1a ae 19 e7 46 5b af |..?/.P..*....F[.| +peer0.org2.example.com | [1e06 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed fa 2e 37 07 30 d1 e7 d3 e8 a9 |0E.!....7.0.....| +peer0.org2.example.com | 00000010 44 98 b7 06 36 54 3c 24 db 77 0a 51 7d e0 e9 22 |D...6T<$.w.Q}.."| +peer0.org1.example.com | [1ce3 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ce4 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be9 10-14 19:01:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1bea 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1beb 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bec 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bed 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bee 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bef 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bf0 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bf1 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bf2 10-14 19:01:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bf3 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1bf4 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bf5 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1bf6 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bf7 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bf8 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bf9 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bfa 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bfb 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bfc 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bfd 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bfe 10-14 19:01:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bff 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1c00 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c01 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1c02 10-14 19:01:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c03 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c04 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c05 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c06 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c07 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c08 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c09 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0a 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0b 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1edf 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ee0 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ee1 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1ee2 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ee3 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1ee4 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ee5 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ee6 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ee7 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ee8 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ee9 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1eea 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eeb 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1eec 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1eed 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2035\tOP\201s`\027\031\360" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eee 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\2035\tOP\201s`\027\031\360" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1eef 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ef0 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\2035\tOP\201s`\027\031\360" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ef1 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1ef2 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer1.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org2.example.com | [1ef3 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer1.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer1.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer1.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer1.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer1.org2.example.com | [1ef4 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1ef5 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 14 d4 b6 dc 33 9e 55 e0 4c f7 be |0D. $....3.U.L..| +peer1.org2.example.com | 00000010 f4 0d 27 2a ad 21 4d 9e e0 f6 34 c8 32 96 1b 30 |..'*.!M...4.2..0| +peer1.org2.example.com | 00000020 af ba ef 2d 02 20 26 5c 3b 62 b1 23 14 34 ec fd |...-. &\;b.#.4..| +peer1.org2.example.com | 00000030 44 2e de b6 a5 8c a0 a5 81 e1 3e 83 35 09 4f 50 |D.........>.5.OP| +peer1.org2.example.com | 00000040 81 73 60 17 19 f0 |.s`...| +peer1.org2.example.com | [1ef6 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1ef7 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [1ef8 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ef9 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1efa 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1efb 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1efc 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0c 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0d 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0e 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0f 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c10 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c11 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c12 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c13 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c14 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c15 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c16 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1c17 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c18 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c19 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1a 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c1b 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c1c 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1c1d 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c1e 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c1f 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c20 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c21 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c22 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c23 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c24 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 gate 1602702106191186700 evaluation starts +peer1.org1.example.com | [1c25 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c26 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1ce5 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ce6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ce7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ce8 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ce9 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cea 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ceb 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 gate 1602702101945086200 evaluation starts +peer0.org1.example.com | [1cec 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ced 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1cee 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 principal matched by identity 0 +peer0.org1.example.com | [1cef 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1cf0 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1cf1 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cf2 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 gate 1602702101945086200 evaluation succeeds +peer0.org1.example.com | [1cf3 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cf4 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cf5 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cf6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cf7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf8 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf9 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfa 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfb 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1cfc 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfd 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfe 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cff 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d00 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d01 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d02 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d03 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d04 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d05 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d06 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d07 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 gate 1602702101957258400 evaluation starts +peer0.org1.example.com | [1d08 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d09 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1d0a 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 principal matched by identity 0 +peer0.org1.example.com | [1d0b 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1d0c 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1d0d 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d0e 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 gate 1602702101957258400 evaluation succeeds +peer0.org1.example.com | [1d0f 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d10 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d11 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d12 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d13 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d14 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1efd 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1efe 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1eff 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f00 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f01 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f02 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\2035\tOP\201s`\027\031\360" > > alive: +peer1.org2.example.com | [1f03 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f04 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f05 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f06 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161020 +peer1.org2.example.com | [1f07 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FF7C2856F126182A6AEE3602DA4CAA4C5D7FAE072BBF92E9C430018C7E7B434 +peer1.org2.example.com | [1f08 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f09 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1f0a 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1f0b 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1f0c 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f0d 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f0e 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f0f 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f10 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f11 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f12 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1f13 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f14 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f15 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f16 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f17 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f18 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f19 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1f1a 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f1b 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1f1c 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f1d 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1f1e 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f1f 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f20 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f21 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 46 cf 25 1f 2c 02 20 68 47 93 54 d1 55 9b 4a 9b |F.%.,. hG.T.U.J.| +peer0.org2.example.com | 00000030 10 f0 fa ee 76 e9 c9 eb 9a b4 c0 de cf 42 98 0a |....v........B..| +peer0.org2.example.com | 00000040 7f 76 c9 31 ec b7 54 |.v.1..T| +peer0.org2.example.com | [1e07 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e08 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004887a60 gate 1602702110405221800 evaluation succeeds +peer0.org2.example.com | [1e09 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e0a 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e0b 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e0c 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e0d 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e0e 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1e0f 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1e10 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e11 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1e12 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e13 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e14 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e15 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e16 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e17 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e18 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e19 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e1a 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e1b 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e1c 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e1d 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e1e 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e1f 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e20 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e21 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e22 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e23 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e24 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e25 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e26 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e27 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e28 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e29 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e2a 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f22 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f23 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f24 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f25 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f26 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f27 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f28 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f29 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2a 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2b 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2c 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f2d 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2e 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f2f 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f30 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f31 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f32 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f33 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f34 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f35 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f36 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f37 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161021 +peer1.org2.example.com | [1f38 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82521D8209A66D0BCCA4ADCF40CE017002D213D262D8CD05A3B911FE07C9E4AC +peer1.org2.example.com | [1f39 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f3a 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1f3b 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [1c27 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 principal matched by identity 0 +peer1.org1.example.com | [1c28 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org1.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer1.org1.example.com | [1c29 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer1.org1.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer1.org1.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer1.org1.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer1.org1.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer1.org1.example.com | [1c2a 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c2b 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048eadb0 gate 1602702106191186700 evaluation succeeds +peer1.org1.example.com | [1c2c 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c2d 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c2e 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c2f 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c30 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1c31 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1c32 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1c33 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1c34 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1c35 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c36 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c37 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c38 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1c39 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c3a 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c3b 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c3c 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1c3d 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c3f 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c3e 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1c40 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c41 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c42 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c43 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c44 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c45 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c46 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c47 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e2b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e2c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e2d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e2e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1e2f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e30 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e31 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e32 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e33 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e34 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e35 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e36 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 gate 1602702110436384900 evaluation starts +peer0.org2.example.com | [1e37 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e38 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1e39 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 principal matched by identity 0 +peer0.org2.example.com | [1e3a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org2.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org2.example.com | [1e3b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org2.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org2.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer0.org2.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer0.org2.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer0.org2.example.com | [1e3c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e3d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f1810 gate 1602702110436384900 evaluation succeeds +peer0.org2.example.com | [1e3e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e3f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e40 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e41 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e42 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1e43 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1e44 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1f3c 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f3d 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f3e 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f3f 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f40 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f41 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f42 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f43 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f44 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f45 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f46 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f47 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f48 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f49 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f4a 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f4b 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f4c 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer1.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer1.org2.example.com | [1f4d 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer1.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer1.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer1.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer1.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer1.org2.example.com | [1f4e 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1f4f 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 38 06 88 7f 94 4b cc 7f da 87 |0E.!..8....K....| +peer1.org2.example.com | 00000010 aa 74 76 b7 88 7b bf 3f d0 ed 89 07 b3 07 34 f2 |.tv..{.?......4.| +peer1.org2.example.com | 00000020 d3 d1 f6 21 7c 02 20 18 7c 58 4b 87 4f a1 2b 6c |...!|. .|XK.O.+l| +peer1.org2.example.com | 00000030 4c b5 e7 27 be 08 11 8b 6c 78 2a 1a 14 87 af 18 |L..'....lx*.....| +peer1.org2.example.com | 00000040 ce 4f 71 98 61 ea 4b |.Oq.a.K| +peer1.org2.example.com | [1f50 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1e45 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e46 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1e47 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e48 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e49 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e4a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1e4b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e4e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e4f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org2.example.com | [1e50 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e51 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e52 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e53 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e54 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e55 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e56 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e57 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e58 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e59 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e5a 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1e5b 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e5c 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e5d 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e5e 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e5f 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1e60 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d15 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d16 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1d17 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1d18 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d19 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d1a 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d1b 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d1c 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d1d 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d1e 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d1f 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d20 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 gate 1602702101964171900 evaluation starts +peer0.org1.example.com | [1d21 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d22 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1d23 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 principal matched by identity 0 +peer0.org1.example.com | [1d24 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1d25 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1d26 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d27 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 gate 1602702101964171900 evaluation succeeds +peer0.org1.example.com | [1d28 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d29 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d2a 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d2b 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d2c 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2d 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d2e 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d2f 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d30 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d31 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d32 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d33 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d34 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 gate 1602702101968504800 evaluation starts +peer0.org1.example.com | [1d35 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d36 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1d37 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 principal matched by identity 0 +peer0.org1.example.com | [1d38 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | [1c48 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1c49 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c4a 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c4b 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c4c 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1c4d 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c4e 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c4f 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c50 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c51 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c52 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c53 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c54 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c55 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c56 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1c57 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1c58 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c59 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1c5a 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1c5b 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5c 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c5d 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c5e 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c5f 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c60 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c61 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c62 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c63 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 gate 1602702106295101100 evaluation starts +peer0.org2.example.com | [1e61 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e62 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e63 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e64 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e65 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e66 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e67 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e68 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 gate 1602702110587273600 evaluation starts +peer0.org2.example.com | [1e69 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e6a 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1e6b 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 principal matched by identity 0 +peer0.org2.example.com | [1e6c 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 4e c8 16 33 8d e3 90 83 09 ec 15 12 32 9f 3e |:N..3........2.>| +peer0.org2.example.com | 00000010 35 72 dc 55 a8 00 49 84 a9 ef 36 ee c1 42 0b 96 |5r.U..I...6..B..| +peer0.org2.example.com | [1e6d 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 0c df 48 4b 4d fc 06 f4 82 38 |0E.!....HKM....8| +peer0.org2.example.com | 00000010 c2 f6 ae 46 4b 2c 5c fc e4 bd 8d 53 69 56 8c 4b |...FK,\....SiV.K| +peer0.org2.example.com | 00000020 07 3b 32 dc e2 02 20 10 3a 37 cd 85 83 bd 44 a9 |.;2... .:7....D.| +peer0.org2.example.com | 00000030 9d d5 42 4a 41 cc d4 b0 14 72 47 18 9e 65 de e0 |..BJA....rG..e..| +peer0.org2.example.com | 00000040 16 47 1b 9b 20 f8 7b |.G.. .{| +peer0.org2.example.com | [1e6e 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e6f 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004925d10 gate 1602702110587273600 evaluation succeeds +peer0.org2.example.com | [1e70 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e71 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e72 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e73 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e74 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e75 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1e76 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1e77 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e78 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1e79 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7a 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7b 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7c 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e7d 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7e 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7f 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e80 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e81 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e82 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1d39 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1d3a 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d3b 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 gate 1602702101968504800 evaluation succeeds +peer0.org1.example.com | [1d3c 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c64 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c65 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1c66 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 principal matched by identity 0 +peer1.org1.example.com | [1c67 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1c68 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1c69 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c6a 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004960020 gate 1602702106295101100 evaluation succeeds +peer1.org1.example.com | [1c6b 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c6c 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c6d 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c6e 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c6f 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c70 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c71 10-14 19:01:46.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c72 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c73 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c74 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c75 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c76 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c77 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 gate 1602702106302123100 evaluation starts +peer1.org1.example.com | [1c78 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c79 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1c7a 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 principal matched by identity 0 +peer1.org1.example.com | [1c7b 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1c7c 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1c7d 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c7e 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961220 gate 1602702106302123100 evaluation succeeds +peer1.org1.example.com | [1c7f 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c80 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c81 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c82 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c83 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c84 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c85 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1c86 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1c87 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1c88 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | [1e83 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e84 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d3d 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d3e 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d3f 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d40 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1d41 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1d42 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d43 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d44 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d45 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d46 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d47 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d48 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d49 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4a 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4b 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4c 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4d 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4e 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d4f 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1d50 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d51 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d52 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d53 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d54 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d55 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1d56 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d57 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d58 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d59 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d5a 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d5b 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d5c 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d5d 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 gate 1602702102193756600 evaluation starts +peer0.org1.example.com | [1d5e 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d5f 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1d60 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 principal matched by identity 0 +peer0.org1.example.com | [1d61 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer0.org1.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer0.org1.example.com | [1d62 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer0.org1.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer0.org1.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer0.org1.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer0.org1.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer0.org1.example.com | [1d63 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d64 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 gate 1602702102193756600 evaluation succeeds +peer0.org1.example.com | [1d65 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d66 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d67 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f51 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1f52 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f53 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f54 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f55 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f56 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f57 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f58 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f59 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f5a 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f7 c2 85 6f 12 61 82 a6 ae e3 60 2d a4 ca a4 |/...o.a....`-...| +peer1.org2.example.com | 00000010 c5 d7 fa e0 72 bb f9 2e 9c 43 00 18 c7 e7 b4 34 |....r....C.....4| +peer1.org2.example.com | [1f5b 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 b0 f2 f0 6f 0d c3 f5 ac 77 30 |0E.!.....o....w0| +peer1.org2.example.com | 00000010 1d a9 c3 35 fd b1 76 44 fe be c3 f5 36 4b 95 ff |...5..vD....6K..| +peer1.org2.example.com | 00000020 d4 52 7e f2 38 02 20 72 6e b5 33 6d e5 d1 29 a4 |.R~.8. rn.3m..).| +peer1.org2.example.com | 00000030 61 c4 fc 8e 56 0e af b7 5e 57 03 78 44 ae 38 e9 |a...V...^W.xD.8.| +peer1.org2.example.com | 00000040 0e a3 b9 3a e5 35 57 |...:.5W| +peer1.org2.example.com | [1f5c 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f5d 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f5e 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f5f 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1f61 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f60 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f62 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f63 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f64 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f65 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f66 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f67 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f68 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f69 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 gate 1602702110317090600 evaluation starts +peer1.org2.example.com | [1f6a 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f6b 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1c89 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c8a 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c8b 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c8c 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c8d 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c8e 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c8f 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c90 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c91 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 gate 1602702106307474300 evaluation starts +peer1.org1.example.com | [1c92 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c93 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1c94 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 principal matched by identity 0 +peer1.org1.example.com | [1c95 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1c96 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1c97 10-14 19:01:46.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c98 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497f3a0 gate 1602702106307474300 evaluation succeeds +peer1.org1.example.com | [1c99 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c9a 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c9b 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c9c 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c9d 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c9e 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f6c 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f6d 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 principal evaluation fails +peer1.org2.example.com | [1f6e 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d8fa0 gate 1602702110317090600 evaluation fails +peer1.org2.example.com | [1f6f 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f70 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f71 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f72 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 gate 1602702110318460400 evaluation starts +peer1.org2.example.com | [1f73 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f74 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1f75 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 principal matched by identity 0 +peer1.org2.example.com | [1f76 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer1.org2.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer1.org2.example.com | [1f77 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer1.org2.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer1.org2.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer1.org2.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer1.org2.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer1.org2.example.com | [1f78 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f79 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9510 gate 1602702110318460400 evaluation succeeds +peer1.org2.example.com | [1f7a 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f7b 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f7c 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f7d 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f7e 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f7f 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f80 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1f81 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer1.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org2.example.com | [1f82 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer1.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer1.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer1.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer1.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer1.org2.example.com | [1f83 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f84 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f85 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f86 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer1.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer1.org2.example.com | [1f87 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer1.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer1.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer1.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer1.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org1.example.com | [1d68 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d69 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d6a 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1d6b 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d6c 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1d6d 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1d6e 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d6f 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d70 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d71 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1d72 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d73 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d74 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d75 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f88 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f89 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f8a 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f8b 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f8c 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f8d 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f8e 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1f8f 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f90 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f91 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f92 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f93 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f94 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f95 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f96 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 gate 1602702110326891900 evaluation starts +peer1.org2.example.com | [1f97 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f98 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1f99 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f9a 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 principal evaluation fails +peer1.org2.example.com | [1f9b 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f5c20 gate 1602702110326891900 evaluation fails +peer1.org2.example.com | [1f9c 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f9d 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f9e 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f9f 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 gate 1602702110327316000 evaluation starts +peer1.org2.example.com | [1fa0 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fa1 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1fa2 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 principal matched by identity 0 +peer1.org2.example.com | [1fa3 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer1.org2.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer1.org2.example.com | [1fa4 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer1.org2.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer1.org2.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer1.org2.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer1.org2.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer1.org2.example.com | [1fa5 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fa6 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e190 gate 1602702110327316000 evaluation succeeds +peer1.org2.example.com | [1fa7 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fa8 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fa9 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e85 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e86 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e87 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e88 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e89 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e8a 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e8b 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e8c 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1e8d 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e8e 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e8f 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e90 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e91 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e92 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e93 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e94 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1e95 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e96 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e97 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e98 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e99 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e9a 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e9b 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e9c 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 gate 1602702110596125300 evaluation starts +peer0.org2.example.com | [1e9d 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e9e 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1e9f 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 principal matched by identity 0 +peer1.org2.example.com | [1faa 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fab 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fac 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fad 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1fae 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer1.org2.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org2.example.com | [1faf 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer1.org2.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer1.org2.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer1.org2.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer1.org2.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer1.org2.example.com | [1fb0 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fb1 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fb2 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1fb3 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer1.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer1.org2.example.com | [1fb4 10-14 19:01:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer1.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer1.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer1.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer1.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer1.org2.example.com | [1fb5 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fb6 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fb7 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fb8 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fb9 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fba 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fbb 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fbc 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fbd 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fbe 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fbf 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc0 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc1 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fc2 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1fc3 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc4 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fc5 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fc6 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fc7 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fc8 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1fc9 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fca 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1fcb 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fcc 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fcd 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1fce 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1fcf 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1fd0 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 gate 1602702110406851100 evaluation starts +peer1.org2.example.com | [1fd1 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fd2 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1fd3 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1fd4 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 principal evaluation fails +peer1.org2.example.com | [1fd5 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d2a0 gate 1602702110406851100 evaluation fails +peer1.org2.example.com | [1fd6 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fd7 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fd8 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1fd9 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 gate 1602702110407111600 evaluation starts +peer1.org2.example.com | [1fda 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fdb 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [1fdc 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 principal matched by identity 0 +peer1.org2.example.com | [1fdd 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 4a 8d 3c 07 fd d1 a3 2c 7b 0b 1b ad 48 91 1c |.J.<....,{...H..| +peer1.org2.example.com | 00000010 01 b1 3f 2f 9d 50 db b0 2a 1a ae 19 e7 46 5b af |..?/.P..*....F[.| +peer1.org2.example.com | [1fde 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed fa 2e 37 07 30 d1 e7 d3 e8 a9 |0E.!....7.0.....| +peer1.org2.example.com | 00000010 44 98 b7 06 36 54 3c 24 db 77 0a 51 7d e0 e9 22 |D...6T<$.w.Q}.."| +peer1.org2.example.com | 00000020 46 cf 25 1f 2c 02 20 68 47 93 54 d1 55 9b 4a 9b |F.%.,. hG.T.U.J.| +peer1.org2.example.com | 00000030 10 f0 fa ee 76 e9 c9 eb 9a b4 c0 de cf 42 98 0a |....v........B..| +peer1.org2.example.com | 00000040 7f 76 c9 31 ec b7 54 |.v.1..T| +peer1.org2.example.com | [1fdf 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fe0 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00472d810 gate 1602702110407111600 evaluation succeeds +peer1.org2.example.com | [1fe1 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fe2 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fe3 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1fe4 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fe5 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1fe6 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1fe7 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1d76 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > alive: alive: alive: +peer0.org1.example.com | [1d77 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d78 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d79 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d7a 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d7b 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d7c 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7d 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7e 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7f 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d80 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d81 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d82 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1d83 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d84 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d85 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d86 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d87 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d88 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d89 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d8a 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d8b 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d8c 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1d8d 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d8e 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d8f 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d90 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c9f 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ca0 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ca1 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ca2 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ca3 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ca4 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ca5 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 gate 1602702106319883100 evaluation starts +peer1.org1.example.com | [1ca6 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ca7 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1ca8 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 principal matched by identity 0 +peer1.org1.example.com | [1ca9 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1caa 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1cab 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cac 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499e5a0 gate 1602702106319883100 evaluation succeeds +peer1.org1.example.com | [1cad 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cae 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1caf 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cb0 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cb1 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cb2 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb3 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb4 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1cb5 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1cb6 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb7 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ea0 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer0.org2.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer0.org2.example.com | [1ea1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer0.org2.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer0.org2.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer0.org2.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer0.org2.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer0.org2.example.com | [1ea2 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ea3 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049689b0 gate 1602702110596125300 evaluation succeeds +peer0.org2.example.com | [1ea4 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ea5 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ea6 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ea7 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ea8 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1ea9 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eaa 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eab 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eac 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ead 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eae 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eaf 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1eb0 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1eb1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1eb2 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1eb3 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1eb4 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1eb5 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1eb6 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eb7 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eb8 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eb9 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1eba 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebb 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebc 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebd 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ebe 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ebf 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cb8 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1cb9 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cba 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cbb 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1cbc 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1cbd 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1cbe 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 gate 1602702106330450000 evaluation starts +peer1.org1.example.com | [1cbf 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1cc0 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1cc1 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 principal matched by identity 0 +peer1.org1.example.com | [1cc2 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1cc3 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1cc4 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cc5 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b60e0 gate 1602702106330450000 evaluation succeeds +peer1.org1.example.com | [1cc6 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cc7 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cc8 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cc9 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cca 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccb 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccc 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ccd 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cce 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ccf 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1cd0 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1cd1 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1cd2 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 gate 1602702106338487000 evaluation starts +peer1.org1.example.com | [1cd3 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1cd4 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1cd5 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 principal matched by identity 0 +peer1.org1.example.com | [1cd6 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1d91 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d92 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d93 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d94 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 gate 1602702102300791500 evaluation starts +peer0.org1.example.com | [1d95 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d96 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1d97 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 principal matched by identity 0 +peer0.org1.example.com | [1d98 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer0.org1.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer0.org1.example.com | [1d99 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer0.org1.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer0.org1.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer0.org1.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer0.org1.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer0.org1.example.com | [1d9a 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d9b 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 gate 1602702102300791500 evaluation succeeds +peer0.org1.example.com | [1d9c 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d9d 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d9e 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d9f 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1da0 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1da1 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1da2 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1da3 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1da4 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1da5 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1da6 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1da7 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1da8 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1da9 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1daa 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dab 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dac 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dad 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > alive: alive: +peer0.org1.example.com | [1dae 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1daf 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db0 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1db1 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cd7 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1cd8 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1cd9 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b72e0 gate 1602702106338487000 evaluation succeeds +peer1.org1.example.com | [1cda 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cdb 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1cdc 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1cdd 10-14 19:01:46.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1cde 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1cdf 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1ce0 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ce1 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce2 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ce3 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ce4 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1ce5 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ce6 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ce7 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ce8 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ce9 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1cea 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ceb 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1cec 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 gate 1602702106342774200 evaluation starts +peer1.org1.example.com | [1ced 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1cee 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1cef 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 principal matched by identity 0 +peer1.org1.example.com | [1cf0 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org1.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer1.org1.example.com | [1cf1 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer1.org1.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer1.org2.example.com | [1fe8 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ec0 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org1.example.com | [1db2 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer1.org1.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org1.example.com | [1db3 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer1.org2.example.com | [1fe9 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1db4 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf2 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ec1 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ec2 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1db5 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cf3 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f9f20 gate 1602702106342774200 evaluation succeeds +peer0.org1.example.com | [1db6 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1db7 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cf4 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1db8 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ec3 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf5 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fea 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1db9 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ec4 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1cf6 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1feb 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dba 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ec5 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cf7 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1dbb 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1fec 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fed 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1cf8 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1dbc 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer1.org2.example.com | [1fee 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1cf9 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1ec6 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer1.org2.example.com | [1fef 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cfa 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1ec7 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1dbd 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer1.org2.example.com | [1ff0 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1cfb 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ec8 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer1.org2.example.com | [1ff1 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cfc 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1ec9 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer1.org2.example.com | [1ff2 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cfd 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1eca 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 gate 1602702110605690100 evaluation starts +peer0.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer1.org2.example.com | [1ff4 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cfe 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ecb 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer1.org2.example.com | [1ff5 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cff 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ecc 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1dbe 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1ff6 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d00 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1ecd 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 principal matched by identity 0 +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1ff7 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d01 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ece 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | [1dbf 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 ff db 5f 61 62 01 e1 9f ef c3 |0E.!...._ab.....| +peer1.org2.example.com | [1ff8 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d02 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | 00000010 72 28 f2 8c 3b d1 b2 46 22 9d 35 49 7f 70 3f 7c |r(..;..F".5I.p?|| +peer1.org2.example.com | [1ff9 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d03 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ecf 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000020 e9 3f b1 1c 04 02 20 77 e3 65 2e 5b 09 13 9c 34 |.?.... w.e.[...4| +peer1.org2.example.com | [1ffa 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d04 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000030 81 9a 99 57 48 b5 8c e4 ce c0 84 15 b9 36 98 78 |...WH........6.x| +peer1.org2.example.com | [1ffb 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d05 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000040 26 64 44 18 25 1d 19 |&dD.%..| +peer1.org2.example.com | [1ffc 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d06 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | [1dc0 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1ffd 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d07 10-14 19:01:46.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1dc1 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1ff3 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d08 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed0 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1dc2 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1ffe 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d09 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed1 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004982ce0 gate 1602702110605690100 evaluation succeeds +peer0.org1.example.com | [1dc3 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1fff 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d0a 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1ed2 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1dc4 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2000 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d0b 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed3 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1dc5 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2001 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d0c 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ed4 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1dc6 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2002 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d0d 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ed5 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1dc7 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2003 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d0e 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ed6 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | [1dc8 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2004 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d0f 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1dc9 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2005 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d10 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ed7 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | [1dca 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2006 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d11 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | [1dcc 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2007 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d12 10-14 19:01:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | [1dcb 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2008 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d13 10-14 19:01:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | [1dcd 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2009 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d14 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1dce 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d15 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [200a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ed8 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | [1dcf 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1d16 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [200b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1dd0 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d17 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [200c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ed9 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | [1dd1 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1d18 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [200d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1dd2 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | [1d19 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [200e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1dd3 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | [1d1a 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [200f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1dd4 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | [1d1b 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2010 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 gate 1602702110437336700 evaluation starts +peer0.org1.example.com | [1dd5 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1d1c 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2011 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1dd6 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1eda 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d1d 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2012 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1dd7 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1edb 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d1f 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2013 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1dd8 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1edc 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d1e 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2014 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 principal evaluation fails +peer0.org1.example.com | [1dd9 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1edd 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d20 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2015 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476ad80 gate 1602702110437336700 evaluation fails +peer0.org1.example.com | [1dda 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ede 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d21 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2016 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ddb 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1edf 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d22 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2017 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ddc 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee0 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d23 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2018 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1ddd 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee1 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1d24 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2019 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 gate 1602702110437599300 evaluation starts +peer0.org1.example.com | [1dde 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee2 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 gate 1602702110611983700 evaluation starts +peer1.org1.example.com | [1d25 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [201a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ddf 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ee3 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d26 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [201b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1de0 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee4 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1d27 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 principal matched by identity 0 +peer0.org1.example.com | [1de1 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ee5 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 principal matched by identity 0 +peer1.org1.example.com | [1d28 10-14 19:01:46.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [201d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org1.example.com | [1de2 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee6 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | [1d29 10-14 19:01:46.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org1.example.com | [1de3 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1d2a 10-14 19:01:46.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org1.example.com | [1de4 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ee7 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | [1d2b 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org1.example.com | [1de5 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer1.org1.example.com | [1d2c 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161026 +peer0.org1.example.com | [1de6 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer1.org1.example.com | [1d2d 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4F757ABE336A9A26D9B75D3BE2392CEC7C018DB59F38165420EA05736DE65BEB +peer0.org1.example.com | [1de7 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161020 +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer1.org1.example.com | [1d2e 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1de8 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6CE4EDC4194FF2239928BA890B07E9CF92AAA8FD7C191392E2145199159BBDD1 +peer1.org2.example.com | [201f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d2f 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1de9 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [2020 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00476b2f0 gate 1602702110437599300 evaluation succeeds +peer1.org1.example.com | [1d30 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [1dea 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1ee8 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2021 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d31 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1deb 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [1ee9 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a6cc0 gate 1602702110611983700 evaluation succeeds +peer1.org2.example.com | [2022 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1d32 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dec 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1eea 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2023 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d33 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ded 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eeb 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2024 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d35 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1def 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1eec 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2025 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d36 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1df0 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eed 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2026 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1d37 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1df1 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1eee 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2027 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1d38 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df2 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1eef 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2028 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d39 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df3 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef0 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2029 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1d34 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df4 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ef1 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [202a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3a 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dee 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ef2 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [202b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3b 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df5 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef3 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [202c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3c 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df6 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef4 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d3d 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [202d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1df7 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ef5 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d3e 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [202e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1df8 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ef6 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d3f 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [202f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1df9 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ef7 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d40 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2030 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dfa 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1ef8 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1d41 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer1.org2.example.com | [2031 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1dfb 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer0.org2.example.com | [1ef9 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6140 gate 1602702110623477800 evaluation starts +peer1.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer1.org2.example.com | [2032 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer0.org2.example.com | [1efa 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d42 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer1.org2.example.com | [2033 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dfc 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer0.org2.example.com | [1efb 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6140 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer1.org2.example.com | [2034 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU 0xc0049c6140 principal matched by identity 0 +peer1.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer1.org2.example.com | [2035 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 86 99 c1 e8 69 02 20 01 4f 0a a8 62 59 49 a6 32 |....i. .O..bYI.2| +peer0.org2.example.com | [1efd 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer1.org2.example.com | [2036 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 04 03 6a 31 99 f5 ba 23 03 7a 77 bd 86 9e e5 73 |..j1...#.zw....s| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer1.org2.example.com | [2037 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 40 aa 39 16 d6 23 07 |@.9..#.| +peer0.org2.example.com | [1efe 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | [1d43 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [2038 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dfd 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [2039 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | [1d44 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 0d 48 d5 cb 7e 52 c3 93 f1 13 |0E.!...H..~R....| +peer1.org2.example.com | [203a 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dfe 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 68 e8 9a 99 fc 12 bc c5 83 de |0E.!..h.........| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000010 c5 45 63 9c a9 19 1a be 0d 1f 17 75 65 6f ab 3d |.Ec........ueo.=| +peer1.org2.example.com | [203b 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 71 57 4f c2 9e 92 d1 0e f4 75 fc 3f 32 62 8f af |qWO......u.?2b..| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | 00000020 8e b2 10 da af 02 20 4d 0f 09 d7 94 f0 e9 f0 f3 |...... M........| +peer1.org2.example.com | [203c 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 89 80 17 59 fd 02 20 20 f9 8e c3 97 3f 53 ab e1 |...Y.. ....?S..| +peer0.org2.example.com | [1eff 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6140 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 de 79 6e 93 f0 81 9f 0d 43 03 7b ff d8 f6 dd cd |.yn.....C.{.....| +peer1.org2.example.com | [203d 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | 00000030 0b 17 63 89 88 72 2b 09 12 69 d8 5d 4d 93 5d ec |..c..r+..i.]M.].| +peer0.org2.example.com | [1f00 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6140 gate 1602702110623477800 evaluation succeeds +peer1.org2.example.com | [203e 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 d4 ee cc 4f 37 50 37 |...O7P7| +peer0.org1.example.com | 00000040 fc 46 9e 0d 38 d7 74 |.F..8.t| +peer0.org2.example.com | [1f01 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [203f 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d45 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1dff 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1f02 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2040 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d46 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1e00 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1f03 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2041 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d47 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e01 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f04 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2042 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1d48 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e02 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f05 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2043 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d49 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e03 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f06 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d4a 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2044 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e04 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f07 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d4b 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2045 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e05 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f08 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d4c 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2046 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e06 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f09 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d4d 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2047 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e07 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f0a 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d4e 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2048 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e08 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f0b 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d4f 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2049 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e09 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1f0c 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1d50 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [204a 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 gate 1602702110573092300 evaluation starts +peer0.org1.example.com | [1e0a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f0d 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 gate 1602702110628642000 evaluation starts +peer1.org1.example.com | [1d51 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [204b 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e0b 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f0e 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d52 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [204c 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1e0c 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f0f 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1d53 10-14 19:01:46.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [204d 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1e0d 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f10 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 principal matched by identity 0 +peer1.org1.example.com | [1d54 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [204e 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 principal evaluation fails +peer0.org1.example.com | [1e0e 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f11 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | [1d55 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [204f 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047891f0 gate 1602702110573092300 evaluation fails +peer0.org1.example.com | [1e0f 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1d56 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 gate 1602702106492604300 evaluation starts +peer1.org2.example.com | [2050 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e10 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f12 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | [1d57 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2051 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e11 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 gate 1602702102633046400 evaluation starts +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | [1d58 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2052 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1e12 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | [1d59 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 principal matched by identity 0 +peer1.org2.example.com | [2053 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 gate 1602702110573898600 evaluation starts +peer0.org1.example.com | [1e13 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | [1d5a 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer1.org2.example.com | [2054 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e14 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 principal matched by identity 0 +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer1.org2.example.com | [2055 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1e15 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +peer0.org1.example.com | 00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +peer0.org2.example.com | [1f13 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f14 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c7340 gate 1602702110628642000 evaluation succeeds +peer0.org2.example.com | [1f15 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f16 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f17 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f18 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f19 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1f1a 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1f1b 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org2.example.com | [1f1c 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1f1d 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f1e 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f1f 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f20 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f21 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f22 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f23 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f24 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f25 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f26 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f27 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f28 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 gate 1602702110640560500 evaluation starts +peer0.org2.example.com | [1f29 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f2a 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1f2b 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 principal matched by identity 0 +peer0.org2.example.com | [1f2c 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org2.example.com | [1f2d 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org2.example.com | [1f2e 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f2f 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049db5a0 gate 1602702110640560500 evaluation succeeds +peer0.org2.example.com | [1f30 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f31 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f32 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f33 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f34 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f35 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f36 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f37 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f38 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f39 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f3a 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f3b 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f3c 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 gate 1602702110643488200 evaluation starts +peer0.org2.example.com | [1f3d 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f3e 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1f3f 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 principal matched by identity 0 +peer0.org2.example.com | [1f40 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [1f41 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org2.example.com | [1f42 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f43 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fc7a0 gate 1602702110643488200 evaluation succeeds +peer0.org2.example.com | [1f44 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f45 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f46 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f47 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f48 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org2.example.com | [1f49 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | [2056 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 principal matched by identity 0 +peer1.org2.example.com | [2057 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 4e c8 16 33 8d e3 90 83 09 ec 15 12 32 9f 3e |:N..3........2.>| +peer1.org2.example.com | 00000010 35 72 dc 55 a8 00 49 84 a9 ef 36 ee c1 42 0b 96 |5r.U..I...6..B..| +peer1.org2.example.com | [2058 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 0c df 48 4b 4d fc 06 f4 82 38 |0E.!....HKM....8| +peer1.org2.example.com | 00000010 c2 f6 ae 46 4b 2c 5c fc e4 bd 8d 53 69 56 8c 4b |...FK,\....SiV.K| +peer1.org2.example.com | 00000020 07 3b 32 dc e2 02 20 10 3a 37 cd 85 83 bd 44 a9 |.;2... .:7....D.| +peer1.org2.example.com | 00000030 9d d5 42 4a 41 cc d4 b0 14 72 47 18 9e 65 de e0 |..BJA....rG..e..| +peer1.org2.example.com | 00000040 16 47 1b 9b 20 f8 7b |.G.. .{| +peer1.org2.example.com | [2059 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [205a 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004789760 gate 1602702110573898600 evaluation succeeds +peer1.org2.example.com | [205b 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [205c 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [205d 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [205e 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [205f 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2060 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2061 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2062 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2063 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2064 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2065 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2066 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2067 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2068 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2069 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206a 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206b 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206c 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206d 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [206e 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [206f 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2070 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2071 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2072 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2073 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2074 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2075 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2076 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2077 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2078 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2079 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [207a 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [207b 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [207c 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [207d 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [207e 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [207f 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2080 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2081 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2082 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2083 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2084 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2085 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2086 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2087 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2088 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2089 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [208a 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [208b 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [208c 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [208d 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [208e 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 gate 1602702110612476800 evaluation starts +peer1.org2.example.com | [208f 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2090 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2091 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2092 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 principal evaluation fails +peer1.org2.example.com | [2093 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047afce0 gate 1602702110612476800 evaluation fails +peer1.org2.example.com | [2094 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2095 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2096 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2097 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 gate 1602702110612985500 evaluation starts +peer1.org2.example.com | [2098 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2099 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [209a 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 principal matched by identity 0 +peer1.org2.example.com | [209b 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer1.org2.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org2.example.com | [209c 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer1.org2.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer1.org2.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer1.org2.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer1.org2.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer1.org2.example.com | [209d 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [209e 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047da250 gate 1602702110612985500 evaluation succeeds +peer1.org2.example.com | [209f 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20a0 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20a1 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [20a2 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [20a3 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [20a4 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [20a5 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [20a6 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [20a7 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [20a8 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20a9 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20aa 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20ab 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [20ac 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ad 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ae 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20af 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [20b0 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1e16 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +peer0.org1.example.com | 00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +peer0.org1.example.com | 00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +peer0.org1.example.com | 00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +peer0.org1.example.com | 00000040 20 54 85 f2 2e 2d 0e | T...-.| +peer0.org1.example.com | [1e17 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e18 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 gate 1602702102633046400 evaluation succeeds +peer0.org1.example.com | [1e19 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e1a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e1b 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e1c 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e1d 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e1e 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e1f 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1e20 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer0.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer0.org1.example.com | [1e22 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer0.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer0.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer0.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer0.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer0.org1.example.com | [1e21 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e23 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e24 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e25 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1e26 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer0.org1.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer0.org1.example.com | [1e27 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer0.org1.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e29 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e2a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e2b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e2c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e2d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e2e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e2f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e30 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e31 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e32 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e33 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1e34 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +peer0.org1.example.com | 00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +peer0.org1.example.com | [1e35 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +peer0.org1.example.com | 00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e37 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e38 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e39 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1e3a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +peer0.org1.example.com | 00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +peer0.org1.example.com | [1e3b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +peer0.org1.example.com | 00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +peer0.org1.example.com | 00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +peer0.org1.example.com | 00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +peer0.org1.example.com | 00000040 d5 17 30 4b 07 19 61 |..0K..a| +peer0.org1.example.com | [1e3c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e3d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e3e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1e3f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e40 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e41 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e42 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e43 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e44 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e45 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e46 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 gate 1602702102646286000 evaluation starts +peer0.org1.example.com | [1e47 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e48 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1e49 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 principal matched by identity 0 +peer0.org1.example.com | [1e4a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +peer0.org1.example.com | 00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +peer0.org1.example.com | [1e4b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +peer0.org1.example.com | 00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +peer0.org1.example.com | 00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +peer0.org1.example.com | 00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +peer0.org1.example.com | 00000040 67 37 65 1c 99 ab e7 |g7e....| +peer0.org1.example.com | [1e4c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e4d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 gate 1602702102646286000 evaluation succeeds +peer0.org1.example.com | [1e4e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e4f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e50 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e51 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e52 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e53 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e54 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e55 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e56 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e57 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e58 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e59 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e5a 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e5b 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e5c 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 b9 a9 af ce 4a d2 55 5e 3d 59 0f 69 62 e7 41 |B....J.U^=Y.ib.A| +peer0.org1.example.com | 00000010 d6 76 6a 0d 71 58 ab c2 88 bb 47 32 c5 8b 59 0f |.vj.qX....G2..Y.| +peer0.org1.example.com | [1e5d 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a3 f2 6e 80 5b 56 cd 16 db 7a 7a |0D. ~..n.[V...zz| +peer0.org1.example.com | 00000010 b9 28 7e db 2f 7f ad f6 b4 5c 38 62 80 b4 97 b1 |.(~./....\8b....| +peer0.org1.example.com | 00000020 56 84 23 74 02 20 60 42 bf d2 9e 6f 73 7f 66 10 |V.#t. `B...os.f.| +peer0.org1.example.com | 00000030 88 ca 24 5c 69 db 99 17 5f a8 07 f9 21 25 3d cd |..$\i..._...!%=.| +peer0.org1.example.com | 00000040 7b 59 16 ac e1 9e |{Y....| +peer0.org1.example.com | [1e5e 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e5f 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e60 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e61 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [1e62 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [1e63 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d5b 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer1.org1.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer1.org1.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer1.org1.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer1.org1.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer1.org1.example.com | [1d5c 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d5d 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b29a30 gate 1602702106492604300 evaluation succeeds +peer1.org1.example.com | [1d5e 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d5f 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d60 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d61 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org2.example.com | [1f4a 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [20b1 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b2 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b3 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b4 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b5 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b6 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b7 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [20b8 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20b9 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ba 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20bb 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [20bc 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [20bd 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20be 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [20bf 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c0 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c1 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c2 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c3 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [20c4 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20c5 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20c6 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20c7 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e64 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e65 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e66 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e67 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1e68 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e69 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e6a 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e6b 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e6c 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e6d 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e6e 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e6f 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 gate 1602702105175146000 evaluation starts +peer0.org1.example.com | [1e70 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e71 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1e72 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 principal matched by identity 0 +peer0.org1.example.com | [1e73 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d c0 d5 37 60 6c ee f2 75 b0 fa 74 d3 90 16 4b |M..7`l..u..t...K| +peer1.org1.example.com | [1d62 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d63 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d64 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d65 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer1.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer1.org1.example.com | [1d66 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer1.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer1.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer1.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer1.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer1.org1.example.com | [1d67 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d68 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d69 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d6a 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d6b 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d6d 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d6e 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer1.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer1.org1.example.com | [1d6f 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer1.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer1.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer1.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer1.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer1.org1.example.com | [1d6c 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d70 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d71 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d72 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d73 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1d74 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d75 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d76 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d77 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d78 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d79 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f4b 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | [1f4c 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f4d 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4e 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4f 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1f50 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f51 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f52 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f53 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f54 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f55 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f56 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f57 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f58 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f59 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5a 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5b 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f5c 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f5d 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f5e 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1f5f 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f60 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f61 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 87 54 8a dc 1d 70 72 6e 65 c8 3f ce bb d7 22 |..T...prne.?..."| +peer0.org2.example.com | 00000010 bf 46 a3 74 cc f4 68 a6 e9 7d b5 c2 af 74 05 7e |.F.t..h..}...t.~| +peer0.org2.example.com | [1f62 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 33 71 51 c3 78 93 17 e3 14 89 |0E.!..3qQ.x.....| +peer0.org2.example.com | 00000010 3a 90 4d aa ec 1e 7a 31 03 04 3b 4d 1a 7a 97 66 |:.M...z1..;M.z.f| +peer0.org2.example.com | 00000020 e3 47 90 8a a5 02 20 01 8d 7d 14 8e e8 b1 95 bc |.G.... ..}......| +peer0.org2.example.com | 00000030 c2 fa ec 87 cd 19 79 c1 5c 5a ec 0a 95 40 57 c5 |......y.\Z...@W.| +peer0.org2.example.com | 00000040 64 6a 99 7d f9 8e ce |dj.}...| +peer0.org2.example.com | [1f63 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f64 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f65 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f66 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1f67 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [1f68 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1f69 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1f6a 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [1f6b 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f6c 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6d 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6e 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6f 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f70 10-14 19:01:54.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1f71 10-14 19:01:54.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f72 10-14 19:01:54.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1f73 10-14 19:01:54.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f74 10-14 19:01:54.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [20c8 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20c9 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20ca 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [20cb 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20cc 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20cd 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 gate 1602702110915435100 evaluation starts +peer1.org2.example.com | [20ce 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20cf 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [20d0 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [20d1 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 principal evaluation fails +peer1.org2.example.com | [20d2 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806750 gate 1602702110915435100 evaluation fails +peer1.org2.example.com | [20d3 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20d4 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20d5 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [20d6 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 gate 1602702110915877500 evaluation starts +peer1.org2.example.com | [20d7 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20d8 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [20d9 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 principal matched by identity 0 +peer1.org2.example.com | [20da 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [20db 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [20dc 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [20dd 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004806cc0 gate 1602702110915877500 evaluation succeeds +peer1.org2.example.com | [20de 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20df 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20e0 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [20e1 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [20e2 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20e3 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20e4 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [20e5 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20e6 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [20e7 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20e8 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [20e9 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20ea 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f75 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f77 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f78 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f79 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f76 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f7a 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f7b 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f7c 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f7d 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f7e 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f7f 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f80 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f81 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f82 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f83 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f84 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f85 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1f86 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161022 +peer0.org2.example.com | [1f87 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 23458FA6748EEB3AA463E746321FB2E0E1D81F12839BCC88B2DE6E369196B08B +peer0.org2.example.com | [1f88 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1f89 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1f8a 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1f8b 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f8c 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f8d 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f8e 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 51 3e 53 ef 2f 15 02 47 63 50 16 ae bb fd 74 e5 |Q>S./..GcP....t.| +peer0.org1.example.com | [1e74 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af de c6 3a 6f 91 e8 6e 9a da bc |0E.!....:o..n...| +peer0.org1.example.com | 00000010 24 e0 3a 99 0a e6 1a 58 26 6f 9f 32 ef 9f 76 fa |$.:....X&o.2..v.| +peer0.org1.example.com | 00000020 3b 59 b4 66 6a 02 20 28 68 d3 6a fa 40 64 37 cf |;Y.fj. (h.j.@d7.| +peer0.org1.example.com | 00000030 a0 47 3f 34 03 a8 09 36 aa 20 85 b3 54 e1 40 07 |.G?4...6. ..T.@.| +peer0.org1.example.com | 00000040 28 11 45 2e 29 c9 0a |(.E.)..| +peer0.org1.example.com | [1e75 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e76 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 gate 1602702105175146000 evaluation succeeds +peer0.org1.example.com | [1e77 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e78 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e79 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e7a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e7b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e7c 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1e7d 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e7e 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e7f 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e80 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e81 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e82 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e83 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e84 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e85 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e86 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e87 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e88 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e89 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8c 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8d 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8e 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e8f 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e90 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e91 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e92 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e93 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e94 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e95 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e96 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f8f 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f90 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f91 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f92 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f93 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f94 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f95 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f96 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f97 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f98 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1f99 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f9a 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f9b 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f9c 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f9d 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f9e 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f9f 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1fa0 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 gate 1602702114166061000 evaluation starts +peer0.org2.example.com | [1fa1 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fa2 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1fa3 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 principal matched by identity 0 +peer0.org2.example.com | [1fa4 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer0.org2.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org1.example.com | [1d7a 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d7b 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 gate 1602702106499790200 evaluation starts +peer1.org1.example.com | [1d7c 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d7d 10-14 19:01:46.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1d7e 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 principal matched by identity 0 +peer1.org1.example.com | [1d7f 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org1.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer1.org1.example.com | [1d80 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer1.org1.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer1.org1.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer1.org1.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer1.org1.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer1.org1.example.com | [1d81 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d82 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca82c0 gate 1602702106499790200 evaluation succeeds +peer1.org1.example.com | [1d83 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d84 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d85 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d86 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d87 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d88 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d89 10-14 19:01:46.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8a 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d8b 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d8c 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d8d 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1d8e 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8f 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d90 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d91 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d92 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d93 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1d94 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer1.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer1.org1.example.com | [1d95 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer1.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer1.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer1.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer1.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer1.org1.example.com | [1d96 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1d97 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 b4 a8 9e ad fe e9 65 73 a4 2b |0E.!........es.+| +peer1.org1.example.com | 00000010 4c 75 81 a6 d4 bf 9d 23 2f 78 91 b4 94 45 9c 45 |Lu.....#/x...E.E| +peer1.org1.example.com | 00000020 30 0c f0 32 56 02 20 3d 6b 6f 7a c4 5e 65 23 e7 |0..2V. =koz.^e#.| +peer1.org1.example.com | 00000030 4c fd 33 fe f4 de d1 89 17 2a 53 a1 d1 fa fd d0 |L.3......*S.....| +peer1.org1.example.com | 00000040 72 cc 60 de 25 a3 9f |r.`.%..| +peer1.org1.example.com | [1d98 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1d99 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1d9a 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1d9b 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d9c 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1d9d 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9e 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9f 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da0 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1da1 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1da2 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1da3 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1da4 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da5 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da6 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1da7 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da8 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1da9 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1daa 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dab 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dac 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dad 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dae 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1daf 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1db0 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1db1 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1db2 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1db3 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [1db4 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1db5 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100A1801 +peer1.org1.example.com | [1db6 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5F1F79CD430ED37070CAC7E50C4F7CC821D572A66E77950C4ED778792327D2D6 +peer1.org1.example.com | [1db7 10-14 19:01:48.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1db8 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20eb 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 gate 1602702110918122200 evaluation starts +peer1.org2.example.com | [20ec 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20ed 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [20ee 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [20ef 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 principal evaluation fails +peer1.org2.example.com | [20f0 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807ec0 gate 1602702110918122200 evaluation fails +peer1.org2.example.com | [20f1 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20f2 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20f3 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [20f4 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 gate 1602702110919151600 evaluation starts +peer1.org2.example.com | [20f5 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20f6 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [20f7 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 principal matched by identity 0 +peer1.org2.example.com | [20f8 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [20f9 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [20fa 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [20fb 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004822430 gate 1602702110919151600 evaluation succeeds +peer1.org2.example.com | [20fc 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20fd 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20fe 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [20ff 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2100 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [2101 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [2102 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [2103 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [2104 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2105 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2106 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2107 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2108 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2109 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [210a 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [210b 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [210c 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [210d 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [210e 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 gate 1602702110925949900 evaluation starts +peer1.org2.example.com | [210f 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2110 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2111 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2112 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 principal evaluation fails +peer1.org2.example.com | [2113 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048405b0 gate 1602702110925949900 evaluation fails +peer1.org2.example.com | [2114 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2115 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2116 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2117 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 gate 1602702110926956900 evaluation starts +peer1.org2.example.com | [2118 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2119 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [211a 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 principal matched by identity 0 +peer1.org2.example.com | [211b 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [211c 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [211d 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [211e 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004840b20 gate 1602702110926956900 evaluation succeeds +peer1.org2.example.com | [211f 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2120 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2121 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e97 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e98 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e99 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e9a 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e9b 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e9c 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e9d 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e9e 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1e9f 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea0 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ea1 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ea2 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ea3 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ea4 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ea5 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ea6 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 gate 1602702105268540200 evaluation starts +peer0.org1.example.com | [1ea7 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ea8 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1ea9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 principal matched by identity 0 +peer0.org1.example.com | [1eaa 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 fd 42 65 78 02 08 25 0b 6a 9a d0 49 e3 d0 9c |'.Bex..%.j..I...| +peer0.org1.example.com | 00000010 94 a0 9b 84 5e 07 1e b1 bb 8e 63 28 d9 1b b9 62 |....^.....c(...b| +peer0.org1.example.com | [1eab 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 6b dd 52 2c 78 e7 17 1d 7f 8e |0E.!..k.R,x.....| +peer0.org1.example.com | 00000010 96 d7 dc 2d 41 84 ca 93 dc ea de 22 52 27 6e f6 |...-A......"R'n.| +peer0.org1.example.com | 00000020 e1 49 46 6e c6 02 20 20 6a 61 6e 7e 3b 9d 4c ba |.IFn.. jan~;.L.| +peer0.org1.example.com | 00000030 9b c8 ad 5b 3a 7f d5 8d 47 a3 d6 54 e5 42 b2 d3 |...[:...G..T.B..| +peer0.org1.example.com | 00000040 d4 d0 f7 98 1d 2b ba |.....+.| +peer0.org1.example.com | [1eac 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ead 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 gate 1602702105268540200 evaluation succeeds +peer0.org1.example.com | [1eae 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1eaf 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eb0 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eb1 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1eb2 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1eb3 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1eb4 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eb5 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1eb6 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1eb7 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1eb8 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1eb9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eba 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ebb 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ebc 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ebd 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ebe 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ebf 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ec0 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec1 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ec2 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec3 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec4 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec5 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec6 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec7 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec8 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec9 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1eca 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ecb 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ecc 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1ecd 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ece 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ecf 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ed0 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ed1 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ed2 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ed3 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ed4 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1ed5 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a cc f9 94 84 77 83 f5 1e 8d 48 77 ec a3 ad af |*....w....Hw....| +peer0.org1.example.com | 00000010 3d f4 b3 71 d8 80 ba 17 3b 0d ad 74 85 02 16 a2 |=..q....;..t....| +peer1.org1.example.com | [1db9 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dba 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dbb 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dbc 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1dbd 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dbe 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dbf 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dc0 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc1 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc2 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc6 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc7 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc8 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc9 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1dca 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dcb 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dcc 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dcd 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dce 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dcf 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd0 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd1 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd2 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd3 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd4 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1dd5 10-14 19:01:50.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dd6 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dd7 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dd8 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dd9 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dda 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1ddb 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fa5 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer0.org2.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer0.org2.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer0.org2.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer0.org2.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer0.org2.example.com | [1fa6 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1fa7 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6c830 gate 1602702114166061000 evaluation succeeds +peer0.org2.example.com | [1fa8 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fa9 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1faa 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1fab 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1fac 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fad 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fae 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1faf 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb0 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer0.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer0.org2.example.com | [1fb1 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer0.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer0.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer0.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer0.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer0.org2.example.com | [1fb2 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fb3 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fb4 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb5 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1fb6 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer0.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer0.org2.example.com | [1fb7 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer0.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer0.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer0.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org2.example.com | [1fb8 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fb9 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fba 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fbb 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fbc 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fbd 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fbe 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1fbf 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer0.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer0.org2.example.com | [1fc0 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer0.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer0.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer0.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer0.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer0.org2.example.com | [1fc1 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1fc2 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 45 c5 2c 8b 97 1c 14 e2 bf 17 |0E.!..E.,.......| +peer0.org2.example.com | 00000010 01 d9 a9 e3 95 aa f6 80 63 d5 23 5d 61 f0 bd e0 |........c.#]a...| +peer0.org2.example.com | 00000020 d1 1e 3d c5 d3 02 20 48 b9 99 c5 d0 67 3a ed 8f |..=... H....g:..| +peer0.org2.example.com | 00000030 bd db 38 3d 2f e1 ce e6 69 8b 79 b4 eb 86 39 38 |..8=/...i.y...98| +peer0.org2.example.com | 00000040 c5 a2 5e ed 98 67 f9 |..^..g.| +peer1.org2.example.com | [2122 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2123 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2124 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2125 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2126 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ddc 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ddd 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dde 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ddf 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1de0 10-14 19:01:50.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1de1 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1de2 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 gate 1602702110130239600 evaluation starts +peer1.org1.example.com | [1de3 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1de4 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1de5 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 principal matched by identity 0 +peer1.org1.example.com | [1de6 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 5f f2 3b fc 57 f6 78 e3 33 5c be 31 ae 40 7b |3_.;.W.x.3\.1.@{| +peer1.org1.example.com | 00000010 35 31 b8 5c 5d 2c 21 ca 9a f0 61 ea 04 27 33 35 |51.\],!...a..'35| +peer1.org1.example.com | [1de7 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0a 4e 6b ac 0c 9f 08 f0 87 66 9c |0D. r.Nk......f.| +peer1.org1.example.com | 00000010 bf 03 eb 4e 08 f0 b4 ac b0 b0 90 35 cf c6 b0 36 |...N.......5...6| +peer1.org1.example.com | 00000020 16 48 af c1 02 20 5e 5d f7 a1 0a a7 26 23 5e 97 |.H... ^]....&#^.| +peer1.org1.example.com | 00000030 46 1e 47 4d 3e 03 9c d8 7e ac 0a 15 ba 87 e5 af |F.GM>...~.......| +peer1.org1.example.com | 00000040 91 9c 8a 8a 82 fc |......| +peer1.org1.example.com | [1de8 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1de9 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c1d9e0 gate 1602702110130239600 evaluation succeeds +peer1.org1.example.com | [1dea 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1deb 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1dec 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ded 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1dee 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1def 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1df0 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1df1 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1df2 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1df3 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df4 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df5 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df6 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1df7 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df8 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1df9 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dfa 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dfb 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dfc 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dfd 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dfe 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dff 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e00 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e01 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1fc3 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1fc4 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1fc5 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fc6 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fc7 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fc8 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fc9 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fca 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1fcb 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fcc 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1fcd 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fce 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fcf 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1fd0 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fd1 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1fd2 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 gate 1602702114177320900 evaluation starts +peer0.org2.example.com | [1fd3 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fd4 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [1fd5 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 principal matched by identity 0 +peer0.org2.example.com | [1fd6 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org2.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org2.example.com | [1fd7 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org2.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org2.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer0.org2.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer0.org2.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer0.org2.example.com | [1fd8 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1fd9 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9e750 gate 1602702114177320900 evaluation succeeds +peer0.org2.example.com | [1fda 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fdb 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fdc 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1fdd 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1fde 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fdf 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fe0 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1fe1 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer0.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org1.example.com | [1e02 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e03 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e04 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e05 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e06 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e07 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e08 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e09 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e0a 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e0b 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e0c 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e0d 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e0e 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e0f 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e10 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e11 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1e12 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e13 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e14 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ed6 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 24 49 15 22 93 d5 f1 59 82 1f 2d |0D. c$I."...Y..-| +peer0.org1.example.com | 00000010 29 13 44 5c 32 47 6d 52 66 be 89 ff 57 08 c0 54 |).D\2GmRf...W..T| +peer0.org1.example.com | 00000020 8f 22 1f 6d 02 20 7a f6 07 13 c9 3b 87 6f ef b5 |.".m. z....;.o..| +peer0.org1.example.com | 00000030 c3 0c 75 29 85 27 26 e3 54 14 a7 bd ba 05 91 26 |..u).'&.T......&| +peer0.org1.example.com | 00000040 ee df 14 f9 95 ca |......| +peer0.org1.example.com | [1ed7 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ed8 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1ed9 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1eda 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1edb 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1edc 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1edd 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ede 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1edf 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ee0 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ee1 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ee2 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1ee3 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ee4 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1ee5 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ee6 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ee7 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ee8 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ee9 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1eea 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1eeb 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eec 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1eed 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eee 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1eef 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ef0 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef1 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1ef2 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef3 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ef4 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161021 +peer0.org1.example.com | [1ef5 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA9C719F67232BAC2CE5B3888CFBD1F326C745938AA11914CC08CE63D6BC4A9C +peer0.org1.example.com | [1ef6 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1fe2 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer0.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer0.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer0.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer0.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer0.org2.example.com | [1fe3 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fe4 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fe5 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fe6 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1fe7 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer0.org2.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer0.org2.example.com | [1fe8 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer0.org2.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer0.org2.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer0.org2.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org2.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org2.example.com | [1fe9 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fea 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1feb 10-14 19:01:54.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fec 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fed 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fee 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1fef 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff0 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ff1 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff2 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff3 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff4 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff5 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ff6 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ff7 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1ff8 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff9 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer0.org2.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer0.org2.example.com | [1ffa 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer0.org2.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer0.org2.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer0.org2.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer0.org2.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer0.org2.example.com | [1ffb 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1ffc 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 08 c7 50 19 36 a3 b5 c8 3b cb |0E.!....P.6...;.| +peer0.org1.example.com | [1ef7 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1ef8 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1ef9 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1efa 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1efb 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1efc 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1efd 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1efe 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1eff 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f00 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1f01 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f02 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f03 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f04 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f05 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f06 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f07 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f08 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f09 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1f0a 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f0b 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f0c 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f0d 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f0e 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f0f 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f10 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f11 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1f12 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1f13 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1f14 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1f15 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f16 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2127 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2128 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2129 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [212a 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [212b 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 gate 1602702110928817300 evaluation starts +peer1.org2.example.com | [212c 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [212d 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [212e 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [212f 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 principal evaluation fails +peer1.org2.example.com | [2130 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004841d20 gate 1602702110928817300 evaluation fails +peer1.org2.example.com | [2131 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2132 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2133 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2134 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 gate 1602702110929434700 evaluation starts +peer1.org2.example.com | [2135 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2136 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2137 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 principal matched by identity 0 +peer1.org2.example.com | [2138 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [2139 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [213a 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [213b 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00485a290 gate 1602702110929434700 evaluation succeeds +peer1.org2.example.com | [213c 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [213d 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [213e 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [213f 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2140 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [2141 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [2142 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [2143 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org2.example.com | 00000010 d8 25 ed 97 b1 1b d9 7c f9 8c 4d 61 77 3d c6 94 |.%.....|..Maw=..| +peer0.org2.example.com | 00000020 67 fd 52 db 34 02 20 14 0c cb 3f ae 61 5d 19 73 |g.R.4. ...?.a].s| +peer0.org2.example.com | 00000030 61 ef fd 5f d9 05 6a f3 1b bb bd d2 9d 47 b7 8c |a.._..j......G..| +peer0.org2.example.com | 00000040 63 f5 5b 5e df d6 49 |c.[^..I| +peer0.org2.example.com | [1ffd 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1ffe 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer0.org2.example.com | [1fff 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [2000 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2001 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2003 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2004 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2005 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2006 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2007 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer0.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer0.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer0.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer0.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2002 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2008 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2009 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [200b 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [200c 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [200d 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [200e 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [200a 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 gate 1602702114303770600 evaluation starts +peer0.org2.example.com | [200f 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2010 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2011 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [2012 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2013 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [2014 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2016 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2015 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [2017 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org2.example.com | [2018 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2019 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 principal matched by identity 0 +peer0.org2.example.com | [201a 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [201b 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e b5 32 af 5e 84 e5 36 ba ad 2c 51 c4 da b0 12 |..2.^..6..,Q....| +peer0.org1.example.com | [1f17 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f18 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f19 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f1a 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f1b 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f1c 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f1d 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 gate 1602702105933919200 evaluation starts +peer0.org1.example.com | [1f1e 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f1f 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f20 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 principal matched by identity 0 +peer0.org1.example.com | [1f21 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1f22 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1f23 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f24 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 gate 1602702105933919200 evaluation succeeds +peer0.org1.example.com | [1f25 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f26 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f27 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f28 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f29 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f2a 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f2b 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f2c 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f2e 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f2f 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f30 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f31 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f32 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 gate 1602702105937970600 evaluation starts +peer0.org1.example.com | [1f33 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f34 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f35 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 principal matched by identity 0 +peer0.org1.example.com | [1f2d 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f36 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1f38 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1f39 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f3a 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 gate 1602702105937970600 evaluation succeeds +peer0.org1.example.com | [1f3b 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f3c 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f3d 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f37 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f3e 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f3f 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f40 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f41 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f42 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1f43 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1f44 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1f45 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [1f46 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f47 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f48 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f49 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f4a 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f4b 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f4c 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e15 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e16 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e17 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e18 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e19 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 gate 1602702110157560600 evaluation starts +peer1.org1.example.com | [1e1a 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e1b 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1e1c 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 principal matched by identity 0 +peer1.org1.example.com | [1e1d 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer1.org1.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org1.example.com | [1e1e 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer1.org1.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer1.org1.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer1.org1.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer1.org1.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer1.org1.example.com | [1e1f 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e20 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a305c0 gate 1602702110157560600 evaluation succeeds +peer1.org1.example.com | [1e21 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e22 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e23 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e24 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e25 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e26 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1e27 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e28 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e29 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e2a 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2b 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2c 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2d 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1e2e 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e2f 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e30 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e31 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e32 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +peer1.org1.example.com | [1e33 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e34 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2144 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2145 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2146 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2147 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2148 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f4d 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f4e 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 gate 1602702105948334200 evaluation starts +peer0.org1.example.com | [1f4f 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f50 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f51 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 principal matched by identity 0 +peer0.org1.example.com | [1f52 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1f53 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1f54 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f55 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 gate 1602702105948334200 evaluation succeeds +peer0.org1.example.com | [1f56 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f57 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f58 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f59 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f5a 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5b 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5c 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5d 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1f5e 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f5f 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f60 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f61 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f62 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f63 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f64 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f65 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f66 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f67 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f68 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f69 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f6a 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 gate 1602702105959501600 evaluation starts +peer0.org1.example.com | [1f6b 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f6c 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f6d 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 principal matched by identity 0 +peer0.org1.example.com | [1f6e 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1f6f 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | [1e35 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e36 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e37 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e38 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1e39 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e3a 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e3b 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e3c 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e3d 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e3e 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e3f 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e40 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 gate 1602702110226234200 evaluation starts +peer1.org1.example.com | [1e41 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e42 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1e43 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 principal matched by identity 0 +peer1.org1.example.com | [1e44 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f7 c2 85 6f 12 61 82 a6 ae e3 60 2d a4 ca a4 |/...o.a....`-...| +peer1.org1.example.com | 00000010 c5 d7 fa e0 72 bb f9 2e 9c 43 00 18 c7 e7 b4 34 |....r....C.....4| +peer1.org1.example.com | [1e45 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 b0 f2 f0 6f 0d c3 f5 ac 77 30 |0E.!.....o....w0| +peer1.org1.example.com | 00000010 1d a9 c3 35 fd b1 76 44 fe be c3 f5 36 4b 95 ff |...5..vD....6K..| +peer1.org1.example.com | 00000020 d4 52 7e f2 38 02 20 72 6e b5 33 6d e5 d1 29 a4 |.R~.8. rn.3m..).| +peer1.org1.example.com | 00000030 61 c4 fc 8e 56 0e af b7 5e 57 03 78 44 ae 38 e9 |a...V...^W.xD.8.| +peer1.org1.example.com | 00000040 0e a3 b9 3a e5 35 57 |...:.5W| +peer1.org1.example.com | [1e46 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e47 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ad1810 gate 1602702110226234200 evaluation succeeds +peer1.org1.example.com | [1e48 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e49 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e4a 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e4b 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e4c 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e4d 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1e4e 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e4f 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 9e a7 95 4d 2a a6 de e1 5e e2 b9 3c d2 20 ee 5a |...M*...^..<. .Z| +peer0.org2.example.com | [201c 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be bc 12 60 e2 0c 7a 31 f7 af 5d |0E.!....`..z1..]| +peer0.org2.example.com | 00000010 82 07 30 67 60 95 9a fc 9f 21 a3 bb eb a0 a0 3e |..0g`....!.....>| +peer0.org2.example.com | 00000020 0f 42 3e 5f b2 02 20 3f 16 3f 15 df a6 99 23 6a |.B>_.. ?.?....#j| +peer0.org2.example.com | 00000030 11 ae 88 0c f8 22 a8 0a 07 db e5 39 6b 65 91 91 |.....".....9ke..| +peer0.org2.example.com | 00000040 22 aa 43 a5 19 a1 bb |".C....| +peer0.org2.example.com | [201d 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [201e 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ab4ee0 gate 1602702114303770600 evaluation succeeds +peer0.org2.example.com | [201f 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2020 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2021 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2022 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2023 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [2024 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org2.example.com | [2025 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2026 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [2027 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org2.example.com | [2028 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [2029 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org2.example.com | [202a 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org2.example.com | [202b 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org2.example.com | [202c 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org2.example.com | [202d 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org2.example.com | [202e 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [202f 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0049158c0 env 0xc004aab220 txn 0 +peer0.org2.example.com | [2030 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004aab220 +peer0.org2.example.com | [2031 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer0.org2.example.com | [2032 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2033 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2034 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2035 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2036 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2037 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [2038 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2039 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [203a 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [203b 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer0.org2.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer0.org2.example.com | [203c 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer0.org2.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer0.org2.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer0.org2.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1f70 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f71 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 gate 1602702105959501600 evaluation succeeds +peer0.org1.example.com | [1f72 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f73 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f74 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f75 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f76 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f77 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f78 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f79 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [1f7a 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [1f7b 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f7c 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f7d 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f7e 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f7f 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f80 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f81 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f82 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f83 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 gate 1602702105968094100 evaluation starts +peer0.org1.example.com | [1f84 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f85 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f86 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 principal matched by identity 0 +peer1.org2.example.com | [2149 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [214a 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [214b 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [214c 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [214d 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [214e 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [214f 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 gate 1602702110933901000 evaluation starts +peer1.org2.example.com | [2150 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2151 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2152 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2153 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 principal evaluation fails +peer1.org2.example.com | [2154 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487c4c0 gate 1602702110933901000 evaluation fails +peer1.org2.example.com | [2155 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2156 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2157 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2158 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 gate 1602702110934849200 evaluation starts +peer1.org2.example.com | [2159 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [215a 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [215b 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 principal matched by identity 0 +peer1.org2.example.com | [215c 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org2.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org2.example.com | [215d 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org2.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org2.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org2.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org2.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org2.example.com | [215e 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [215f 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ca30 gate 1602702110934849200 evaluation succeeds +peer1.org2.example.com | [2160 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2161 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2162 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2163 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2164 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2165 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f87 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [1f88 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [1f89 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f8a 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 gate 1602702105968094100 evaluation succeeds +peer0.org1.example.com | [1f8b 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f8c 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f8d 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f8e 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f8f 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f90 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f91 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f92 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f93 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f94 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f95 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f96 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f97 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 gate 1602702105972442700 evaluation starts +peer0.org1.example.com | [1f98 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f99 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1f9a 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 principal matched by identity 0 +peer0.org1.example.com | [1f9b 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [1f9c 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [1f9d 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f9e 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 gate 1602702105972442700 evaluation succeeds +peer0.org1.example.com | [1f9f 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fa0 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fa1 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fa2 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fa3 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [1fa4 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1e50 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e51 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e52 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e53 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e54 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e55 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e56 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e57 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e58 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e59 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e5a 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e5b 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e5c 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e5d 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e5e 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e5f 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e60 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e61 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1e62 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e63 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e64 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e65 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e66 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e67 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e68 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e69 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6a 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1e6b 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6c 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e6d 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e6e 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1e6f 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1e70 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e71 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e72 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e73 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1e74 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e75 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e76 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e77 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e78 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e79 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa5 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa6 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa7 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa8 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa9 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1faa 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fab 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fac 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fad 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fae 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1faf 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fb0 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fb1 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fb2 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1fb3 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fb4 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb5 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb6 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fb7 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fb8 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1fb9 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fba 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1fbb 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fbc 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fbd 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1fbe 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e7a 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7b 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e7c 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1e7d 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1e7e 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e7f 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e80 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e81 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e82 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e83 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e84 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e85 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e86 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 gate 1602702110255642600 evaluation starts +peer1.org1.example.com | [1e87 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e88 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1e89 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 principal matched by identity 0 +peer1.org1.example.com | [1e8a 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1e8b 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1e8c 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e8d 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029185c0 gate 1602702110255642600 evaluation succeeds +peer1.org1.example.com | [1e8e 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e8f 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e90 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e91 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e92 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e93 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2166 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2167 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2168 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2169 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [216a 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [216b 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [216c 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 gate 1602702110937758800 evaluation starts +peer1.org2.example.com | [216d 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [216e 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [216f 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2170 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 principal evaluation fails +peer1.org2.example.com | [2171 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487dc30 gate 1602702110937758800 evaluation fails +peer1.org2.example.com | [2172 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2173 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2174 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2175 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 gate 1602702110939390000 evaluation starts +peer1.org2.example.com | [2176 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2177 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2178 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 principal matched by identity 0 +peer1.org2.example.com | [2179 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org2.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org2.example.com | [217a 10-14 19:01:50.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org2.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org2.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org2.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org2.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org2.example.com | [217b 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [217c 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048961a0 gate 1602702110939390000 evaluation succeeds +peer1.org2.example.com | [217d 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [217e 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [217f 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2180 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2181 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org2.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org2.example.com | [2182 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org2.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org2.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org2.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org2.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org2.example.com | [2183 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org2.example.com | [2184 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org2.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org2.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org2.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org2.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org2.example.com | [2185 10-14 19:01:50.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2186 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2187 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2188 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2189 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [218a 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [218b 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [218c 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [218d 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [218e 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [218f 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2190 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e94 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e95 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e96 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e97 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e98 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e99 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e9a 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 gate 1602702110259049300 evaluation starts +peer1.org1.example.com | [1e9b 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e9c 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1e9d 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 principal matched by identity 0 +peer1.org1.example.com | [1e9e 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1e9f 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1ea0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ea1 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029197c0 gate 1602702110259049300 evaluation succeeds +peer1.org1.example.com | [1ea2 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ea3 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ea4 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ea5 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ea6 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1ea7 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1ea8 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ea9 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eaa 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eab 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eac 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1ead 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1eae 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1eaf 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1eb0 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb1 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2191 10-14 19:01:50.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2192 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2193 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2194 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2195 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100B1801 +peer1.org2.example.com | [2196 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E987548ADC1D70726E65C83FCEBBD722BF46A374CCF468A6E97DB5C2AF74057E +peer1.org2.example.com | [2197 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2198 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2199 10-14 19:01:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219a 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219b 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219c 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [219d 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219e 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [219f 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [21a0 10-14 19:01:53.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21a1 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a2 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21a3 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21a4 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21a5 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21a6 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a7 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a8 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [21a9 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [21aa 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ab 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ac 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ad 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ae 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [21af 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [21b0 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer1.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org2.example.com | [21b1 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer1.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer1.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer1.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer1.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer1.org2.example.com | [21b2 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [21b3 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 45 c5 2c 8b 97 1c 14 e2 bf 17 |0E.!..E.,.......| +peer1.org2.example.com | 00000010 01 d9 a9 e3 95 aa f6 80 63 d5 23 5d 61 f0 bd e0 |........c.#]a...| +peer1.org2.example.com | 00000020 d1 1e 3d c5 d3 02 20 48 b9 99 c5 d0 67 3a ed 8f |..=... H....g:..| +peer1.org2.example.com | 00000030 bd db 38 3d 2f e1 ce e6 69 8b 79 b4 eb 86 39 38 |..8=/...i.y...98| +peer1.org2.example.com | 00000040 c5 a2 5e ed 98 67 f9 |..^..g.| +peer1.org2.example.com | [21b4 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [21b5 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [21b6 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [21b7 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [21b8 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [21b9 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21ba 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21bb 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21bc 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [21bd 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21be 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21bf 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21c0 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [21c1 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [21c2 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21c3 10-14 19:01:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [21c4 10-14 19:01:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21c5 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [21c6 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21c7 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [21c8 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21c9 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [21ca 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer0.org2.example.com | [203d 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [1fbf 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fc0 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 gate 1602702106199014800 evaluation starts +peer0.org1.example.com | [1fc1 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fc2 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1fc3 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 principal matched by identity 0 +peer0.org1.example.com | [1fc4 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer0.org1.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer0.org1.example.com | [1fc5 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer0.org1.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org1.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer0.org1.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer0.org1.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer0.org1.example.com | [1fc6 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fc7 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 gate 1602702106199014800 evaluation succeeds +peer0.org1.example.com | [1fc8 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fc9 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fca 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fcb 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fcc 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1fcd 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1fce 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1fcf 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1fd0 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1fd1 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd2 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd3 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1fd4 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fd5 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fd6 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fd7 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fd8 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1fd9 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fda 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fdb 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1fdc 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fdd 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fde 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eb2 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1eb3 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1eb4 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1eb5 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1eb6 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1eb7 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1eb8 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 gate 1602702110265938300 evaluation starts +peer1.org1.example.com | [1eba 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ebb 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1eb9 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ebc 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 principal matched by identity 0 +peer1.org1.example.com | [1ebd 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1ebe 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1ebf 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ec0 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028b8620 gate 1602702110265938300 evaluation succeeds +peer1.org1.example.com | [1ec1 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ec2 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ec3 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ec4 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ec5 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ec6 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ec7 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ec8 10-14 19:01:50.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ec9 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21cb 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21cc 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21cd 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ce 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [203e 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004af0a80, header channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer0.org2.example.com | [203f 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2040 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2041 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2042 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2043 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org2.example.com | [2044 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2045 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004b0e000 +peer0.org2.example.com | [2046 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2047 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [92f06c42-946a-4caa-b032-4d2c8f48b9cc] +peer0.org2.example.com | [2048 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [92f06c42-946a-4caa-b032-4d2c8f48b9cc] +peer0.org2.example.com | [2049 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 gate 1602702114341397200 evaluation starts +peer0.org2.example.com | [204a 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [204b 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [204c 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 principal matched by identity 0 +peer0.org2.example.com | [204d 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d d1 7e f9 cd 39 41 91 e7 fe c6 aa ba 0b f2 3a |..~..9A........:| +peer0.org2.example.com | 00000010 08 3a 12 12 e3 9c 57 c2 15 e1 d3 66 0f 7e c9 e5 |.:....W....f.~..| +peer0.org2.example.com | [204e 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 36 5a e6 6d d9 08 99 36 4e 84 |0E.!..6Z.m...6N.| +peer0.org2.example.com | 00000010 c6 2b 58 d9 54 14 05 aa fa 5d 60 52 7f 30 72 e8 |.+X.T....]`R.0r.| +peer0.org2.example.com | 00000020 45 e2 38 c2 7f 02 20 0f f9 a7 2d 5d db 9d bd 9f |E.8... ...-]....| +peer0.org2.example.com | 00000030 54 6d 2b 62 ab e9 bc d9 7d 77 6d 0f d2 66 07 4c |Tm+b....}wm..f.L| +peer0.org2.example.com | 00000040 83 4e 0a 0e d1 2c bd |.N...,.| +peer0.org2.example.com | [204f 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2050 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [2052 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2053 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2054 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2055 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2056 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2057 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2051 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 skipping identity 0 because it has already been used +peer0.org2.example.com | [2058 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 principal evaluation fails +peer0.org2.example.com | [2059 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13cb0 gate 1602702114341397200 evaluation succeeds +peer0.org2.example.com | [205a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org2.example.com | [205b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | [205c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | [205d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org2.example.com | [205e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org2.example.com | [205f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [92266180-1dac-444f-9372-107c04d3ea1e] +peer0.org2.example.com | [2060 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2061 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [92266180-1dac-444f-9372-107c04d3ea1e] +peer0.org2.example.com | [2062 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org2.example.com | [2063 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e8d508eb-9b45-4607-be3e-156c8406c4a4] +peer0.org2.example.com | [2064 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [2065 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e8d508eb-9b45-4607-be3e-156c8406c4a4] +peer0.org2.example.com | [2066 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 gate 1602702114353661000 evaluation starts +peer0.org2.example.com | [2067 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2068 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2069 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [206a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [206b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [206c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [206d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [206e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [206f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 principal matched by identity 0 +peer0.org2.example.com | [2070 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer0.org2.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer0.org2.example.com | [2071 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer0.org2.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer0.org2.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer0.org2.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer0.org2.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer0.org2.example.com | [2072 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2073 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [2074 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 skipping identity 0 because it has already been used +peer0.org2.example.com | [2075 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 principal evaluation fails +peer0.org2.example.com | [2076 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b3ac00 gate 1602702114353661000 evaluation succeeds +peer0.org2.example.com | [2077 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org2.example.com | [2078 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 appears to be valid +peer0.org2.example.com | [2079 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004b0e000 +peer0.org2.example.com | [207a 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [207b 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 34ms +peer0.org2.example.com | [207c 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [207d 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [207e 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org2.example.com | [207f 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [2080 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [2081 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [2082 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org2.example.com | [2083 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [2084 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [2085 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2086 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org2.example.com | [2087 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] marked as valid by state validator +peer0.org2.example.com | [2088 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004abe5c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004abe600), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004abe640)} +peer0.org2.example.com | [2089 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [208a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [208b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [208c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc004b06f50)}} +peer0.org2.example.com | [208d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org2.example.com | [208e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [208f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [2090 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org2.example.com | [2091 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org2.example.com | [2092 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org2.example.com | [2093 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org2.example.com | [2094 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2095 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2096 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eca 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ecb 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ecc 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ecd 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 gate 1602702110280765300 evaluation starts +peer1.org1.example.com | [1ece 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ecf 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1ed0 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 principal matched by identity 0 +peer1.org1.example.com | [1ed1 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1ed2 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1ed3 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ed4 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028cd890 gate 1602702110280765300 evaluation succeeds +peer1.org1.example.com | [1ed5 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ed6 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ed7 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ed8 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ed9 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eda 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1edb 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [1edc 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [1edd 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [1ede 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [1edf 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ee0 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ee1 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ee2 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ee3 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ee4 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ee5 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1fdf 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe0 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe1 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe2 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe3 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe4 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe5 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1fe6 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fe7 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fe8 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe9 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fea 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1feb 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fec 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fed 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fee 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fef 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1ff0 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ff1 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ff2 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ff3 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ff4 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ff5 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ff6 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ff7 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 gate 1602702106315074600 evaluation starts +peer0.org1.example.com | [1ff8 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ff9 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [1ffa 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 principal matched by identity 0 +peer0.org1.example.com | [1ffb 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer1.org1.example.com | [1ee6 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ee7 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 gate 1602702110286911400 evaluation starts +peer1.org1.example.com | [1ee8 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ee9 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1eea 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 principal matched by identity 0 +peer1.org1.example.com | [1eeb 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [1eec 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [1eed 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1eee 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288c790 gate 1602702110286911400 evaluation succeeds +peer1.org1.example.com | [1eef 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ef0 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ef1 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ef2 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ef3 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef4 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ef5 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ef6 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ef7 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ef8 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ef9 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1efa 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1efb 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 gate 1602702110291180000 evaluation starts +peer1.org1.example.com | [1efc 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1efd 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1efe 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 principal matched by identity 0 +peer1.org1.example.com | [1eff 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1f00 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [1f01 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f02 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00288d990 gate 1602702110291180000 evaluation succeeds +peer1.org1.example.com | [1f03 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f04 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f05 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f06 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f07 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f08 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f09 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f0a 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f0b 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1f0c 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f0d 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f0e 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f0f 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f10 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f11 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f12 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f13 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 gate 1602702110300233100 evaluation starts +peer1.org1.example.com | [1f14 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f15 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1f16 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 principal matched by identity 0 +peer1.org1.example.com | [1f17 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer1.org1.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer1.org1.example.com | [1f18 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer1.org1.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer1.org1.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer1.org1.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org2.example.com | [2097 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2098 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2099 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [209a 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [209b 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [209c 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [209d 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 gate 1602702114394765200 evaluation starts +peer0.org2.example.com | [209e 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [209f 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [20a0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 principal matched by identity 0 +peer0.org2.example.com | [20a1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [20a2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [20a3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20a4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b65bf0 gate 1602702114394765200 evaluation succeeds +peer0.org2.example.com | [20a5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20a6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20a7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20a8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20a9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20aa 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ab 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20ac 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20ad 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [20ae 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [20af 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20b0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 gate 1602702114397581600 evaluation starts +peer0.org2.example.com | [20b1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20b2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [20b3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 principal matched by identity 0 +peer0.org2.example.com | [20b4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [20b5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [20b6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20b7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b987e0 gate 1602702114397581600 evaluation succeeds +peer0.org2.example.com | [20b8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21cf 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d0 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d1 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d2 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d3 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21d4 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d6 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d7 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21d8 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d9 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [21d5 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21db 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21dc 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [21dd 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [21de 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [21da 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [21e0 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21e1 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [21e2 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21e3 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21df 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21e4 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21e5 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21e6 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer1.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer1.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer1.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer1.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org1.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer0.org1.example.com | [1ffc 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer0.org1.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer0.org1.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer0.org1.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org1.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer0.org1.example.com | [1ffd 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ffe 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 gate 1602702106315074600 evaluation succeeds +peer0.org1.example.com | [1fff 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2000 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2001 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2002 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2003 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2004 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2005 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2006 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2007 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2008 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2009 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [200a 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [200b 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [200c 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [200d 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [200e 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [200f 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2010 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2012 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2011 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +peer0.org1.example.com | [2013 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2014 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2015 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2016 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2017 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2018 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [21e7 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 gate 1602702114269978200 evaluation starts +peer1.org2.example.com | [21e8 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21e9 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [21ea 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [21eb 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [21ec 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [21ed 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161022 +peer1.org2.example.com | [21ee 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F424655E94E5EAECAC31C7C00F78043F3420145C9E09046820D4F25E4908ABA6 +peer1.org2.example.com | [21f0 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [21f1 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [21f2 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [21ef 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [21f3 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f4 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21f5 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f6 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21f8 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21f9 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [21fa 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21f7 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 principal matched by identity 0 +peer1.org2.example.com | [21fc 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e b5 32 af 5e 84 e5 36 ba ad 2c 51 c4 da b0 12 |..2.^..6..,Q....| +peer1.org2.example.com | 00000010 9e a7 95 4d 2a a6 de e1 5e e2 b9 3c d2 20 ee 5a |...M*...^..<. .Z| +peer1.org2.example.com | [21fd 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be bc 12 60 e2 0c 7a 31 f7 af 5d |0E.!....`..z1..]| +peer1.org2.example.com | 00000010 82 07 30 67 60 95 9a fc 9f 21 a3 bb eb a0 a0 3e |..0g`....!.....>| +peer1.org2.example.com | 00000020 0f 42 3e 5f b2 02 20 3f 16 3f 15 df a6 99 23 6a |.B>_.. ?.?....#j| +peer1.org2.example.com | 00000030 11 ae 88 0c f8 22 a8 0a 07 db e5 39 6b 65 91 91 |.....".....9ke..| +peer1.org2.example.com | 00000040 22 aa 43 a5 19 a1 bb |".C....| +peer1.org2.example.com | [21fe 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [21ff 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2200 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2201 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad850 gate 1602702114269978200 evaluation succeeds +peer1.org2.example.com | [2202 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2203 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2204 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [21fb 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [20b9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20ba 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20bb 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20bc 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20bd 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 71 157 15 31 136 240 57 197 190 60 64 239 202 78 121 40 59 201 202 221 95 204 19 253 192 210 53 201 56 154 182 121 2 32 102 60 184 65 49 177 140 156 89 51 208 217 77 250 55 103 173 25 124 7 143 232 127 94 39 122 37 26 235 66 167 167]} 0x151b080}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002739b60 0xc00276e7e0 {{0 0} 0 0 0 0} {false}})]} +peer0.org2.example.com | [20be 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org2.example.com | [20bf 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0001dee60})} +peer0.org2.example.com | [20c0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org2.example.com | [20c1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org2.example.com | [20c2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org2.example.com | [20c3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20c4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20c5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [20c6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20c7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20c8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [20c9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20ca 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20cd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ce 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20cf 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [20d3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2205 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2207 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [2208 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [2209 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [220a 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer1.org2.example.com | [220b 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [220c 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org2.example.com | [220d 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org2.example.com | [220f 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2210 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2206 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2211 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [220e 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2212 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2214 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2213 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org2.example.com | [2215 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2216 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org2.example.com | [2217 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org2.example.com | [2219 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [221a 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer1.org2.example.com | [221b 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [221c 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004665700 env 0xc004745810 txn 0 +peer1.org2.example.com | [221d 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004745810 +peer1.org2.example.com | [221e 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [221f 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2220 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer1.org2.example.com | [2221 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2223 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2224 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2226 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2218 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2225 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2227 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2228 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2229 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer1.org2.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer1.org2.example.com | [222a 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer1.org2.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer1.org2.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer1.org2.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer1.org2.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer1.org2.example.com | [222b 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [222c 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [2222 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [222d 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [222e 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [222f 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2230 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [2232 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2231 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2233 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer1.org2.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer1.org2.example.com | [2234 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer1.org2.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer1.org2.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer1.org2.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer1.org2.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer1.org2.example.com | [2235 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2236 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004891500, header channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer1.org2.example.com | [2237 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [2238 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [2239 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [223a 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [223b 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer1.org2.example.com | [223c 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [223d 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc000339000 +peer1.org2.example.com | [223e 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [223f 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7d916d58-4dbb-4d1b-a1b3-537a17fc4b0f] +peer1.org2.example.com | [2240 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7d916d58-4dbb-4d1b-a1b3-537a17fc4b0f] +peer1.org2.example.com | [2241 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 gate 1602702114345292100 evaluation starts +peer1.org2.example.com | [2242 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2243 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2244 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 principal matched by identity 0 +peer1.org2.example.com | [2245 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d d1 7e f9 cd 39 41 91 e7 fe c6 aa ba 0b f2 3a |..~..9A........:| +peer1.org2.example.com | 00000010 08 3a 12 12 e3 9c 57 c2 15 e1 d3 66 0f 7e c9 e5 |.:....W....f.~..| +peer1.org2.example.com | [2246 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 36 5a e6 6d d9 08 99 36 4e 84 |0E.!..6Z.m...6N.| +peer1.org2.example.com | 00000010 c6 2b 58 d9 54 14 05 aa fa 5d 60 52 7f 30 72 e8 |.+X.T....]`R.0r.| +peer1.org2.example.com | 00000020 45 e2 38 c2 7f 02 20 0f f9 a7 2d 5d db 9d bd 9f |E.8... ...-]....| +peer1.org2.example.com | 00000030 54 6d 2b 62 ab e9 bc d9 7d 77 6d 0f d2 66 07 4c |Tm+b....}wm..f.L| +peer1.org2.example.com | 00000040 83 4e 0a 0e d1 2c bd |.N...,.| +peer1.org2.example.com | [2247 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2248 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [2249 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 skipping identity 0 because it has already been used +peer1.org2.example.com | [224a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 principal evaluation fails +peer1.org2.example.com | [224b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994030 gate 1602702114345292100 evaluation succeeds +peer1.org2.example.com | [224c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org2.example.com | [224d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [224e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [224f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org2.example.com | [2250 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org2.example.com | [2251 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e7d4dbe1-bd79-4f1b-8f41-f656f072b18d] +peer1.org2.example.com | [2252 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2253 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e7d4dbe1-bd79-4f1b-8f41-f656f072b18d] +peer1.org2.example.com | [2254 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org2.example.com | [2255 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [72974c2d-d81e-43f1-80dc-720f9951bfe5] +peer1.org2.example.com | [2256 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [2257 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [72974c2d-d81e-43f1-80dc-720f9951bfe5] +peer1.org2.example.com | [2258 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 gate 1602702114351687800 evaluation starts +peer1.org2.example.com | [2259 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [225a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [225b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [225c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [225d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [225e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [225f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [2260 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [2261 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 principal matched by identity 0 +peer1.org2.example.com | [2262 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer1.org2.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer1.org2.example.com | [2263 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer1.org2.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer1.org2.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer1.org2.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer1.org2.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer1.org2.example.com | [2264 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2265 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [2266 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 skipping identity 0 because it has already been used +peer1.org2.example.com | [2267 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 principal evaluation fails +peer1.org2.example.com | [2268 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004994f80 gate 1602702114351687800 evaluation succeeds +peer1.org2.example.com | [2269 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org2.example.com | [226a 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 appears to be valid +peer1.org2.example.com | [226b 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc000339000 +peer1.org2.example.com | [226c 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004665700 env 0xc004745810 txn 0 +peer1.org2.example.com | [226d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [226e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [226f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer1.org1.example.com | [1f19 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f1a 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fa690 gate 1602702110300233100 evaluation succeeds +peer1.org1.example.com | [1f1b 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f1c 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f1d 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f1e 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f1f 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f20 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2019 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [201a 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [201b 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [201c 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [201d 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [201e 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [201f 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org1.example.com | [2020 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org1.example.com | [2021 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2022 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 0d 48 d5 cb 7e 52 c3 93 f1 13 |0E.!...H..~R....| +peer0.org1.example.com | 00000010 c5 45 63 9c a9 19 1a be 0d 1f 17 75 65 6f ab 3d |.Ec........ueo.=| +peer0.org1.example.com | 00000020 8e b2 10 da af 02 20 4d 0f 09 d7 94 f0 e9 f0 f3 |...... M........| +peer0.org1.example.com | 00000030 de 79 6e 93 f0 81 9f 0d 43 03 7b ff d8 f6 dd cd |.yn.....C.{.....| +peer0.org1.example.com | 00000040 d4 ee cc 4f 37 50 37 |...O7P7| +peer0.org1.example.com | [2023 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2024 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2025 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2026 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2027 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2028 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2029 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [202a 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [202b 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [202c 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [202d 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [202e 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [202f 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2030 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20d4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [20d5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org2.example.com | [20d7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [20d8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20d9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20da 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [20db 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [20dc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20dd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 gate 1602702114408600100 evaluation starts +peer0.org2.example.com | [20de 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20df 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [20e0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 principal matched by identity 0 +peer0.org2.example.com | [20e1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [20e2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [20e3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20e4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bbd0f0 gate 1602702114408600100 evaluation succeeds +peer0.org2.example.com | [20e5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20e6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20e7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20e8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20e9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ea 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20eb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [20ec 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20ed 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0049158c0 env 0xc004aab220 txn 0 +peer0.org2.example.com | [20ee 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +peer0.org2.example.com | txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +peer0.org2.example.com | ] +peer0.org2.example.com | [20ef 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to txid-index +peer0.org2.example.com | [20f0 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to blockNumTranNum index +peer0.org2.example.com | [20f1 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org2.example.com | [20f2 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org2.example.com | [20f3 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org2.example.com | [20f4 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org2.example.com | [20f5 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [20f6 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [20f7 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [20f8 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [20f9 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [20fa 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [20fb 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org2.example.com | [20fc 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [20fd 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org2.example.com | [20fe 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org2.example.com | [20ff 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org2.example.com | [2100 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [2101 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org2.example.com | [2102 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org2.example.com | [2103 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [000c70e6-6cff-4145-8d3a-982361a37756] +peer0.org2.example.com | [2104 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org2.example.com | [2105 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2106 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org2.example.com | [2107 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [000c70e6-6cff-4145-8d3a-982361a37756] +peer0.org2.example.com | [2108 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org2.example.com | [2109 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [210a 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E0CCCDAC8DA1FC9E16...08031A0C0A0565787030321203312E30 +peer0.org2.example.com | [210b 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F6E48148E9B6C2293AAD7314E30A5AFC30FD6DD99681AFD8CB9AFF269477885 +peer0.org2.example.com | [210c 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [210d 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [210e 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [210f 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2110 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2031 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2032 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2033 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2034 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2035 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2036 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2037 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2038 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [203a 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [203b 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [203c 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2039 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [203d 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [203e 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [203f 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2040 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2041 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2042 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2043 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2044 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2045 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2046 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2047 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2048 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2049 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [204a 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161022 +peer0.org1.example.com | [204b 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6C13DB87F533CC2248DC6EA757633380902C4A4A5CDCB7DF38C3CCCC427F0E44 +peer0.org1.example.com | [204c 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [204d 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [204e 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [204f 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2050 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2051 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2052 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2053 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2054 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2055 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2056 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2057 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2058 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2059 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [205a 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [205b 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [205c 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [205d 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [205e 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [205f 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2060 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2061 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2062 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2063 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2064 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2065 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2066 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 gate 1602702106623688200 evaluation starts +peer0.org1.example.com | [2067 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2068 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2069 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 principal matched by identity 0 +peer0.org1.example.com | [206a 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +peer0.org1.example.com | 00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +peer0.org1.example.com | [206b 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +peer0.org1.example.com | 00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +peer0.org1.example.com | 00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +peer0.org1.example.com | 00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +peer0.org1.example.com | 00000040 bf 13 24 fd f6 62 |..$..b| +peer0.org1.example.com | [206c 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [206d 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [206f 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 gate 1602702106623688200 evaluation succeeds +peer0.org1.example.com | [206e 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2070 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2071 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2072 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2073 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2074 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2075 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2076 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2077 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2078 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org1.example.com | [2079 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org1.example.com | [207a 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [207b 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [207c 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [207d 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer0.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer0.org1.example.com | [207e 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer0.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer0.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer0.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer0.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer0.org1.example.com | [207f 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f21 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1f22 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1f23 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1f24 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f25 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f26 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f27 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1f28 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f29 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f2a 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f2b 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f2c 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2d 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f2e 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [1f2f 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f30 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f31 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1f32 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f33 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f34 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f35 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f36 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f37 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f38 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f39 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f3a 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f3b 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1f3c 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f3d 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1f3e 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f3f 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1f40 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f41 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f42 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f43 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f45 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f44 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f46 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f47 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f48 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f49 10-14 19:01:50.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f4a 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f4b 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f4c 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f4d 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f4e 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f4f 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f50 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f51 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f52 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f53 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161027 +peer1.org1.example.com | [1f54 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 024A8D3C07FDD1A32C7B0B1BAD48911C01B13F2F9D50DBB02A1AAE19E7465BAF +peer1.org1.example.com | [1f55 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f56 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1f57 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1f58 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1f59 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f5a 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f5b 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1f5c 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f5d 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1f5e 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2080 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2081 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2082 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2083 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2085 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2084 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2086 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2087 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2088 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2089 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [208a 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [208b 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [208c 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer0.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer0.org1.example.com | [208d 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer0.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer0.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer0.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer0.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer0.org1.example.com | [208e 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [208f 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 b4 a8 9e ad fe e9 65 73 a4 2b |0E.!........es.+| +peer0.org1.example.com | 00000010 4c 75 81 a6 d4 bf 9d 23 2f 78 91 b4 94 45 9c 45 |Lu.....#/x...E.E| +peer0.org1.example.com | 00000020 30 0c f0 32 56 02 20 3d 6b 6f 7a c4 5e 65 23 e7 |0..2V. =koz.^e#.| +peer0.org1.example.com | 00000030 4c fd 33 fe f4 de d1 89 17 2a 53 a1 d1 fa fd d0 |L.3......*S.....| +peer0.org1.example.com | 00000040 72 cc 60 de 25 a3 9f |r.`.%..| +peer0.org1.example.com | [2090 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2091 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2092 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2093 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2094 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2095 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2096 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2097 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2098 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2099 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2270 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2272 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2273 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2274 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2275 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2271 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 68ms +peer1.org2.example.com | [2276 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2277 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 gate 1602702114365600000 evaluation starts +peer1.org2.example.com | [2279 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [227a 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [227b 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2278 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [227c 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [227d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 principal evaluation fails +peer1.org2.example.com | [227e 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ae8e0 gate 1602702114365600000 evaluation fails +peer1.org2.example.com | [227f 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org2.example.com | [2280 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2281 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2282 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2283 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2284 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2285 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 gate 1602702114378849500 evaluation starts +peer1.org2.example.com | [2286 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2287 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2288 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 principal matched by identity 0 +peer1.org2.example.com | [2289 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer1.org2.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer1.org2.example.com | [228a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer1.org2.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer1.org2.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer1.org2.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer1.org2.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer1.org2.example.com | [228b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [228c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c4460 gate 1602702114378849500 evaluation succeeds +peer1.org2.example.com | [228d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [228e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [228f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2290 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2291 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2292 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2293 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2294 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer1.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org2.example.com | [2295 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer1.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer1.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer1.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer1.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer1.org2.example.com | [2296 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2297 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2298 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2299 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [229a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [229b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer1.org2.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer0.org1.example.com | [209a 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [209b 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [209c 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [209d 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [209e 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 gate 1602702106674480600 evaluation starts +peer0.org1.example.com | [209f 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20a0 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [20a1 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 principal matched by identity 0 +peer0.org1.example.com | [20a2 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +peer0.org1.example.com | 00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +peer0.org1.example.com | [20a3 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +peer0.org1.example.com | 00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +peer0.org1.example.com | 00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +peer0.org1.example.com | 00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +peer0.org1.example.com | 00000040 9c af 37 6c d0 d4 |..7l..| +peer0.org1.example.com | [20a4 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20a5 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 gate 1602702106674480600 evaluation succeeds +peer0.org1.example.com | [20a6 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20a7 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20a8 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20a9 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20aa 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20ab 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20ac 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [20ad 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer0.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer0.org1.example.com | [20ae 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer0.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer0.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer0.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer0.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer0.org1.example.com | [20af 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [20b0 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [20b1 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b2 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [20b3 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +peer0.org1.example.com | 00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +peer0.org1.example.com | [20b4 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +peer0.org1.example.com | 00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +peer0.org1.example.com | 00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +peer0.org1.example.com | 00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +peer0.org1.example.com | 00000040 04 ef 12 ab 45 ef |....E.| +peer0.org1.example.com | [20b5 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20b6 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b7 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b8 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20b9 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20ba 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bb 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bc 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bd 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20be 10-14 19:01:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-661820114/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer1.org2.example.com | [229c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer1.org2.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer1.org2.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer1.org2.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer1.org2.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer1.org2.example.com | [229d 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [229e 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [229f 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [22a0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [22a1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org2.example.com | [22a2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [22a3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [22a4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [22a5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org2.example.com | [22a6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] marked as valid by state validator +peer1.org2.example.com | [22a7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004665ac0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004665b00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004665b40)} +peer1.org2.example.com | [22a8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [22a9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [22aa 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [22ab 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0049b0a50)}} +peer1.org2.example.com | [22ac 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org2.example.com | [22ad 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [22ae 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [22af 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org2.example.com | [22b0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org2.example.com | [22b1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [22b2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org2.example.com | [22b3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | /tmp/go-link-661820114/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-661820114/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-661820114/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-661820114/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-661820114/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-661820114/000006.o: In function `_cgo_26061493d47f_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:58: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | [20bf 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [20c0 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 1f 79 cd 43 0e d3 70 70 ca c7 e5 0c 4f 7c c8 |_.y.C..pp....O|.| +peer0.org1.example.com | 00000010 21 d5 72 a6 6e 77 95 0c 4e d7 78 79 23 27 d2 d6 |!.r.nw..N.xy#'..| +peer0.org1.example.com | [20c1 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 91 6a 47 67 26 b5 90 21 55 ad 2a |0D. ..jGg&..!U.*| +peer0.org1.example.com | 00000010 de 8f ce 80 5b 71 92 da 60 46 3f 85 95 e2 51 7e |....[q..`F?...Q~| +peer0.org1.example.com | 00000020 a9 63 2a 12 02 20 15 20 82 54 c1 c5 94 16 5d f8 |.c*.. . .T....].| +peer0.org1.example.com | 00000030 96 3c ce 7d fb c5 ed 0c 90 ef 0b da a4 b7 58 89 |.<.}..........X.| +peer0.org1.example.com | 00000040 67 2c 4e c1 59 bd |g,N.Y.| +peer0.org1.example.com | [20c2 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20c3 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c4 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c5 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [20c6 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [20c7 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [20c8 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [20c9 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [20ca 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20cb 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20cc 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [20cd 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20ce 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20cf 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d0 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d1 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d2 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20d3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20d6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [20d7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | [1f5f 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1f60 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f61 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f62 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f63 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f64 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f65 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f66 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f67 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161028 +peer1.org1.example.com | [1f68 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9D028DD61FAA84B692F4832DEE0AC56CA2F7E9A47DE66045612B411393582F02 +peer1.org1.example.com | [1f69 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f6a 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1f6b 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1f6c 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f6d 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f6e 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f6f 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f70 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f71 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f72 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f73 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f74 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f75 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f76 10-14 19:01:50.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f77 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f78 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f79 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f7a 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1f7b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f7c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f7d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f7e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f7f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f80 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f81 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f82 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 gate 1602702110442777700 evaluation starts +peer1.org1.example.com | [1f83 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f84 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1f85 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 principal matched by identity 0 +peer1.org1.example.com | [1f86 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer1.org1.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org1.example.com | [1f87 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer1.org1.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer1.org1.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer1.org1.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer1.org1.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer1.org1.example.com | [1f88 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f89 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027571f0 gate 1602702110442777700 evaluation succeeds +peer1.org1.example.com | [1f8a 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f8b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f8c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f8d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f8e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f8f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f90 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1f91 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer1.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer1.org1.example.com | [1f92 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer1.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer1.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer1.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer1.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer1.org1.example.com | [1f93 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f94 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f95 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1f96 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer1.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org2.example.com | [2111 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2112 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2113 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2114 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2115 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 gate 1602702114429178400 evaluation starts +peer0.org2.example.com | [2116 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2117 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2118 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 principal matched by identity 0 +peer0.org2.example.com | [2119 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [211a 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [211b 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [211c 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org2.example.com | [211d 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 55ms (state_validation=25ms block_and_pvtdata_commit=18ms state_commit=6ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org2.example.com | [211e 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org2.example.com | [211f 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfe6a0 gate 1602702114429178400 evaluation succeeds +peer0.org2.example.com | [2120 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2121 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2122 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2123 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2124 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2125 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2126 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2127 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2128 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2129 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [212a 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [212b 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [212c 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [212d 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [212e 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [212f 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2130 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2131 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2132 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2133 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2134 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22b4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 229 218 72 26 154 158 171 106 46 92 5 182 30 225 113 69 200 85 134 120 169 110 138 213 101 175 172 32 23 244 144 76 2 32 50 128 250 104 99 72 187 100 64 52 165 36 31 22 81 21 72 251 24 205 222 184 58 18 148 87 45 140 121 236 68 230]} 0x151b080}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0027ee6c0 0xc0027be2a0 {{0 0} 0 0 0 0} {false}})]} +peer1.org2.example.com | [22b5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [22b6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0002604c0})} +peer1.org2.example.com | [22b7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org2.example.com | [22b8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org2.example.com | [22b9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org2.example.com | [22ba 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22bb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [22bc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22bd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22c0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22c1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22c2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22c3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22c4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22c5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 gate 1602702114407867900 evaluation starts +peer1.org2.example.com | [22c6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22c7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [22c8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22c9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 principal evaluation fails +peer1.org2.example.com | [22ca 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02a60 gate 1602702114407867900 evaluation fails +peer1.org2.example.com | [22cb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22cc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22cd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22ce 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 gate 1602702114408417800 evaluation starts +peer1.org2.example.com | [22cf 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22d0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [22d1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 principal matched by identity 0 +peer1.org2.example.com | [22d2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [22d3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [22d4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22d5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a02fd0 gate 1602702114408417800 evaluation succeeds +peer1.org2.example.com | [22d6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22d7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22d8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22d9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22da 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22db 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22dc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22dd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22de 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22df 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22e0 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22e1 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 gate 1602702114409185300 evaluation starts +peer1.org2.example.com | [22e2 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22e3 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [22e4 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22e5 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 principal evaluation fails +peer1.org2.example.com | [22e6 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a03bc0 gate 1602702114409185300 evaluation fails +peer1.org2.example.com | [22e7 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22e8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22e9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22ea 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 gate 1602702114409444400 evaluation starts +peer1.org2.example.com | [22eb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22ec 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [22ed 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 principal matched by identity 0 +peer1.org2.example.com | [22ee 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [22ef 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [22f0 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22f1 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1e130 gate 1602702114409444400 evaluation succeeds +peer1.org2.example.com | [22f2 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22f3 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22f4 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22f5 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22f6 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [22f7 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22f8 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [22be 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [22bf 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org2.example.com | [22f9 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 08 c7 50 19 36 a3 b5 c8 3b cb |0E.!....P.6...;.| +peer1.org2.example.com | 00000010 d8 25 ed 97 b1 1b d9 7c f9 8c 4d 61 77 3d c6 94 |.%.....|..Maw=..| +peer1.org2.example.com | 00000020 67 fd 52 db 34 02 20 14 0c cb 3f ae 61 5d 19 73 |g.R.4. ...?.a].s| +peer1.org2.example.com | 00000030 61 ef fd 5f d9 05 6a f3 1b bb bd d2 9d 47 b7 8c |a.._..j......G..| +peer1.org2.example.com | 00000040 63 f5 5b 5e df d6 49 |c.[^..I| +peer1.org2.example.com | [22fa 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [22fb 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1f97 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer1.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer1.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer1.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer1.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer1.org1.example.com | [1f98 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f99 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f9a 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f9d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f9e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fa0 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1fa1 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fa2 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1fa3 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fa4 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fa5 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fa6 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fa7 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1fa8 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 gate 1602702110448064200 evaluation starts +peer1.org1.example.com | [1fa9 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1faa 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [1fab 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 principal matched by identity 0 +peer1.org1.example.com | [1fac 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer1.org1.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer1.org1.example.com | [1fad 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer1.org1.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer1.org1.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer1.org1.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer1.org1.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer1.org1.example.com | [1fae 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1faf 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026d9630 gate 1602702110448064200 evaluation succeeds +peer1.org1.example.com | [1fb0 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fb1 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fb2 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1fb3 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22fc 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fd 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fe 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [22ff 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2300 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2301 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2302 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2303 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2304 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2305 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +peer1.org2.example.com | txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +peer1.org2.example.com | ] +peer1.org2.example.com | [2306 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to txid-index +peer1.org2.example.com | [2307 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to blockNumTranNum index +peer1.org2.example.com | [2308 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [230a 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [230b 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [230c 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [230d 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [230e 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [230f 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2310 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2311 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2312 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2309 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org2.example.com | [2313 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org2.example.com | [2314 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2316 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 gate 1602702114434110000 evaluation starts +peer1.org2.example.com | [2317 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2318 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2319 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [231a 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 principal evaluation fails +peer1.org2.example.com | [231b 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a05ee0 gate 1602702114434110000 evaluation fails +peer1.org2.example.com | [231c 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [231d 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [231e 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2315 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [231f 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 gate 1602702114439000800 evaluation starts +peer1.org2.example.com | [2322 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2323 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2324 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 principal matched by identity 0 +peer1.org2.example.com | [2320 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org2.example.com | [2321 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2325 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer1.org2.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org2.example.com | [2327 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer1.org2.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer1.org2.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer1.org2.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer1.org2.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer1.org2.example.com | [2328 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org2.example.com | [2329 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [2326 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [232a 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [232b 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232c 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [232e 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [232f 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org2.example.com | [2330 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [2331 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [2332 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [232d 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2333 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [2336 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org2.example.com | [2337 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org2.example.com | [2338 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | [2339 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [233a 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2334 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a1ee60 gate 1602702114439000800 evaluation succeeds +peer1.org2.example.com | [233b 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [233c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [233d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [233e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [233f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2340 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2341 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2342 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer1.org2.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org2.example.com | [2343 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer1.org2.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer1.org2.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer1.org2.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer1.org2.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer1.org2.example.com | [2344 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2345 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2346 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2347 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer1.org2.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer1.org2.example.com | [2348 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer1.org2.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer1.org2.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer1.org2.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer1.org2.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer1.org2.example.com | [2349 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [234a 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [234b 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [234c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2335 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [234d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [234e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [234f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2350 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2351 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2352 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2353 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2354 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2355 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2356 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2357 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2358 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2359 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [235d 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 gate 1602702114481411400 evaluation starts +peer1.org2.example.com | [235e 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [235f 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2360 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2361 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 principal evaluation fails +peer1.org2.example.com | [2362 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6cce0 gate 1602702114481411400 evaluation fails +peer1.org2.example.com | [2363 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2364 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2365 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2366 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 gate 1602702114483329000 evaluation starts +peer1.org2.example.com | [2367 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2368 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2369 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 principal matched by identity 0 +peer1.org2.example.com | [236a 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [236b 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [236c 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [236d 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6d250 gate 1602702114483329000 evaluation succeeds +peer1.org2.example.com | [236e 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [236f 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2370 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2371 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [235a 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org2.example.com | [2372 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org2.example.com | [2373 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2374 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [235b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ac1c1d23-ac9b-4cde-a39a-1a36ac6d8683] +peer1.org2.example.com | [2375 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org2.example.com | [2376 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2378 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org2.example.com | [237a 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ac1c1d23-ac9b-4cde-a39a-1a36ac6d8683] +peer1.org2.example.com | [2377 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | [2379 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [235c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [237b 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org2.example.com | [237d 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [237e 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4F3E4C58EA1FC9E16...08031A0C0A0565787030321203312E30 +peer1.org2.example.com | [237f 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 147F71F961F366E7926779D53FCF494FD9DE9846F81C9447F7EF6F27E2698550 +peer1.org2.example.com | [2380 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2381 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [237c 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 120ms (state_validation=32ms block_and_pvtdata_commit=36ms state_commit=17ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org2.example.com | [2382 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2383 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2384 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2385 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2386 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2387 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org2.example.com | [2388 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2389 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [238a 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 gate 1602702114501154100 evaluation starts +peer1.org2.example.com | [238b 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [238c 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [238e 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [238f 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2390 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [20d8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20d9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20da 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20db 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20dc 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20dd 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20de 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20df 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20e0 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 gate 1602702109893618500 evaluation starts +peer0.org1.example.com | [20e1 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20e2 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [20e3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 principal matched by identity 0 +peer0.org1.example.com | [20e4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [20e5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [20e6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20e7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 gate 1602702109893618500 evaluation succeeds +peer0.org1.example.com | [20e8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20e9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20ea 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20eb 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20ec 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ed 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ee 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20ef 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20f0 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20f1 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20f2 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20f3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20f4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 gate 1602702109894603000 evaluation starts +peer0.org1.example.com | [20f5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20f6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [20f7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 principal matched by identity 0 +peer0.org1.example.com | [20f8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [20f9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [20fa 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20fb 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 gate 1602702109894603000 evaluation succeeds +peer0.org1.example.com | [20fc 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20fd 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20fe 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20ff 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2100 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org2.example.com | [2135 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2136 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2137 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2138 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2139 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [213a 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [213b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 gate 1602702114474695400 evaluation starts +peer0.org2.example.com | [213c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [213d 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [213e 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 principal matched by identity 0 +peer0.org2.example.com | [213f 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer0.org2.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer0.org2.example.com | [2140 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer0.org2.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer0.org2.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer0.org2.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer0.org2.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer0.org2.example.com | [2141 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2142 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22220 gate 1602702114474695400 evaluation succeeds +peer0.org2.example.com | [2143 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2144 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2145 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2146 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2147 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2148 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2149 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [214a 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [214b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [214c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [214d 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [214e 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [214f 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2150 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2151 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2152 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2153 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > alive: alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org2.example.com | [2154 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2156 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2155 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2157 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2158 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [2159 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [215a 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [215b 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [215c 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [215d 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fb4 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fb5 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fb6 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fb7 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer1.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer1.org1.example.com | [1fb8 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer1.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer1.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer1.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer1.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer1.org1.example.com | [1fb9 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fba 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fbb 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fbc 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1fbd 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +peer1.org1.example.com | 00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +peer1.org1.example.com | [1fbe 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +peer1.org1.example.com | 00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +peer1.org1.example.com | 00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +peer1.org1.example.com | 00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +peer1.org1.example.com | 00000040 5b 36 93 4f f5 a4 91 |[6.O...| +peer1.org1.example.com | [1fbf 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fc0 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fc1 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fc2 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fc3 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fc4 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fc5 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fc6 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fc7 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer1.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer1.org1.example.com | [1fc8 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer1.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer1.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer1.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer1.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer1.org1.example.com | [1fc9 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1fca 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 d4 95 0f 82 db e4 e8 30 8f 98 |0E.!.........0..| +peer1.org1.example.com | 00000010 e1 ed 77 2e c1 c7 e5 a1 5a c6 e9 90 03 de e8 b5 |..w.....Z.......| +peer1.org1.example.com | 00000020 b7 5f e9 ca c5 02 20 50 7f c5 15 e1 be 0c 44 37 |._.... P......D7| +peer1.org1.example.com | 00000030 71 65 b9 18 c9 6b 61 bb 8f 52 10 b0 fc 60 43 31 |qe...ka..R...`C1| +peer1.org1.example.com | 00000040 48 c3 07 e1 6d ff fc |H...m..| +peer1.org1.example.com | [1fcb 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1fcc 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1fcd 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fce 10-14 19:01:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fcf 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2392 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2391 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2394 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2395 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [238d 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2396 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2397 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2398 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 principal evaluation fails +peer0.org2.example.com | [215e 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [215f 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 gate 1602702114513401400 evaluation starts +peer0.org2.example.com | [2160 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2161 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2162 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [2163 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 principal evaluation fails +peer0.org2.example.com | [2164 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c239a0 gate 1602702114513401400 evaluation fails +peer0.org2.example.com | [2165 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2166 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2167 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2168 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 gate 1602702114514302000 evaluation starts +peer0.org2.example.com | [2169 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [216a 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [216b 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 principal matched by identity 0 +peer0.org2.example.com | [216c 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [216d 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [216e 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [216f 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c23f10 gate 1602702114514302000 evaluation succeeds +peer0.org2.example.com | [2170 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2171 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2172 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2173 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2174 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2101 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [2102 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2103 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2104 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [2105 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [2106 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [2107 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [2108 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2109 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [210a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [210b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [210c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [210d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [210e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [210f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2110 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 gate 1602702109905790500 evaluation starts +peer0.org1.example.com | [2111 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2112 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2113 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 principal matched by identity 0 +peer0.org1.example.com | [2114 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [2115 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [2116 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2117 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 gate 1602702109905790500 evaluation succeeds +peer0.org1.example.com | [2118 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2119 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [211a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [211b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [211c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [211d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [211e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [211f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2120 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2121 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fd0 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [239a 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2399 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7b280 gate 1602702114501154100 evaluation fails +peer1.org2.example.com | [239b 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [239c 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [239d 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [239e 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 gate 1602702114526993800 evaluation starts +peer1.org2.example.com | [239f 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23a0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [23a1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 principal matched by identity 0 +peer1.org2.example.com | [2393 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [23a3 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [23a4 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23a5 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa27a0 gate 1602702114526993800 evaluation succeeds +peer1.org2.example.com | [23a6 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23a7 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23a8 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23a9 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23aa 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23ab 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23ad 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org2.example.com | [23ae 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org2.example.com | [23af 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23b0 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23b1 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23b2 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23b3 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23b4 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 gate 1602702114568579800 evaluation starts +peer1.org2.example.com | [23b5 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23b6 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [23b7 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 principal matched by identity 0 +peer1.org2.example.com | [23b8 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org2.example.com | [23b9 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org2.example.com | [23ba 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23bc 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa3b70 gate 1602702114568579800 evaluation succeeds +peer1.org2.example.com | [23bd 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23be 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23ac 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23bb 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2175 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2176 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2177 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [2178 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2179 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217a 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [217b 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [217c 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [217d 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [217e 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [217f 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2180 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2181 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2182 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2183 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2184 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2185 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2186 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 gate 1602702114542568200 evaluation starts +peer0.org2.example.com | [2187 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2188 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2189 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 principal matched by identity 0 +peer0.org2.example.com | [218a 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [218b 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [218c 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [218d 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c474e0 gate 1602702114542568200 evaluation succeeds +peer0.org2.example.com | [218e 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [218f 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2190 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23bf 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23c0 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23c1 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23c2 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23c3 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org2.example.com | [23c4 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org2.example.com | [23c5 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23c6 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23c7 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [23c8 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23c9 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23ca 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [23cb 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [23cc 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23cd 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org2.example.com | [23ce 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23cf 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23d1 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23d2 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23d3 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23d4 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23d5 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 gate 1602702114575834700 evaluation starts +peer1.org2.example.com | [23d6 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23d7 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [23d8 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [23d9 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 principal evaluation fails +peer1.org2.example.com | [23da 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad6d70 gate 1602702114575834700 evaluation fails +peer1.org2.example.com | [23db 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23dc 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23d0 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org2.example.com | [23dd 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23de 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23df 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23e0 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [23e1 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 gate 1602702114578273500 evaluation starts +peer1.org2.example.com | [23e2 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23e3 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org2.example.com | [23e4 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [2191 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2192 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2193 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2194 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2195 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2196 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2197 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2198 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2199 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 gate 1602702114548810600 evaluation starts +peer0.org2.example.com | [219a 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [219b 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [219c 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 principal matched by identity 0 +peer0.org2.example.com | [219d 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [219e 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [219f 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21a0 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c6e0d0 gate 1602702114548810600 evaluation succeeds +peer0.org2.example.com | [21a1 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21a2 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21a3 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21a4 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21a5 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21a6 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2122 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2123 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2124 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 gate 1602702109906582300 evaluation starts +peer0.org1.example.com | [2125 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2126 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2127 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 principal matched by identity 0 +peer0.org1.example.com | [2128 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [1fd1 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fd2 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1fd3 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fd4 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fd5 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fd6 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fd7 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fd8 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1fd9 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3a 4e c8 16 33 8d e3 90 83 09 ec 15 12 32 9f 3e |:N..3........2.>| +peer1.org1.example.com | 00000010 35 72 dc 55 a8 00 49 84 a9 ef 36 ee c1 42 0b 96 |5r.U..I...6..B..| +peer1.org1.example.com | [1fda 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 0c df 48 4b 4d fc 06 f4 82 38 |0E.!....HKM....8| +peer1.org1.example.com | 00000010 c2 f6 ae 46 4b 2c 5c fc e4 bd 8d 53 69 56 8c 4b |...FK,\....SiV.K| +peer1.org1.example.com | 00000020 07 3b 32 dc e2 02 20 10 3a 37 cd 85 83 bd 44 a9 |.;2... .:7....D.| +peer1.org1.example.com | 00000030 9d d5 42 4a 41 cc d4 b0 14 72 47 18 9e 65 de e0 |..BJA....rG..e..| +peer1.org1.example.com | 00000040 16 47 1b 9b 20 f8 7b |.G.. .{| +peer1.org1.example.com | [1fdb 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fdc 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1fdd 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1fde 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1fdf 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1fe0 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe1 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe2 10-14 19:01:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe3 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe4 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe5 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe6 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1fe7 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe8 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1fe9 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fea 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1feb 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fec 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fed 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fee 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fef 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ff0 10-14 19:01:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21a7 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [21a8 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21a9 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21aa 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ab 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ac 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ad 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ae 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [21af 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21b0 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b1 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b2 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [21b3 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b4 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21b5 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [21b6 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21b7 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [21b8 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21b9 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [23e5 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [23e6 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23e7 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23e8 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 principal matched by identity 0 +peer1.org2.example.com | [23e9 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [23eb 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [23ea 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer1.org2.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer1.org2.example.com | [23ec 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer1.org2.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer1.org2.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer1.org2.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer1.org2.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer1.org2.example.com | [23ed 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23ee 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad72e0 gate 1602702114578273500 evaluation succeeds +peer1.org2.example.com | [23ef 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23f0 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23f1 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23f2 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23f3 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [23f4 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [23f5 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [23f6 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [23f7 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [23f8 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23f9 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23fa 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ff2 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ff3 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ff4 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ff5 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1ff6 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer1.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org1.example.com | [1ff7 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer1.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer1.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer1.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer1.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer1.org1.example.com | [1ff8 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1ff9 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 de 6e 1f 65 a9 34 17 de a3 83 4e |0D. 4.n.e.4....N| +peer1.org1.example.com | 00000010 ee 7e 33 22 07 90 5f 13 e7 0e 02 a9 4c 9c ec c7 |.~3".._.....L...| +peer1.org1.example.com | 00000020 b4 45 86 68 02 20 26 fc 08 de 5e f0 c3 c8 62 8d |.E.h. &...^...b.| +peer1.org1.example.com | 00000030 ce 66 6e 5f df 91 87 43 09 33 87 fa f6 87 1d 69 |.fn_...C.3.....i| +peer1.org1.example.com | 00000040 0a 94 20 91 03 89 |.. ...| +peer1.org1.example.com | [1ffa 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1ffb 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1ffc 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ffd 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ffe 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1fff 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2000 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2001 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2002 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2003 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2004 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2005 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [21ba 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21bb 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21bc 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21bd 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21be 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21bf 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21c0 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21c1 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 gate 1602702114564974200 evaluation starts +peer0.org2.example.com | [21c2 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21c3 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [21c4 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 principal matched by identity 0 +peer0.org2.example.com | [21c5 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [21c6 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [21c7 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21c8 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94060 gate 1602702114564974200 evaluation succeeds +peer0.org2.example.com | [21c9 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21ca 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21cb 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21cc 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21cd 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ce 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21cf 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [21d0 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [21d1 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [21d2 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21d3 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21d4 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [21d5 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21d6 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21d7 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [21d8 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E0CCCDAC8DA1FC9E16...08041A0C0A0565787030321203312E30 +peer0.org2.example.com | [21d9 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4AAC058C9CFA76889CE4CD232E8A61C2F38128BD417A1BFA316C999F833A2A5A +peer0.org2.example.com | [21db 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21dc 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21da 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21de 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21dd 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21df 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21e0 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [21e1 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e2 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e3 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e4 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21e5 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21e6 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21e7 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21e8 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21e9 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21ea 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 gate 1602702114603623500 evaluation starts +peer0.org2.example.com | [21eb 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21ec 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [21ed 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 principal matched by identity 0 +peer0.org2.example.com | [21ee 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [21ef 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [21f0 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21f2 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc190 gate 1602702114603623500 evaluation succeeds +peer0.org2.example.com | [21f3 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21f4 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21f5 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21f6 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21f7 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org2.example.com | [21f8 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org1.example.com | [2129 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [212a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [212b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 gate 1602702109906582300 evaluation succeeds +peer0.org1.example.com | [212c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [212d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [212e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [212f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2130 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2131 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2132 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2133 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2134 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [2135 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [2136 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [2137 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [2138 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2139 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [213a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [213b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [213c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [213d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [213e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [213f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2140 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 gate 1602702109908325300 evaluation starts +peer0.org1.example.com | [2141 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2142 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2143 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 principal matched by identity 0 +peer0.org1.example.com | [2144 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [2145 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [2146 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2147 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 gate 1602702109908325300 evaluation succeeds +peer0.org1.example.com | [2148 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2149 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [214a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [214b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [214c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [214d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [214e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [214f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2150 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2151 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2152 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2153 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2154 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 gate 1602702109909436200 evaluation starts +peer0.org1.example.com | [2155 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23fb 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [23fc 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23fd 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23fe 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23ff 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2400 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > alive: +peer1.org2.example.com | [2401 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2402 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2403 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2404 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2405 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2406 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2407 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2408 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2409 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [240a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [240b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [240c 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [240d 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [240e 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [240f 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2410 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2411 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2412 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2006 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2007 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2008 10-14 19:01:50.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2009 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [200a 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [200b 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [200c 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [200d 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [200e 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [200f 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2010 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2011 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2012 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2013 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2014 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2015 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2016 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2017 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2018 10-14 19:01:50.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2019 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [201a 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [201b 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [201c 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100B1801 +peer1.org1.example.com | [201d 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 91D66271360A4A2481FBC18332358D8887908F62D55F1CD5ADF884D7ED3B459C +peer1.org1.example.com | [201e 10-14 19:01:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [201f 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2020 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2021 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2022 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2023 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2024 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2025 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2026 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2027 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2028 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2029 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [202a 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [202b 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [202c 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [202d 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [202e 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [202f 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2156 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2157 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 principal matched by identity 0 +peer0.org1.example.com | [2158 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [2159 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [215a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [215b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 gate 1602702109909436200 evaluation succeeds +peer0.org1.example.com | [215c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [215d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [215e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [215f 10-14 19:01:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2160 10-14 19:01:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2161 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2162 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2163 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2164 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2165 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2166 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2167 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2168 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2030 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2031 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2032 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2033 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2034 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2035 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2036 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2037 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2038 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2039 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [203a 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [203b 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [203c 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [203d 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [203e 10-14 19:01:54.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [203f 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2040 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2041 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2042 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2043 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2044 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2045 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2046 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2047 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2048 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2049 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 gate 1602702114162252700 evaluation starts +peer1.org1.example.com | [204a 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [204b 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [204c 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 principal matched by identity 0 +peer1.org1.example.com | [204d 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer1.org1.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org1.example.com | [204e 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer1.org1.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer1.org1.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer1.org1.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer1.org1.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer1.org1.example.com | [204f 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2050 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a130 gate 1602702114162252700 evaluation succeeds +peer1.org1.example.com | [2051 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2052 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2053 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2054 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2055 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2056 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2057 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2058 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2059 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [205a 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [205b 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [205c 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [205d 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [205e 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [205f 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2060 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2061 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2062 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2063 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2064 10-14 19:01:54.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2065 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2066 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2067 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org2.example.com | [21f9 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [21fa 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [21fb 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21fc 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21fd 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21fe 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21ff 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2200 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2201 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2202 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2203 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 gate 1602702114614799200 evaluation starts +peer0.org2.example.com | [2204 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2205 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2206 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 principal matched by identity 0 +peer0.org2.example.com | [2207 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [2208 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [2209 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [220a 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd8010 gate 1602702114614799200 evaluation succeeds +peer0.org2.example.com | [220b 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [220c 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [220d 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [220e 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21f1 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [220f 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2210 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2211 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2169 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [216a 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [216b 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [216c 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [216d 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [216e 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [216f 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2170 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2171 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2172 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2173 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2174 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2175 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2176 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2177 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2178 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2179 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [217a 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [217b 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [217c 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [217d 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [217e 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [217f 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2180 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2181 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2182 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2183 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 gate 1602702110138671600 evaluation starts +peer0.org1.example.com | [2184 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2185 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2186 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 principal matched by identity 0 +peer0.org1.example.com | [2187 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 5f f2 3b fc 57 f6 78 e3 33 5c be 31 ae 40 7b |3_.;.W.x.3\.1.@{| +peer0.org1.example.com | 00000010 35 31 b8 5c 5d 2c 21 ca 9a f0 61 ea 04 27 33 35 |51.\],!...a..'35| +peer0.org1.example.com | [2188 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0a 4e 6b ac 0c 9f 08 f0 87 66 9c |0D. r.Nk......f.| +peer0.org1.example.com | 00000010 bf 03 eb 4e 08 f0 b4 ac b0 b0 90 35 cf c6 b0 36 |...N.......5...6| +peer0.org1.example.com | 00000020 16 48 af c1 02 20 5e 5d f7 a1 0a a7 26 23 5e 97 |.H... ^]....&#^.| +peer0.org1.example.com | 00000030 46 1e 47 4d 3e 03 9c d8 7e ac 0a 15 ba 87 e5 af |F.GM>...~.......| +peer0.org1.example.com | 00000040 91 9c 8a 8a 82 fc |......| +peer0.org1.example.com | [2189 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [218a 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 gate 1602702110138671600 evaluation succeeds +peer0.org1.example.com | [218b 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [218c 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [218d 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [218e 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [218f 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2190 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2191 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2192 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2193 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2194 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2195 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2196 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2197 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2198 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2199 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [219a 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [219b 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [219c 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [219d 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [219e 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [219f 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21a0 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21a1 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21a2 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21a3 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21a4 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21a5 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21a6 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21a7 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21a8 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21a9 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21aa 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21ab 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ac 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2413 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 gate 1602702114590628500 evaluation starts +peer1.org2.example.com | [2414 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2415 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2416 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2417 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2418 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [2419 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [241a 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [241b 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [241c 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [241d 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 principal evaluation fails +peer1.org2.example.com | [241e 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b269f0 gate 1602702114590628500 evaluation fails +peer1.org2.example.com | [241f 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2420 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2421 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2422 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 gate 1602702114607542000 evaluation starts +peer1.org2.example.com | [2423 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2424 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2425 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2426 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 principal matched by identity 0 +peer1.org2.example.com | [2427 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [2428 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [2429 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [242a 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b26f60 gate 1602702114607542000 evaluation succeeds +peer1.org2.example.com | [242b 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [242c 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [242d 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [242e 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [242f 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2430 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2431 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2432 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2433 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2434 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2435 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2436 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2437 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2438 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2439 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 gate 1602702114616127700 evaluation starts +peer1.org2.example.com | [243a 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [243b 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [243c 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [243d 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 principal evaluation fails +peer1.org2.example.com | [243e 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b27b50 gate 1602702114616127700 evaluation fails +peer1.org2.example.com | [243f 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2440 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2441 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2442 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 gate 1602702114618081700 evaluation starts +peer1.org2.example.com | [2443 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2444 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2445 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 principal matched by identity 0 +peer1.org1.example.com | [2068 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2069 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [206a 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [206b 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [206c 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2212 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2213 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2215 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2216 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2214 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2217 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2218 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2219 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [221a 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [221b 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [221c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 gate 1602702114633209400 evaluation starts +peer0.org2.example.com | [221d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [221e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [221f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 principal matched by identity 0 +peer0.org2.example.com | [2220 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer0.org2.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer0.org2.example.com | [2221 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer0.org2.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer0.org2.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer0.org2.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer0.org2.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer0.org2.example.com | [2222 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2223 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2224 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2225 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cbc910 gate 1602702114633209400 evaluation succeeds +peer0.org2.example.com | [2226 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2227 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2228 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2229 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [222a 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [222b 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [222c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [222d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ad 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ae 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21af 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21b0 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b1 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21b2 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [21b3 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b4 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [21b5 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21b6 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21b7 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [21b8 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21b9 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21ba 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 gate 1602702110161676000 evaluation starts +peer0.org1.example.com | [21bb 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [21bc 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [21bd 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 principal matched by identity 0 +peer0.org1.example.com | [21be 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer0.org1.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer1.org2.example.com | [2446 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [2447 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [2448 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2449 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4c0c0 gate 1602702114618081700 evaluation succeeds +peer1.org2.example.com | [244a 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [244b 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [244c 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [244d 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [244e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [244f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2450 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2451 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2452 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2453 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2454 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2455 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2457 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2458 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2459 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 gate 1602702114656157300 evaluation starts +peer1.org2.example.com | [245a 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [245b 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [245c 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [245d 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 principal evaluation fails +peer1.org2.example.com | [245e 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13720 gate 1602702114656157300 evaluation fails +peer1.org1.example.com | [206d 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [206e 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [206f 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2070 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2071 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2072 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2073 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2074 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2076 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2077 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2075 10-14 19:01:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2078 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [207a 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [207b 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2079 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [207c 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [207d 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [207f 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2080 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [2082 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [207e 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2081 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2084 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer1.org1.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer1.org1.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer1.org1.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2085 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 gate 1602702114271664200 evaluation starts +peer1.org1.example.com | [2086 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2087 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2088 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [2089 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2083 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [208a 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [208c 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [208d 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [208e 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [208f 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2090 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2091 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2092 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2093 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2094 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 gate 1602702114276472600 evaluation starts +peer1.org1.example.com | [208b 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [2095 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2096 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2097 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 principal matched by identity 0 +peer1.org1.example.com | [2098 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [2099 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [209a 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [209b 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00261fec0 gate 1602702114276472600 evaluation succeeds +peer1.org1.example.com | [209c 10-14 19:01:54.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [209d 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [209e 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [209f 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20a0 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a1 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a2 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20a3 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20a4 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20a5 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 principal matched by identity 0 +peer1.org1.example.com | [20a7 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e b5 32 af 5e 84 e5 36 ba ad 2c 51 c4 da b0 12 |..2.^..6..,Q....| +peer1.org1.example.com | 00000010 9e a7 95 4d 2a a6 de e1 5e e2 b9 3c d2 20 ee 5a |...M*...^..<. .Z| +peer1.org1.example.com | [20a8 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be bc 12 60 e2 0c 7a 31 f7 af 5d |0E.!....`..z1..]| +peer1.org1.example.com | 00000010 82 07 30 67 60 95 9a fc 9f 21 a3 bb eb a0 a0 3e |..0g`....!.....>| +peer1.org1.example.com | 00000020 0f 42 3e 5f b2 02 20 3f 16 3f 15 df a6 99 23 6a |.B>_.. ?.?....#j| +peer1.org1.example.com | 00000030 11 ae 88 0c f8 22 a8 0a 07 db e5 39 6b 65 91 91 |.....".....9ke..| +peer1.org1.example.com | 00000040 22 aa 43 a5 19 a1 bb |".C....| +peer1.org1.example.com | [20a6 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20a9 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [20aa 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d0070 gate 1602702114271664200 evaluation succeeds +peer1.org1.example.com | [20ab 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [20ad 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [20ae 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [20af 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [20b0 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [20b1 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [20b2 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [20ac 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20b3 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org1.example.com | [20b4 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer1.org1.example.com | [20b6 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org1.example.com | [20b7 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | [20b8 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [20b9 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [20b5 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20ba 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 gate 1602702114291250000 evaluation starts +peer1.org1.example.com | [20bb 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org1.example.com | [20bc 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20bd 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [20be 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 principal matched by identity 0 +peer1.org1.example.com | [20bf 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [20c0 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [20c1 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [20c2 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [20c4 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [20c5 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002a32400 env 0xc0026caeb0 txn 0 +peer1.org1.example.com | [20c6 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0026caeb0 +peer1.org1.example.com | [20c7 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer1.org1.example.com | [20c8 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [20c9 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [20ca 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [20cb 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c3 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c4ca0 gate 1602702114291250000 evaluation succeeds +peer1.org1.example.com | [20cc 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [20cd 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [20ce 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [20cf 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [20d0 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20d1 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20d2 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [20d3 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20d4 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d5 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [20d6 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d7 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d8 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20d9 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20da 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20db 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20dc 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20dd 10-14 19:01:54.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20de 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer1.org1.example.com | [20df 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20e0 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [20e1 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer1.org1.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer1.org1.example.com | [20e2 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer1.org1.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer1.org2.example.com | [245f 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2460 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2461 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2462 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 gate 1602702114656486200 evaluation starts +peer1.org2.example.com | [2463 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2464 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2465 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 principal matched by identity 0 +peer1.org2.example.com | [2466 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [2467 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [2456 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2468 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2469 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [246a 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [246b 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [246c 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [246d 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [246e 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [246f 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2470 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2471 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b13c90 gate 1602702114656486200 evaluation succeeds +peer1.org2.example.com | [2472 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2473 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2474 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2475 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2476 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2477 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2478 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2479 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21bf 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer0.org1.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer0.org1.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer0.org1.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer0.org1.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer0.org1.example.com | [21c0 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [21c1 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 gate 1602702110161676000 evaluation succeeds +peer0.org1.example.com | [21c2 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21c3 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21c4 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [21c5 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [21c6 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21c7 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [21c8 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [21c9 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [21ca 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [21cb 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21cc 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21cd 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ce 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [21cf 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d0 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d1 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d2 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21d3 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +peer0.org1.example.com | [21d4 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [21d5 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d6 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21d9 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21d7 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21d8 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21da 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21dc 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21db 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21dd 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [21de 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21df 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [21e0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21e1 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [247a 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [247b 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [247c 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [247d 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [247e 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [247f 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2480 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 gate 1602702114669458200 evaluation starts +peer1.org2.example.com | [2481 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2482 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2483 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2484 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 principal evaluation fails +peer1.org2.example.com | [2485 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6afe0 gate 1602702114669458200 evaluation fails +peer1.org2.example.com | [2486 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2487 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2488 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2489 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 gate 1602702114673798100 evaluation starts +peer1.org2.example.com | [248a 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [248b 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [248c 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 principal matched by identity 0 +peer1.org2.example.com | [248d 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [248e 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [248f 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2490 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6b550 gate 1602702114673798100 evaluation succeeds +peer1.org2.example.com | [2491 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2492 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2493 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2494 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2495 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2496 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2497 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2498 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2499 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [249a 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [249b 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [249c 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [249d 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [249e 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [249f 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [24a1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [222e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [222f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2230 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2231 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2232 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2233 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2234 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2235 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2236 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2237 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2238 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2239 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [223a 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [223c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223e 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223f 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223d 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2240 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2241 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2243 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2244 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2245 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2246 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2247 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2248 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer1.org1.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer1.org1.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer1.org1.example.com | [20e3 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [20e4 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00268ca80, header channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer1.org1.example.com | [20e5 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | [20e6 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org1.example.com | [20e7 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org1.example.com | [20e8 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [20e9 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer1.org1.example.com | [20ea 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [20eb 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002694000 +peer1.org1.example.com | [20ec 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [20ed 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [dbb9dcf3-8796-409c-ac1a-4c4f42a8c423] +peer1.org1.example.com | [20ee 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [dbb9dcf3-8796-409c-ac1a-4c4f42a8c423] +peer1.org1.example.com | [20ef 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 gate 1602702114320507100 evaluation starts +peer1.org1.example.com | [20f0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20f1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [20f2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [20f3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20f4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21e2 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [21e3 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21e4 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21e5 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 gate 1602702110258933700 evaluation starts +peer0.org1.example.com | [21e6 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [21e7 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [21e8 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 principal matched by identity 0 +peer0.org1.example.com | [21e9 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f7 c2 85 6f 12 61 82 a6 ae e3 60 2d a4 ca a4 |/...o.a....`-...| +peer0.org1.example.com | 00000010 c5 d7 fa e0 72 bb f9 2e 9c 43 00 18 c7 e7 b4 34 |....r....C.....4| +peer0.org1.example.com | [21ea 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 b0 f2 f0 6f 0d c3 f5 ac 77 30 |0E.!.....o....w0| +peer0.org1.example.com | 00000010 1d a9 c3 35 fd b1 76 44 fe be c3 f5 36 4b 95 ff |...5..vD....6K..| +peer0.org1.example.com | 00000020 d4 52 7e f2 38 02 20 72 6e b5 33 6d e5 d1 29 a4 |.R~.8. rn.3m..).| +peer0.org1.example.com | 00000030 61 c4 fc 8e 56 0e af b7 5e 57 03 78 44 ae 38 e9 |a...V...^W.xD.8.| +peer0.org1.example.com | 00000040 0e a3 b9 3a e5 35 57 |...:.5W| +peer0.org1.example.com | [21eb 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [21ec 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 gate 1602702110258933700 evaluation succeeds +peer0.org1.example.com | [21ed 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21ee 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21ef 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [21f0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [21f1 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21f2 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [21f3 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [21f4 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2249 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > alive:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > alive:\003\234\330~\254\n\025\272\207\345\257\221\234\212\212\202\374" > +peer0.org2.example.com | [224a 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [224b 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2242 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [224c 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [224d 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [224e 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [224f 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2250 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 gate 1602702114672636500 evaluation starts +peer0.org2.example.com | [2251 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2252 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2253 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 principal matched by identity 0 +peer0.org2.example.com | [2254 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [2255 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [2256 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2257 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d1c600 gate 1602702114672636500 evaluation succeeds +peer0.org2.example.com | [2258 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2259 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [225a 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [225b 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [225c 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org2.example.com | [225d 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org2.example.com | [225e 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [225f 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2260 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2261 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2262 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24a2 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [24a3 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24a4 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24a5 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [24a6 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [24a7 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [24a8 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 gate 1602702114684050700 evaluation starts +peer1.org2.example.com | [24a9 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24aa 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [24ab 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [24ac 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 principal evaluation fails +peer1.org2.example.com | [24ad 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dc40 gate 1602702114684050700 evaluation fails +peer1.org2.example.com | [24ae 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24af 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24b0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [24b1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 gate 1602702114684314300 evaluation starts +peer1.org2.example.com | [24b2 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24a0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [24b3 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [24b4 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 principal matched by identity 0 +peer1.org2.example.com | [24b5 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer1.org2.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer1.org2.example.com | [24b6 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer1.org2.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer1.org2.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer1.org2.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer1.org2.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer1.org2.example.com | [24b7 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24b8 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [24b9 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [24ba 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [24bb 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [24bc 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [24bd 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb41b0 gate 1602702114684314300 evaluation succeeds +peer1.org2.example.com | [24be 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24bf 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 gate 1602702114684677700 evaluation starts +peer1.org2.example.com | [24c0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24c1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [24c2 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 principal matched by identity 0 +peer1.org2.example.com | [24c3 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [24c4 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [24c5 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [24c6 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b9ac90 gate 1602702114684677700 evaluation succeeds +peer1.org2.example.com | [24c7 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24c8 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24c9 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [24ca 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [24cb 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cc 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [24cd 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [24ce 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [24cf 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24d0 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24d2 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [24d4 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [24d5 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [24d6 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [24d8 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [24d7 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [24d9 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [24da 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org1.example.com | [21f5 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [21f6 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21f7 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21f8 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21f9 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [21fa 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21fb 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21fc 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21fd 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21fe 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ff 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2200 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2201 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2202 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2203 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2204 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2205 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2206 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2207 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2208 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2209 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [220a 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [220b 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220c 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [220d 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220e 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [220f 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2210 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2211 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2212 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2213 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2215 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2214 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2216 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2217 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2218 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [221a 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2219 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [221b 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [221e 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [221f 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2220 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2221 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2222 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2223 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2224 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2225 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 gate 1602702110296578300 evaluation starts +peer0.org1.example.com | [2226 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2227 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2228 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 principal matched by identity 0 +peer0.org1.example.com | [2229 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer0.org1.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer0.org1.example.com | [222a 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer0.org1.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer0.org1.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer0.org1.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org1.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org1.example.com | [222b 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [222c 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 gate 1602702110296578300 evaluation succeeds +peer0.org1.example.com | [222d 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [222e 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [222f 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2230 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2231 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [221c 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [221d 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2232 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2233 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2234 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2235 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2236 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2237 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2238 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2239 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [223a 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [223b 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223c 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223d 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223e 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [223f 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2240 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2241 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2242 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2243 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2244 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2245 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2246 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2247 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2248 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2249 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [224a 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [224b 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [224c 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [224d 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [224e 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [224f 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2250 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2251 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 4a 8d 3c 07 fd d1 a3 2c 7b 0b 1b ad 48 91 1c |.J.<....,{...H..| +peer0.org1.example.com | 00000010 01 b1 3f 2f 9d 50 db b0 2a 1a ae 19 e7 46 5b af |..?/.P..*....F[.| +peer0.org1.example.com | [2252 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed fa 2e 37 07 30 d1 e7 d3 e8 a9 |0E.!....7.0.....| +peer0.org1.example.com | 00000010 44 98 b7 06 36 54 3c 24 db 77 0a 51 7d e0 e9 22 |D...6T<$.w.Q}.."| +peer0.org1.example.com | 00000020 46 cf 25 1f 2c 02 20 68 47 93 54 d1 55 9b 4a 9b |F.%.,. hG.T.U.J.| +peer0.org1.example.com | 00000030 10 f0 fa ee 76 e9 c9 eb 9a b4 c0 de cf 42 98 0a |....v........B..| +peer0.org1.example.com | 00000040 7f 76 c9 31 ec b7 54 |.v.1..T| +peer0.org1.example.com | [2253 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2254 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2255 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2256 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2257 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2258 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2259 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [225a 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [225b 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225c 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225d 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225e 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2260 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [225f 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2263 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2264 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2265 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2266 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2267 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2268 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2269 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 gate 1602702114697855800 evaluation starts +peer0.org2.example.com | [226a 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [226b 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [226c 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 principal matched by identity 0 +peer0.org2.example.com | [226d 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [226e 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [226f 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2270 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d14830 gate 1602702114697855800 evaluation succeeds +peer0.org2.example.com | [2271 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2272 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2273 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2274 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2275 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [2276 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [2277 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2278 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2279 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [227a 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [227b 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [227c 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [227d 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [227e 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [227f 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [24db 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [24dc 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24dd 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [24de 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24df 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [24e0 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e1 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e2 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e3 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [24d3 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e4 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e7 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e8 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [24e5 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24e9 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24eb 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ec 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [24ed 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24ea 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ee 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ef 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [24f1 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f0 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24f2 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > alive: +peer1.org2.example.com | [24f3 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e6 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f4 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f5 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [24f6 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f7 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f8 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24f9 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4F3E4C58EA1FC9E16...08041A0C0A0565787030321203312E30 +peer1.org2.example.com | [24fa 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A9CD7ECFF7A4DBC21E712BD52F22B8D0A1E1D07E57BD7FFBADDC97A2F24D441 +peer1.org2.example.com | [24fb 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24fc 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24fd 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [24fe 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [24ff 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2500 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2501 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2503 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org2.example.com | [2504 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org1.example.com | [2261 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2263 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2262 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2264 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2265 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2266 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2267 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [226a 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [226b 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [226c 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2268 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [226d 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2269 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [226e 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [226f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2270 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2271 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2272 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2273 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org1.example.com | [2274 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer0.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer0.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer0.org1.example.com | [2275 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2276 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 d4 95 0f 82 db e4 e8 30 8f 98 |0E.!.........0..| +peer0.org1.example.com | 00000010 e1 ed 77 2e c1 c7 e5 a1 5a c6 e9 90 03 de e8 b5 |..w.....Z.......| +peer0.org1.example.com | 00000020 b7 5f e9 ca c5 02 20 50 7f c5 15 e1 be 0c 44 37 |._.... P......D7| +peer0.org1.example.com | 00000030 71 65 b9 18 c9 6b 61 bb 8f 52 10 b0 fc 60 43 31 |qe...ka..R...`C1| +peer0.org1.example.com | 00000040 48 c3 07 e1 6d ff fc |H...m..| +peer0.org1.example.com | [2277 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2278 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2279 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [227a 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [227b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [227c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [227d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [227e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [227f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2280 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2281 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2282 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2283 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2284 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2285 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2286 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2287 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20f5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20f6 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20f7 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20f8 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20f9 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20fa 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20fb 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 gate 1602702114326874800 evaluation starts +peer1.org1.example.com | [20fc 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20fd 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [20fe 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 principal matched by identity 0 +peer1.org1.example.com | [20ff 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [2100 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [2101 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2102 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fa930 gate 1602702114326874800 evaluation succeeds +peer1.org1.example.com | [2103 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2104 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2105 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2106 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2107 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2108 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2109 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2505 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2506 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2507 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2508 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2509 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [250a 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [250b 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [250c 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [250d 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [250e 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 gate 1602702114921054500 evaluation starts +peer1.org2.example.com | [250f 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2510 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2511 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2512 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 principal evaluation fails +peer1.org2.example.com | [2513 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfa850 gate 1602702114921054500 evaluation fails +peer1.org2.example.com | [2514 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2515 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2516 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2517 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 gate 1602702114922327900 evaluation starts +peer1.org2.example.com | [2518 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2519 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [251a 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 principal matched by identity 0 +peer1.org2.example.com | [251b 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [251c 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [251d 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [251e 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bfadc0 gate 1602702114922327900 evaluation succeeds +peer1.org2.example.com | [251f 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2520 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2521 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2522 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2523 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2524 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2525 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2526 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2527 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2528 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2529 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [252a 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org2.example.com | [252c 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [252d 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [252e 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org2.example.com | [252f 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2530 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2531 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2532 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2502 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2280 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 gate 1602702114705810200 evaluation starts +peer0.org2.example.com | [2281 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2282 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2283 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 principal matched by identity 0 +peer0.org2.example.com | [2284 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [2285 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [2286 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2287 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d521c0 gate 1602702114705810200 evaluation succeeds +peer0.org2.example.com | [2288 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2289 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [228a 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [228b 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [228c 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [228d 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [228e 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [228f 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2290 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2291 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2292 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2293 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2294 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2295 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2296 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 gate 1602702114720415700 evaluation starts +peer0.org2.example.com | [2297 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2298 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2299 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 principal matched by identity 0 +peer0.org2.example.com | [229a 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [229b 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [229c 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [229d 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d53560 gate 1602702114720415700 evaluation succeeds +peer0.org2.example.com | [229e 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [229f 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22a0 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2533 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2534 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2535 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [252b 10-14 19:01:54.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2536 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 gate 1602702114930266800 evaluation starts +peer1.org2.example.com | [2537 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2538 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2539 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [253a 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [253b 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [253c 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 principal evaluation fails +peer1.org2.example.com | [253d 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc94e0 gate 1602702114930266800 evaluation fails +peer1.org2.example.com | [253e 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [253f 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2540 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2541 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2542 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2543 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2544 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2545 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2546 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2547 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2548 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2549 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 gate 1602702114979969300 evaluation starts +peer1.org2.example.com | [254a 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [254b 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [254c 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 principal matched by identity 0 +peer1.org2.example.com | [254d 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [254e 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [254f 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2550 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9a50 gate 1602702114979969300 evaluation succeeds +peer1.org2.example.com | [2551 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2552 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2553 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2554 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2555 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org2.example.com | [2556 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [22a1 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [22a2 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org2.example.com | [22a3 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org2.example.com | [22a4 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org2.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org2.example.com | [22a5 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org2.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org2.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org2.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org2.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org2.example.com | [22a6 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a7 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a8 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [22a9 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22aa 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22ab 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [22ac 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [22ad 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [22ae 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 gate 1602702114747138500 evaluation starts +peer0.org2.example.com | [22af 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22b0 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [22b1 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 principal matched by identity 0 +peer0.org2.example.com | [22b2 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | [22b3 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [22b4 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [22b5 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6d540 gate 1602702114747138500 evaluation succeeds +peer0.org2.example.com | [22b6 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22b7 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22b8 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [22b9 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [22ba 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22bb 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [22bc 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org2.example.com | [22bd 10-14 19:01:54.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [210a 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [210c 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [210b 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [210d 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [210e 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [210f 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 principal matched by identity 0 +peer1.org1.example.com | [2110 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d d1 7e f9 cd 39 41 91 e7 fe c6 aa ba 0b f2 3a |..~..9A........:| +peer1.org1.example.com | 00000010 08 3a 12 12 e3 9c 57 c2 15 e1 d3 66 0f 7e c9 e5 |.:....W....f.~..| +peer1.org1.example.com | [2112 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 36 5a e6 6d d9 08 99 36 4e 84 |0E.!..6Z.m...6N.| +peer1.org1.example.com | 00000010 c6 2b 58 d9 54 14 05 aa fa 5d 60 52 7f 30 72 e8 |.+X.T....]`R.0r.| +peer1.org1.example.com | 00000020 45 e2 38 c2 7f 02 20 0f f9 a7 2d 5d db 9d bd 9f |E.8... ...-]....| +peer1.org1.example.com | 00000030 54 6d 2b 62 ab e9 bc d9 7d 77 6d 0f d2 66 07 4c |Tm+b....}wm..f.L| +peer1.org1.example.com | 00000040 83 4e 0a 0e d1 2c bd |.N...,.| +peer1.org1.example.com | [2111 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2113 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 gate 1602702114335865000 evaluation starts +peer1.org1.example.com | [2114 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2115 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2116 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2118 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2119 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 principal matched by identity 0 +peer1.org1.example.com | [211a 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [211b 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [211c 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [211d 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbdc0 gate 1602702114335865000 evaluation succeeds +peer1.org1.example.com | [211e 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [211f 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2120 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2121 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2122 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [2123 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [2124 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2125 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2126 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2127 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer1.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer1.org1.example.com | [2128 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer1.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer1.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer1.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer1.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer1.org1.example.com | [2129 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer1.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer1.org1.example.com | [212a 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer1.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer1.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer1.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer1.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer1.org1.example.com | [212b 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [212c 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22be 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [22bf 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c0 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c1 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22c2 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [22c3 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [22c4 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [22c5 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22c6 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22c7 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [22c8 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [22c9 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [22ca 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 gate 1602702114945518100 evaluation starts +peer0.org2.example.com | [22cb 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22cc 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [22cd 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [22ce 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 principal evaluation fails +peer0.org2.example.com | [22cf 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d94aa0 gate 1602702114945518100 evaluation fails +peer0.org2.example.com | [22d0 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22d1 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [22d2 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [22d3 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 gate 1602702114965840800 evaluation starts +peer0.org2.example.com | [22d4 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [22d5 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [22d6 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 principal matched by identity 0 +peer0.org2.example.com | [22d7 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [22d8 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [22d9 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [22da 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d95010 gate 1602702114965840800 evaluation succeeds +peer0.org2.example.com | [22db 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [22dc 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [22dd 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [22de 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [22df 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e0 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e1 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22e2 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22e3 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [22e4 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2288 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2289 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [228a 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [228b 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [228c 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [228d 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [228e 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [228f 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2290 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2291 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2292 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2293 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2294 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2295 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2296 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2297 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2298 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2299 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [229a 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [229b 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [229c 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [229d 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [229e 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161023 +peer0.org1.example.com | [229f 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3A4EC816338DE3908309EC1512329F3E3572DC55A8004984A9EF36EEC1420B96 +peer0.org1.example.com | [22a0 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [22a1 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [22a2 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [22a3 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [22a4 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a5 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a6 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a7 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [22a8 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22a9 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [22aa 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [22ab 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22ac 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22ad 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22ae 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22af 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22b0 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22b1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [22b2 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161024 +peer0.org1.example.com | [22b3 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 530BAD755692BEB3D71261702654172AB46FF3ABB69AAEAEBF0691BF827DDD8F +peer0.org1.example.com | [22b4 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [22b5 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [22b6 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [22b7 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [22b8 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22b9 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [22ba 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22bb 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [22bc 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [22bd 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22be 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [22bf 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2557 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer1.org2.example.com | [2558 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [2559 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [255a 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [255b 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org2.example.com | [255c 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [255d 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [255e 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [255f 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2560 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2561 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2562 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2563 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2564 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 gate 1602702115007441700 evaluation starts +peer1.org2.example.com | [2565 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2566 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2567 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2568 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 principal evaluation fails +peer1.org2.example.com | [2569 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3bbd0 gate 1602702115007441700 evaluation fails +peer1.org2.example.com | [256a 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [256b 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [256c 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [256d 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 gate 1602702115009551900 evaluation starts +peer1.org2.example.com | [256e 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [256f 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2570 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 principal matched by identity 0 +peer1.org2.example.com | [2571 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [2572 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [2573 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2574 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5a140 gate 1602702115009551900 evaluation succeeds +peer1.org2.example.com | [2575 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2576 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2577 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2578 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2579 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org2.example.com | [257a 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org2.example.com | [257b 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257c 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257d 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [257e 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [257f 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2580 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2581 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2582 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [212d 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [212e 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [212f 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2130 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2131 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2132 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2133 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 gate 1602702114349666600 evaluation starts +peer1.org1.example.com | [2134 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2135 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2136 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 principal matched by identity 0 +peer1.org1.example.com | [2138 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer1.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer1.org1.example.com | [2139 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer1.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer1.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer1.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer1.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer1.org1.example.com | [213a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [213b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f4850 gate 1602702114349666600 evaluation succeeds +peer1.org1.example.com | [213c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [213d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [213e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [213f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2140 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2137 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2117 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 skipping identity 0 because it has already been used +peer1.org1.example.com | [2141 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2144 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2145 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2146 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2147 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2148 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2149 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [214a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 gate 1602702114359618600 evaluation starts +peer1.org1.example.com | [214b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2142 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [214c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [214d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [214e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [214f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 principal matched by identity 0 +peer1.org1.example.com | [2151 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer1.org1.example.com | [2152 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer1.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer1.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer1.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer1.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer1.org1.example.com | [2153 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2154 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f5bc0 gate 1602702114359618600 evaluation succeeds +peer1.org1.example.com | [2155 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2156 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2150 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2157 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2158 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [215a 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [215b 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [215c 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [215d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [215e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [215f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2160 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2159 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2161 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2143 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 principal evaluation fails +peer1.org1.example.com | [2162 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002512900 gate 1602702114320507100 evaluation succeeds +peer1.org1.example.com | [2163 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org2.example.com | [22e6 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [22e8 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e7 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [22e9 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e5 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22eb 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ea 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [22ec 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22ed 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [22ee 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [22ef 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [22f0 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f1 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f2 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [22f3 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [22f4 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [22f5 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f6 10-14 19:01:55.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f7 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22f8 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161023 +peer0.org2.example.com | [22f9 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0FFE4034236B560BD78213DA1373045B73C04BA0D9349EED484BA43A283B6BE7 +peer0.org2.example.com | [22fa 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22fb 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [22fc 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [22fd 10-14 19:01:55.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [22fe 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ff 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2300 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2301 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2302 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2303 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2304 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2305 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2306 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2307 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2308 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2309 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [230a 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230b 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [230c 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [230d 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [230e 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [230f 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 1e 63 bd e5 53 ad 55 f2 a8 61 57 71 d6 b2 18 |q.c..S.U..aWq...| +peer0.org2.example.com | 00000010 a0 fa 08 14 7e 73 46 d2 98 f2 c5 8a a9 3a 47 4b |....~sF......:GK| +peer0.org2.example.com | [2310 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 9e 09 00 a1 a8 aa 64 2b de f1 13 |0D. .......d+...| +peer0.org2.example.com | 00000010 a3 cf f7 89 b5 f0 14 b4 ce bc f3 b5 8f 93 bf 85 |................| +peer0.org2.example.com | 00000020 30 ba 14 e1 02 20 54 f1 25 7b 41 c5 8d e1 82 25 |0.... T.%{A....%| +peer0.org2.example.com | 00000030 7c b1 90 ec ab b1 ac 71 c5 7d 34 3b a3 37 df 65 ||......q.}4;.7.e| +peer0.org2.example.com | 00000040 41 57 f5 5c 41 66 |AW.\Af| +peer0.org2.example.com | [2311 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2312 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2313 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2314 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2315 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2316 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2317 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2318 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2319 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [231a 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [231b 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [231c 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [231d 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [231e 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [231f 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2320 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2321 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2322 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2323 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2324 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2325 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2326 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c0 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c2 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c3 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c4 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [22c5 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c6 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c7 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c8 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c9 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [22ca 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22cb 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [22cc 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [22cd 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ce 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [22d0 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22d1 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22d2 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22cf 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [22d3 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22d4 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22d5 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22d6 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 gate 1602702110627072700 evaluation starts +peer0.org1.example.com | [22d7 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22d8 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [22d9 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 principal matched by identity 0 +peer0.org1.example.com | [22da 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +peer0.org1.example.com | 00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +peer0.org1.example.com | [22db 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +peer0.org1.example.com | 00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +peer0.org1.example.com | 00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +peer0.org1.example.com | 00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +peer0.org1.example.com | 00000040 98 8b 06 b0 3b 10 |....;.| +peer0.org1.example.com | [22dc 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22dd 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 gate 1602702110627072700 evaluation succeeds +peer0.org1.example.com | [22de 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22df 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22e0 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22e1 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22e2 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22e3 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22e4 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [22e5 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org1.example.com | [22e6 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer0.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer0.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer0.org1.example.com | [22e7 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22e8 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22e9 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [22ea 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer0.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer0.org1.example.com | [22eb 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer0.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer0.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer0.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer0.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer0.org1.example.com | [22ec 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22ed 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22ee 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22ef 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22f0 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [22f1 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [22f2 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer0.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer0.org1.example.com | [22f3 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer0.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer0.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer0.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer0.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer0.org1.example.com | [22f4 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [22f5 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 de 6e 1f 65 a9 34 17 de a3 83 4e |0D. 4.n.e.4....N| +peer0.org1.example.com | 00000010 ee 7e 33 22 07 90 5f 13 e7 0e 02 a9 4c 9c ec c7 |.~3".._.....L...| +peer0.org1.example.com | 00000020 b4 45 86 68 02 20 26 fc 08 de 5e f0 c3 c8 62 8d |.E.h. &...^...b.| +peer0.org1.example.com | 00000030 ce 66 6e 5f df 91 87 43 09 33 87 fa f6 87 1d 69 |.fn_...C.3.....i| +peer0.org1.example.com | 00000040 0a 94 20 91 03 89 |.. ...| +peer0.org1.example.com | [22f6 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [22f7 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [22f8 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22f9 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22fa 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22fb 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2327 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2328 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2329 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [232a 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [232b 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [232c 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [232d 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [232e 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [232f 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2330 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2331 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2332 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2333 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2334 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2335 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2336 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 gate 1602702115410562200 evaluation starts +peer0.org2.example.com | [2337 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2338 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2339 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 principal matched by identity 0 +peer0.org2.example.com | [233a 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 31 71 c5 ef 6b 70 3c 9e 71 a1 a9 16 c4 47 0e |.1q..kp<.q....G.| +peer0.org2.example.com | 00000010 a6 46 0c 80 8a 6b 1c ce cb 9d 46 e4 3b 17 6d 76 |.F...k....F.;.mv| +peer0.org2.example.com | [233b 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b0 5a b1 68 69 4c 5e 03 38 05 e0 |0D. ..Z.hiL^.8..| +peer0.org2.example.com | 00000010 c7 c0 a2 da 2a 22 76 5c 8a ca 58 86 2a 5e 3a 80 |....*"v\..X.*^:.| +peer0.org2.example.com | 00000020 59 bc 33 97 02 20 63 5f 9f 72 4f ec 8b 6c c4 2d |Y.3.. c_.rO..l.-| +peer0.org2.example.com | 00000030 57 a2 10 bd 92 ef 80 b3 0b 87 d1 d5 54 38 f4 d6 |W...........T8..| +peer0.org2.example.com | 00000040 5b c5 ef d9 c7 f6 |[.....| +peer0.org2.example.com | [233c 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [233d 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c000 gate 1602702115410562200 evaluation succeeds +peer0.org2.example.com | [233e 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [233f 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2340 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2341 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2342 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2343 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2344 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2345 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2346 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2347 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2348 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2349 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [234a 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [234b 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [234c 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [234d 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [234e 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234f 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2350 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2351 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2352 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2353 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2354 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2355 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2356 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2357 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2358 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2359 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235a 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [235b 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235c 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [235d 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235e 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [235f 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2360 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2361 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2362 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2363 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2364 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22fc 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22fd 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [22fe 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [22ff 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2300 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2301 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2302 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2303 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2304 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2305 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2306 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 gate 1602702110657385800 evaluation starts +peer0.org1.example.com | [2307 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2308 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2309 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 principal matched by identity 0 +peer0.org1.example.com | [230a 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +peer0.org1.example.com | 00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +peer0.org1.example.com | [230b 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +peer0.org1.example.com | 00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +peer0.org1.example.com | 00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +peer0.org1.example.com | 00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +peer0.org1.example.com | 00000040 ed 4e e7 a9 fc f4 |.N....| +peer0.org1.example.com | [230c 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [230d 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 gate 1602702110657385800 evaluation succeeds +peer0.org1.example.com | [230e 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [230f 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2310 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2311 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2312 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2313 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2314 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2315 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer0.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer0.org1.example.com | [2316 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer0.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer0.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer0.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer0.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer0.org1.example.com | [2317 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2164 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2165 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [2166 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [2167 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org1.example.com | [2168 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org1.example.com | [2169 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4baa4dd9-50cf-475d-9fca-34ddc9366426] +peer1.org1.example.com | [216a 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [216b 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4baa4dd9-50cf-475d-9fca-34ddc9366426] +peer1.org1.example.com | [216c 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org1.example.com | [216d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [e6857644-0933-46c5-9a3a-ad7e74546b26] +peer1.org1.example.com | [216e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [216f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [e6857644-0933-46c5-9a3a-ad7e74546b26] +peer1.org1.example.com | [2170 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 gate 1602702114369873100 evaluation starts +peer1.org1.example.com | [2171 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2172 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2173 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [2174 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [2175 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [2176 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2177 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [2178 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2179 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 principal matched by identity 0 +peer1.org1.example.com | [217a 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer1.org1.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer1.org1.example.com | [217b 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer1.org1.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer1.org1.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer1.org1.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer1.org1.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer1.org1.example.com | [217c 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [217d 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [217e 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 skipping identity 0 because it has already been used +peer1.org1.example.com | [217f 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 principal evaluation fails +peer1.org1.example.com | [2180 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002513e00 gate 1602702114369873100 evaluation succeeds +peer1.org1.example.com | [2181 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org1.example.com | [2182 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 appears to be valid +peer1.org1.example.com | [2183 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002694000 +peer1.org1.example.com | [2184 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002a32400 env 0xc0026caeb0 txn 0 +peer1.org1.example.com | [2185 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [2186 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 83ms +peer1.org1.example.com | [2187 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [2188 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [2189 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org1.example.com | [218a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2583 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 gate 1602702115016133600 evaluation starts +peer1.org2.example.com | [2584 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2585 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2586 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2587 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 principal evaluation fails +peer1.org2.example.com | [2588 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ba30 gate 1602702115016133600 evaluation fails +peer1.org2.example.com | [2589 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [258a 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [258b 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [258c 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 gate 1602702115021385100 evaluation starts +peer1.org2.example.com | [258d 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [258e 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [258f 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 principal matched by identity 0 +peer1.org2.example.com | [2590 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [2591 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [2592 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2593 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5bfa0 gate 1602702115021385100 evaluation succeeds +peer1.org2.example.com | [2594 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2595 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2596 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2597 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2598 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [2599 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [259a 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [259b 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org2.example.com | [259c 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [259d 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [259e 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [259f 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [25a0 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25a1 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25a2 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2318 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2319 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [231a 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [231b 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +peer0.org1.example.com | 00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +peer0.org1.example.com | [231c 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +peer0.org1.example.com | 00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +peer0.org1.example.com | 00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +peer0.org1.example.com | 00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +peer0.org1.example.com | 00000040 a9 3d f4 36 c6 7a |.=.6.z| +peer0.org1.example.com | [231d 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [231e 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [231f 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2320 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2321 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2322 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2323 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2324 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2325 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2326 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +peer0.org1.example.com | [2327 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [2328 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [2329 10-14 19:01:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [232a 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [232b 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer0.org1.example.com | [232c 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org1.example.com | [232d 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org1.example.com | [232e 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer0.org1.example.com | [232f 10-14 19:01:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +peer0.org1.example.com | [2330 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [2331 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [2332 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +peer0.org1.example.com | [2333 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +peer0.org1.example.com | [2334 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +peer0.org1.example.com | [2335 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +peer0.org1.example.com | [2336 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +peer0.org1.example.com | [2337 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [2338 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2339 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [233a 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +peer0.org1.example.com | [233b 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [233c 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [233d 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +peer0.org1.example.com | [233e 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [233f 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2340 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] notifying Txid:7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, channelID:businesschannel +peer0.org1.example.com | [2341 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2342 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7f8c4d3c] Exit chaincode: name:"lscc" (38302ms) +peer0.org1.example.com | [2343 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2344 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org1.example.com | [2345 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Exit +peer0.org1.example.com | [2346 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2347 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2348 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, chaincode: lscc} +peer0.org1.example.com | [2349 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20553F97190707D18CDA1130C80D68...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [2365 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2366 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2367 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2368 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2369 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [236a 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [236b 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 gate 1602702115592762000 evaluation starts +peer0.org2.example.com | [236c 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [236d 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [236e 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 principal matched by identity 0 +peer0.org2.example.com | [236f 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +peer0.org2.example.com | 00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +peer0.org2.example.com | [2370 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +peer0.org2.example.com | 00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +peer0.org2.example.com | 00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +peer0.org2.example.com | 00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +peer0.org2.example.com | 00000040 e6 82 cf 5e 48 73 |...^Hs| +peer0.org2.example.com | [2371 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2372 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dedf50 gate 1602702115592762000 evaluation succeeds +peer0.org2.example.com | [2373 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2374 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2375 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2376 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2377 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2378 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2379 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [237a 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [237b 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [237c 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [237d 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [237e 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [237f 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2380 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2381 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2382 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2383 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [234a 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1DD17EF9CD394191E7FEC6AABA0BF23A083A1212E39C57C215E1D3660F7EC9E5 +peer0.org1.example.com | [234b 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, chaincode: lscc} +peer0.org1.example.com | [234c 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Exit +peer0.org1.example.com | [234d 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org1.example.com | [234e 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41754 +peer0.org1.example.com | [234f 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41754 grpc.code=OK grpc.call_duration=38.3243079s +peer0.org1.example.com | [2350 10-14 19:01:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2351 10-14 19:01:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2352 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41764 +peer0.org1.example.com | [2353 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003aa1b30 +peer0.org1.example.com | [2354 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2355 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2356 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2357 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2358 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2359 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 ce 8c 96 43 79 34 e1 e6 ba b6 47 16 94 83 1f |t...Cy4....G....| +peer0.org1.example.com | 00000010 0d ea fc 20 bd a5 a2 4f 01 fd c2 95 07 db cd 72 |... ...O.......r| +peer0.org1.example.com | [235a 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da cb 6f 2a 82 1e e2 ff 7a ae fe |0E.!...o*....z..| +peer0.org1.example.com | 00000010 d2 6b f1 08 f6 a0 f3 ec 8b d4 7e 3b 79 fb 1c 33 |.k........~;y..3| +peer0.org1.example.com | 00000020 1d 48 b9 e2 b2 02 20 2f 0b eb 74 97 39 b8 a6 d3 |.H.... /..t.9...| +peer0.org1.example.com | 00000030 fa 3e f5 81 ca fa 6d 84 59 5e 58 27 a3 d1 8a 48 |.>....m.Y^X'...H| +peer0.org1.example.com | 00000040 fa f9 41 d8 b8 7d ac |..A..}.| +peer0.org1.example.com | [235b 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [235c 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003553e30, header 0xc0038d6000 +peer0.org1.example.com | [235d 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [235e 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] processing txid: 9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124 +peer0.org1.example.com | [235f 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +peer0.org1.example.com | [2360 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2361 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2362 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2363 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2364 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2365 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 gate 1602702112658214000 evaluation starts +peer0.org1.example.com | [2366 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2367 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2368 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [2369 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [236a 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [236b 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 principal matched by identity 0 +peer0.org1.example.com | [236c 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 ce 8c 96 43 79 34 e1 e6 ba b6 47 16 94 83 1f |t...Cy4....G....| +peer0.org1.example.com | 00000010 0d ea fc 20 bd a5 a2 4f 01 fd c2 95 07 db cd 72 |... ...O.......r| +peer0.org1.example.com | [236d 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da cb 6f 2a 82 1e e2 ff 7a ae fe |0E.!...o*....z..| +peer0.org1.example.com | 00000010 d2 6b f1 08 f6 a0 f3 ec 8b d4 7e 3b 79 fb 1c 33 |.k........~;y..3| +peer0.org1.example.com | 00000020 1d 48 b9 e2 b2 02 20 2f 0b eb 74 97 39 b8 a6 d3 |.H.... /..t.9...| +peer0.org1.example.com | 00000030 fa 3e f5 81 ca fa 6d 84 59 5e 58 27 a3 d1 8a 48 |.>....m.Y^X'...H| +peer0.org1.example.com | 00000040 fa f9 41 d8 b8 7d ac |..A..}.| +peer0.org1.example.com | [236e 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [236f 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 gate 1602702112658214000 evaluation succeeds +peer0.org1.example.com | [2370 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2371 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2372 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org2.example.com | [25a3 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [25a4 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25a5 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 gate 1602702115030313900 evaluation starts +peer1.org2.example.com | [25a6 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25a7 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [25a8 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25a9 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 principal evaluation fails +peer1.org2.example.com | [25aa 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c75ae0 gate 1602702115030313900 evaluation fails +peer1.org2.example.com | [25ab 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25ac 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25ad 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25ae 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 gate 1602702115031880600 evaluation starts +peer1.org2.example.com | [25af 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25b0 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [25b1 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 principal matched by identity 0 +peer1.org2.example.com | [25b2 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org2.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [25b3 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org2.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org2.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org2.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org2.example.com | [25b4 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25b5 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c90050 gate 1602702115031880600 evaluation succeeds +peer1.org2.example.com | [25b6 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25b7 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25b8 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25b9 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25ba 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org2.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org2.example.com | [25bb 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org2.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org2.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org2.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org2.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org2.example.com | [25bc 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25bd 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25be 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [25bf 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25c0 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25c1 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [25c2 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [218b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [218c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [218d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org1.example.com | [218e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [218f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [2190 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2191 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org2.example.com | [2384 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2385 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2386 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2387 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2388 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2389 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238a 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238b 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238c 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238d 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238e 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [238f 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2390 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2391 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2392 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2393 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2394 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2395 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2396 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes +peer0.org2.example.com | [2397 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2398 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2399 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [239a 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [239b 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [239c 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 gate 1602702117291761000 evaluation starts +peer0.org2.example.com | [239d 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [239e 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [239f 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 principal matched by identity 0 +peer0.org2.example.com | [23a0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 60 23 8e 2f 2e 9c c3 53 dd 80 25 c3 de f5 72 |<`#./...S..%...r| +peer0.org2.example.com | 00000010 0f ee 92 30 ff d1 2e ce ce 04 c9 a6 a3 2e 23 e6 |...0..........#.| +peer0.org2.example.com | [23a1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 39 6a 65 ef 43 f6 6c 6b 65 a3 |0E.!..9je.C.lke.| +peer0.org2.example.com | 00000010 d6 ef e9 ce e7 05 37 d7 ba 32 82 33 e3 7e 20 81 |......7..2.3.~ .| +peer0.org2.example.com | 00000020 f1 98 1d 9b bb 02 20 1a 27 ee dc ac 66 f6 83 a0 |...... .'...f...| +peer0.org2.example.com | 00000030 24 f6 12 42 cb c8 ab a5 21 3c 83 09 6d 66 37 b4 |$..B....!<..mf7.| +peer0.org2.example.com | 00000040 3f 20 a7 51 d8 52 08 |? .Q.R.| +peer0.org2.example.com | [23a2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23a3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0dbd0 gate 1602702117291761000 evaluation succeeds +peer0.org2.example.com | [23a4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [23a5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [23a6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [23a7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [23a8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [23a9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org2.example.com | [23aa 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23ab 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [23ac 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org2.example.com | [23ad 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [23ae 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org2.example.com | [23af 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org2.example.com | [23b0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | [23b1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [23b2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | [23b3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [23b4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004e6c040 env 0xc004ddad20 txn 0 +peer0.org2.example.com | [23b5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004ddad20 +peer0.org2.example.com | [23b6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer0.org2.example.com | [23b7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [23b8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [23b9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [23ba 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [23bb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [23bc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +peer0.org2.example.com | 00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA| +peer0.org2.example.com | [23bd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +peer0.org2.example.com | 00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +peer0.org2.example.com | 00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +peer0.org2.example.com | 00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +peer0.org2.example.com | 00000040 2a 75 63 d1 1c 2e ca |*uc....| +peer0.org2.example.com | [23be 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [23bf 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004e62800, header channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer0.org2.example.com | [23c0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [23c1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [23c2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [23c3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [23c4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer0.org2.example.com | [23c5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [23c6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004e66c00 +peer0.org2.example.com | [23c7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [102fe244-77ba-4840-b943-fae3f79c75de] +peer0.org2.example.com | [23c8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [23c9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [102fe244-77ba-4840-b943-fae3f79c75de] +peer0.org2.example.com | [23ca 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [23cb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0324f5db-88d5-4a1b-aa8a-67ff8f1ddfaa] +peer0.org2.example.com | [23cc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0324f5db-88d5-4a1b-aa8a-67ff8f1ddfaa] +peer0.org2.example.com | [23cd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 gate 1602702117294160400 evaluation starts +peer0.org2.example.com | [23ce 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23cf 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [23d0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 principal matched by identity 0 +peer0.org2.example.com | [23d1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 53 be 02 89 f0 4b 37 15 13 6b 2a a5 16 4a 08 |.S....K7..k*..J.| +peer0.org2.example.com | 00000010 04 f8 95 37 b7 bf f1 ab 1e 1a 22 93 92 07 32 29 |...7......"...2)| +peer0.org2.example.com | [23d2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 d5 0c 55 55 c3 fd 5a a5 f2 b3 |0E.!....UU..Z...| +peer0.org2.example.com | 00000010 99 8e a5 12 7d ef c0 95 f3 db f0 7a 60 f5 58 ff |....}......z`.X.| +peer0.org2.example.com | 00000020 cb d1 69 c7 e5 02 20 1c 97 e9 43 81 3b b8 eb ca |..i... ...C.;...| +peer0.org2.example.com | 00000030 32 54 3c c1 64 76 39 8f 8a ed 8a 1b f5 45 b2 d0 |2T<.dv9......E..| +peer1.org2.example.com | [25c3 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25c4 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 gate 1602702115036171100 evaluation starts +peer1.org2.example.com | [25c5 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25c6 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [25c7 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25c8 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 principal evaluation fails +peer1.org2.example.com | [25c9 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91940 gate 1602702115036171100 evaluation fails +peer1.org2.example.com | [25ca 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25cb 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25cc 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25cd 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 gate 1602702115037474600 evaluation starts +peer1.org2.example.com | [25ce 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25cf 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [25d0 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 principal matched by identity 0 +peer1.org2.example.com | [25d1 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org2.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org2.example.com | [25d2 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [25d3 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25d4 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c91eb0 gate 1602702115037474600 evaluation succeeds +peer1.org2.example.com | [25d5 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25d6 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25d7 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25d8 10-14 19:01:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25d9 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org2.example.com | [25da 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org2.example.com | [25db 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25dc 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer1.org2.example.com | [25dd 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer1.org2.example.com | [25de 10-14 19:01:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25df 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25e0 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25e1 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25e2 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25e3 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [25e4 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f fe 40 34 23 6b 56 0b d7 82 13 da 13 73 04 5b |..@4#kV......s.[| +peer1.org2.example.com | 00000010 73 c0 4b a0 d9 34 9e ed 48 4b a4 3a 28 3b 6b e7 |s.K..4..HK.:(;k.| +peer1.org2.example.com | [25e5 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 84 99 32 35 5e c9 84 fe e6 e6 |0E.!....25^.....| +peer1.org2.example.com | 00000010 12 1d 85 81 a5 32 1e c2 9f 12 c0 10 25 b8 c5 ca |.....2......%...| +peer1.org2.example.com | 00000020 81 8f 78 ac 4e 02 20 5e ae 73 b6 3b 1d db 8d 6e |..x.N. ^.s.;...n| +peer1.org2.example.com | 00000030 37 c4 15 56 cb 5c 22 d2 77 ce ce 5a e5 78 97 e8 |7..V.\".w..Z.x..| +peer1.org2.example.com | 00000040 09 c4 dc 13 5f 7f aa |...._..| +peer1.org2.example.com | [25e6 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2373 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2374 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2375 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +peer0.org1.example.com | [2376 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2377 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2378 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] Exit +peer0.org1.example.com | [2379 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +peer0.org1.example.com | [237a 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41764 +peer0.org2.example.com | 00000040 e7 4e 10 38 be 67 4d |.N.8.gM| +peer0.org2.example.com | [23d3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23d4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [23d5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 skipping identity 0 because it has already been used +peer0.org2.example.com | [23d6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 principal evaluation fails +peer0.org2.example.com | [23d7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e71c40 gate 1602702117294160400 evaluation succeeds +peer0.org2.example.com | [23d8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [415e7718-9e39-473a-a883-5512c358b931] +peer0.org2.example.com | [23d9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [415e7718-9e39-473a-a883-5512c358b931] +peer0.org2.example.com | [23da 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [23db 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 appears to be valid +peer0.org2.example.com | [23dc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004e66c00 +peer0.org2.example.com | [23dd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004e6c040 env 0xc004ddad20 txn 0 +peer0.org2.example.com | [23de 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [23df 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 2ms +peer0.org2.example.com | [23e0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [23e1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [23e2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org2.example.com | [23e3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [23e4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [23e5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [23e6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org2.example.com | [23e7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [23e8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [23e9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [23ea 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [23eb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [23ec 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [23ed 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [23ee 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [23ef 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] marked as valid by state validator +peer0.org2.example.com | [23f0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004e6d000), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004e6d040)} +peer0.org2.example.com | [23f1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [23f2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [23f3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [23f4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [23f5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [23f6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [23f7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23f9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fa 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org2.example.com | [23fe 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +peer0.org2.example.com | txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +peer0.org2.example.com | ] +peer0.org2.example.com | [23ff 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to txid-index +peer0.org2.example.com | [2400 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to blockNumTranNum index +peer0.org2.example.com | [2401 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org2.example.com | [2402 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org2.example.com | [2403 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org2.example.com | [2404 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org2.example.com | [2405 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [2406 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [2407 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2192 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] marked as valid by state validator +peer1.org1.example.com | [2193 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002a33a40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002a33a80), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc002a33ac0)} +peer1.org1.example.com | [2194 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [2195 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [2196 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [2197 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0025095e0)}} +peer1.org1.example.com | [2198 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org1.example.com | [2199 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org1.example.com | [219a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org1.example.com | [219b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org1.example.com | [219c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [219d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [219f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [21a1 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [21a0 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21a3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21a4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21a5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [21a6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21a7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 gate 1602702114390648200 evaluation starts +peer1.org1.example.com | [21a8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21a9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [21aa 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 principal matched by identity 0 +peer1.org1.example.com | [21ab 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer1.org1.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer1.org1.example.com | [21ac 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer1.org1.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer1.org1.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer1.org1.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer1.org1.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer1.org1.example.com | [21ad 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [21ae 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0000a8e60 gate 1602702114390648200 evaluation succeeds +peer1.org1.example.com | [21af 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21b0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21b1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [21b2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [21b3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [21b4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [21b5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [21b6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [21b7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [21b8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ba 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21bb 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [21bc 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21bd 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21be 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21bf 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21c0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [21c1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21a2 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [21c3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [21c4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org1.example.com | [21c5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org1.example.com | [21c6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21c7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [21c8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21c9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [21ca 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [21cb 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 gate 1602702114394771600 evaluation starts +peer1.org1.example.com | [21cc 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21cd 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [21ce 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [21cf 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 principal evaluation fails +peer1.org1.example.com | [21d0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000410f10 gate 1602702114394771600 evaluation fails +peer1.org1.example.com | [21d1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21d2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21d3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [21d4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 gate 1602702114395647900 evaluation starts +peer1.org1.example.com | [21d5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [21d6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [21d7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 principal matched by identity 0 +peer1.org1.example.com | [21d8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org1.example.com | [21d9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org1.example.com | [21da 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2408 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [2409 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [240a 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [240b 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [240c 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org2.example.com | [240e 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [240f 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org2.example.com | [2410 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org2.example.com | [240d 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org2.example.com | [2411 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org2.example.com | [2412 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org2.example.com | [2413 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 15ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org2.example.com | [2414 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org2.example.com | [2415 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2416 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2417 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2418 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2419 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [241a 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [241b 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [241c 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [241d 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [241e 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [241f 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2420 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2421 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2422 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 gate 1602702117917291700 evaluation starts +peer0.org2.example.com | [2423 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2424 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2425 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 principal matched by identity 0 +peer0.org2.example.com | [2426 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [2427 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [2428 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2429 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3020 gate 1602702117917291700 evaluation succeeds +peer0.org2.example.com | [242a 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [242b 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [242c 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [242d 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [242e 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [242f 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2430 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2431 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2432 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2433 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2434 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2435 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 gate 1602702117921940200 evaluation starts +peer0.org2.example.com | [2436 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2437 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2438 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 principal matched by identity 0 +peer0.org2.example.com | [2439 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [243a 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [243b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [243c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3c10 gate 1602702117921940200 evaluation succeeds +peer0.org2.example.com | [243d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [243e 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [243f 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2440 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2441 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2442 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2443 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2444 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2445 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2446 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2447 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [237b 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41764 grpc.code=OK grpc.call_duration=5.6458ms +peer0.org1.example.com | [237c 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [237d 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [237e 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [237f 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 d6 62 71 36 0a 4a 24 81 fb c1 83 32 35 8d 88 |..bq6.J$....25..| +peer0.org1.example.com | 00000010 87 90 8f 62 d5 5f 1c d5 ad f8 84 d7 ed 3b 45 9c |...b._.......;E.| +peer0.org1.example.com | [2380 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 05 f4 4d f6 05 99 9b 8e 33 a8 |0E.!....M.....3.| +peer0.org1.example.com | 00000010 6e c5 3b 1d 96 57 c4 32 af 7d 06 6b 05 90 b2 06 |n.;..W.2.}.k....| +peer0.org1.example.com | 00000020 dc 9f c8 15 7a 02 20 4c dd 70 b1 82 38 a9 c1 1c |....z. L.p..8...| +peer0.org1.example.com | 00000030 78 f6 8e 6a 40 c1 24 0d ac c0 71 fc 30 19 db b4 |x..j@.$...q.0...| +peer0.org1.example.com | 00000040 f8 52 db 96 9f 4e 09 |.R...N.| +peer0.org1.example.com | [2381 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2382 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2383 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2384 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [2385 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [2386 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2387 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2388 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2389 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [238b 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [238c 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [238d 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [238a 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [238e 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [238f 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2390 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2391 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2392 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [2393 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [2394 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2395 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [2396 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [2397 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2398 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25e7 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [25e8 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [25e9 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [25ea 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [25eb 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ec 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ed 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ee 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ef 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25f0 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25f1 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [25f2 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25f3 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [25f4 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25f5 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25f6 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25f7 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25f8 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25f9 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25fa 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25fb 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25fc 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25fd 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [25fe 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ff 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2600 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2601 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2602 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161023 +peer1.org2.example.com | [2603 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 711E63BDE553AD55F2A8615771D6B218A0FA08147E7346D298F2C58AA93A474B +peer1.org2.example.com | [2604 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2605 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2606 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2607 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2608 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2609 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260a 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [260b 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [260c 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2448 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2449 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [244a 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 gate 1602702117931655800 evaluation starts +peer0.org2.example.com | [244b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [244c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [244d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 principal matched by identity 0 +peer0.org2.example.com | [244e 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [244f 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [2450 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2451 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2452 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [2453 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2454 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2455 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2456 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2457 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2458 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2459 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [245a 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef4ec0 gate 1602702117931655800 evaluation succeeds +peer0.org2.example.com | [245b 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [245c 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [245d 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [245e 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [245f 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2460 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2461 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2462 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21db 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411a60 gate 1602702114395647900 evaluation succeeds +peer1.org1.example.com | [21dc 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21dd 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [21de 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [21df 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [21e0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [219e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [21e1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21e2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [21e3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21e4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [21e5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21e6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21e8 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e9 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ea 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21eb 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ec 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org1.example.com | [21ed 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [21ee 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | [21ef 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [21f0 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 4 218 140 36 22 96 237 134 227 78 33 45 132 235 139 18 41 20 59 190 5 10 130 45 202 73 141 39 164 255 74 147 2 32 57 91 176 10 181 213 3 62 250 103 100 59 124 105 22 4 133 64 251 183 116 70 241 246 93 116 130 107 213 1 89 69]} 0x151b080}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002ae4480 0xc00290f320 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [21f1 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [21f2 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00034e700})} +peer1.org1.example.com | [21f3 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [21f4 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [21f6 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [21f5 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21f7 10-14 19:01:54.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21f8 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [21f9 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21fa 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21fb 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [21fc 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21fd 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [21fe 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ff 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2200 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2201 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2202 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org1.example.com | [2203 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org1.example.com | [2399 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [239a 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [239b 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [239c 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [239d 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [239e 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [239f 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 gate 1602702113897640400 evaluation starts +peer0.org1.example.com | [23a0 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23a1 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [23a2 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 principal matched by identity 0 +peer0.org1.example.com | [23a3 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [23a4 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [23a5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23a6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 gate 1602702113897640400 evaluation succeeds +peer0.org1.example.com | [23a7 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23a8 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23a9 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23aa 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23ab 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ac 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ad 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23ae 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23af 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23b0 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23b1 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23b2 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23b3 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 gate 1602702113905449400 evaluation starts +peer0.org1.example.com | [23b4 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23b5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [23b6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 principal matched by identity 0 +peer0.org1.example.com | [23b7 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [23b8 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [23b9 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23ba 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 gate 1602702113905449400 evaluation succeeds +peer0.org1.example.com | [23bb 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23bc 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23bd 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23be 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23bf 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23c0 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [23c1 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [23c2 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [23c3 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [23c4 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [23c5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23c6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23c7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23c8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23c9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23ca 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23cb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23cc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23cd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 gate 1602702113911474000 evaluation starts +peer0.org1.example.com | [23ce 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23cf 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [23d0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 principal matched by identity 0 +peer0.org1.example.com | [23d1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [23d2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [23d3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23d4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 gate 1602702113911474000 evaluation succeeds +peer0.org1.example.com | [23d5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23d6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23d7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23d8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23d9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23da 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23db 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23dc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23dd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23de 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23df 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23e0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23e1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 gate 1602702113914409000 evaluation starts +peer0.org1.example.com | [23e2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23e3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [23e4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 principal matched by identity 0 +peer0.org1.example.com | [23e5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer1.org2.example.com | [260d 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [260e 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [260f 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2610 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2611 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2612 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2613 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2614 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2615 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2616 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2617 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2618 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2619 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [261a 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [261b 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [261c 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [261d 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [261e 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [261f 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2620 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2621 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 gate 1602702115408102600 evaluation starts +peer1.org2.example.com | [2622 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2623 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2624 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2625 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 principal evaluation fails +peer1.org2.example.com | [2626 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5800 gate 1602702115408102600 evaluation fails +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [23e6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [23e7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23e8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 gate 1602702113914409000 evaluation succeeds +peer0.org1.example.com | [23e9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23ea 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23eb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23ec 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23ed 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23ee 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ef 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23f0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +peer0.org1.example.com | 00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +peer0.org1.example.com | [23f1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +peer0.org1.example.com | 00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +peer0.org1.example.com | 00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +peer0.org2.example.com | [2463 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2464 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2465 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2466 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2467 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2468 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2469 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 gate 1602702117968058500 evaluation starts +peer0.org2.example.com | [246a 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [246b 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [246c 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 principal matched by identity 0 +peer0.org2.example.com | [246d 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [246e 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [246f 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2470 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f20230 gate 1602702117968058500 evaluation succeeds +peer0.org2.example.com | [2471 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2472 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2473 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2474 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2475 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2476 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2477 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2478 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2479 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [247a 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [247b 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [247c 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [247d 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [247e 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [247f 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2480 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2481 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2482 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[36;1mpeer0.org2.example.com | [2483 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2484 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2485 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2486 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2487 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2488 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2489 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [248a 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [248b 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [248c 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161024 +peer0.org2.example.com | [248d 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1FB4F3FEF70CC2B94054C6C57B38E9F87595094A4ADDEC975A5B243FB95AD9B7 +peer0.org2.example.com | [248e 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [248f 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2490 10-14 19:01:58.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2491 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2492 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2493 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2494 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2496 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2497 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2499 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2498 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [249a 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2495 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [249b 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [249c 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [249d 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [249e 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [249f 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +peer0.org1.example.com | 00000040 09 c9 5b 1d d9 71 |..[..q| +peer0.org1.example.com | [23f2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23f3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23f4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23f5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23f6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23f7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23f8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23f9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23fa 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 gate 1602702113916797200 evaluation starts +peer0.org1.example.com | [23fb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23fc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [23fd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 principal matched by identity 0 +peer0.org1.example.com | [23fe 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +peer0.org1.example.com | 00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +peer0.org1.example.com | [23ff 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +peer0.org1.example.com | 00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +peer0.org1.example.com | 00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +peer0.org1.example.com | 00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +peer0.org1.example.com | 00000040 dc f7 90 57 13 e9 0a |...W...| +peer0.org1.example.com | [2400 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2401 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 gate 1602702113916797200 evaluation succeeds +peer0.org1.example.com | [2402 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2403 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2404 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2405 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2406 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2407 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2204 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2205 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2206 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2207 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2208 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2209 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [220a 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [220b 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2627 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2628 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2629 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [262a 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 gate 1602702115414494900 evaluation starts +peer1.org2.example.com | [262b 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [262c 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [262d 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 principal matched by identity 0 +peer1.org2.example.com | [262e 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 31 71 c5 ef 6b 70 3c 9e 71 a1 a9 16 c4 47 0e |.1q..kp<.q....G.| +peer1.org2.example.com | 00000010 a6 46 0c 80 8a 6b 1c ce cb 9d 46 e4 3b 17 6d 76 |.F...k....F.;.mv| +peer1.org2.example.com | [262f 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b0 5a b1 68 69 4c 5e 03 38 05 e0 |0D. ..Z.hiL^.8..| +peer1.org2.example.com | 00000010 c7 c0 a2 da 2a 22 76 5c 8a ca 58 86 2a 5e 3a 80 |....*"v\..X.*^:.| +peer1.org2.example.com | 00000020 59 bc 33 97 02 20 63 5f 9f 72 4f ec 8b 6c c4 2d |Y.3.. c_.rO..l.-| +peer1.org2.example.com | 00000030 57 a2 10 bd 92 ef 80 b3 0b 87 d1 d5 54 38 f4 d6 |W...........T8..| +peer1.org2.example.com | 00000040 5b c5 ef d9 c7 f6 |[.....| +peer1.org2.example.com | [2630 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2631 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5d70 gate 1602702115414494900 evaluation succeeds +peer1.org2.example.com | [2632 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2633 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2634 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2635 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2636 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2637 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2638 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2639 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [263a 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [263b 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [263c 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [263d 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [263e 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [263f 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2640 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2641 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2642 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2643 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2644 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2645 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2646 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2647 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2648 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2649 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [264a 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [264b 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [264c 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [264e 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [264d 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [24a0 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a1 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer0.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer0.org2.example.com | [24a2 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer0.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer0.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer0.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer0.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer0.org2.example.com | [24a3 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [24a4 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [24a5 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24a6 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24a7 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a8 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [24a9 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer0.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer0.org2.example.com | [24aa 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer0.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer0.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer0.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer0.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer0.org2.example.com | [24ab 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [24ac 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 0a 31 22 7e e1 e0 ea bb f4 d6 d5 |0D. ].1"~.......| +peer0.org2.example.com | 00000010 ca 00 0c 72 e2 3e 42 b5 9a 49 17 08 4b 31 48 6a |...r.>B..I..K1Hj| +peer0.org2.example.com | 00000020 ad e5 24 64 02 20 05 40 16 85 81 cd 6b a4 01 d0 |..$d. .@....k...| +peer0.org2.example.com | 00000030 e4 9f 63 78 f0 e6 4f ee ce 81 78 c2 6b 74 1a b0 |..cx..O...x.kt..| +peer0.org2.example.com | 00000040 43 b7 ec 56 2b f7 |C..V+.| +peer0.org2.example.com | [24ae 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24af 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [24ad 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [24b0 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [24b1 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24b2 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24b3 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [24b4 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [24b5 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer0.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer0.org2.example.com | [24b6 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer0.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer0.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer0.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer0.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer0.org2.example.com | [24b7 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [24b8 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [24b9 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24ba 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24bb 10-14 19:01:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24bc 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [264f 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2650 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2651 10-14 19:01:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2652 10-14 19:01:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2653 10-14 19:01:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2654 10-14 19:01:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2655 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2656 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2657 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2658 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2659 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [265a 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [265b 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [265c 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [265d 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [265e 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [265f 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2660 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 gate 1602702115581145600 evaluation starts +peer1.org2.example.com | [2661 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2662 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2663 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2664 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 principal evaluation fails +peer1.org2.example.com | [2665 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef0a0 gate 1602702115581145600 evaluation fails +peer1.org2.example.com | [2666 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2667 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2668 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2669 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 gate 1602702115582795000 evaluation starts +peer1.org2.example.com | [266a 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [266b 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [266c 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 principal matched by identity 0 +peer1.org2.example.com | [266d 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +peer1.org2.example.com | 00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +peer1.org2.example.com | [266e 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +peer1.org2.example.com | 00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +peer1.org2.example.com | 00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +peer1.org2.example.com | 00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +peer1.org2.example.com | 00000040 e6 82 cf 5e 48 73 |...^Hs| +peer1.org2.example.com | [266f 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2670 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cef610 gate 1602702115582795000 evaluation succeeds +peer1.org2.example.com | [2671 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2672 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2673 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2674 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2675 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2676 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2677 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2678 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2679 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [267a 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [267b 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [267c 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [267d 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [267e 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [267f 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2680 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2681 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2682 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2683 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2684 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2685 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2686 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2687 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2688 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2689 10-14 19:01:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [268a 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [268b 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [268c 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [268d 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [268e 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [268f 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2690 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 gate 1602702117269849300 evaluation starts +peer1.org2.example.com | [2691 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2692 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2693 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 principal matched by identity 0 +peer1.org2.example.com | [2694 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 60 23 8e 2f 2e 9c c3 53 dd 80 25 c3 de f5 72 |<`#./...S..%...r| +peer1.org2.example.com | 00000010 0f ee 92 30 ff d1 2e ce ce 04 c9 a6 a3 2e 23 e6 |...0..........#.| +peer1.org2.example.com | [2695 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 39 6a 65 ef 43 f6 6c 6b 65 a3 |0E.!..9je.C.lke.| +peer1.org2.example.com | 00000010 d6 ef e9 ce e7 05 37 d7 ba 32 82 33 e3 7e 20 81 |......7..2.3.~ .| +peer1.org2.example.com | 00000020 f1 98 1d 9b bb 02 20 1a 27 ee dc ac 66 f6 83 a0 |...... .'...f...| +peer1.org2.example.com | 00000030 24 f6 12 42 cb c8 ab a5 21 3c 83 09 6d 66 37 b4 |$..B....!<..mf7.| +peer1.org2.example.com | 00000040 3f 20 a7 51 d8 52 08 |? .Q.R.| +peer1.org2.example.com | [2696 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2697 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffac0 gate 1602702117269849300 evaluation succeeds +peer1.org2.example.com | [2698 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2699 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [269a 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [269b 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [269c 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org2.example.com | [269d 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org2.example.com | [269e 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [269f 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org2.example.com | [26a1 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org2.example.com | [26a2 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org2.example.com | [26a3 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer1.org2.example.com | [26a4 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer1.org2.example.com | [26a5 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [26a0 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer1.org2.example.com | [26a6 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004a27900 env 0xc004c9fe00 txn 0 +peer1.org2.example.com | [26a7 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [26a8 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org2.example.com | [26a9 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c9fe00 +peer1.org2.example.com | [26aa 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer1.org2.example.com | [26ab 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [26ac 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [26ad 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [26ae 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [26af 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [26b0 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +peer1.org2.example.com | 00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA| +peer1.org2.example.com | [26b1 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b2 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b4 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b3 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +peer1.org2.example.com | 00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +peer1.org2.example.com | 00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +peer1.org2.example.com | 00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +peer1.org2.example.com | 00000040 2a 75 63 d1 1c 2e ca |*uc....| +peer1.org2.example.com | [26b6 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [26b7 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004d4a800, header channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer1.org2.example.com | [26b5 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24bd 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [24be 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [24bf 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24c0 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [24c1 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24c2 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24c3 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24c4 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24c5 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24c6 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24c7 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24c8 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 gate 1602702118308064300 evaluation starts +peer0.org2.example.com | [24c9 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24ca 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [24cb 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 principal matched by identity 0 +peer0.org2.example.com | [24cc 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [24cd 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [24ce 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24cf 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ebca0 gate 1602702118308064300 evaluation succeeds +peer0.org2.example.com | [24d0 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24d1 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24d2 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24d3 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24d4 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24d5 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24d6 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24d7 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24d8 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24d9 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24da 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24db 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 gate 1602702118326016200 evaluation starts +peer0.org2.example.com | [24dc 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24dd 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [24de 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 principal matched by identity 0 +peer0.org2.example.com | [24df 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [24e0 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [24e1 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24e2 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003258890 gate 1602702118326016200 evaluation succeeds +peer0.org2.example.com | [24e3 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24e4 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24e5 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24e6 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24e7 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24e8 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [24e9 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ea 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24eb 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ec 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ed 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24ee 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [24ef 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24f0 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24f1 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [24f2 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24f3 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24f4 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [24f5 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [24f6 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24f7 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b8 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [26b9 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [26ba 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [26bb 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [26bd 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [26be 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer1.org2.example.com | [26bf 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [26c1 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004d54000 +peer1.org2.example.com | [26c2 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [006fa5ff-6170-4ae0-931e-d57d2f7361c7] +peer1.org2.example.com | [26c0 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes +peer1.org2.example.com | [26bc 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [26c5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [006fa5ff-6170-4ae0-931e-d57d2f7361c7] +peer1.org2.example.com | [26c7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [26c8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [99a88e5c-c546-4fa5-b4f7-b98f6398fa1b] +peer1.org2.example.com | [26c9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [99a88e5c-c546-4fa5-b4f7-b98f6398fa1b] +peer1.org2.example.com | [26ca 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 gate 1602702117292355400 evaluation starts +peer1.org2.example.com | [26cb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26cc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [26cd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 principal matched by identity 0 +peer1.org2.example.com | [26ce 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 53 be 02 89 f0 4b 37 15 13 6b 2a a5 16 4a 08 |.S....K7..k*..J.| +peer1.org2.example.com | 00000010 04 f8 95 37 b7 bf f1 ab 1e 1a 22 93 92 07 32 29 |...7......"...2)| +peer1.org2.example.com | [26cf 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 d5 0c 55 55 c3 fd 5a a5 f2 b3 |0E.!....UU..Z...| +peer1.org2.example.com | 00000010 99 8e a5 12 7d ef c0 95 f3 db f0 7a 60 f5 58 ff |....}......z`.X.| +peer1.org2.example.com | 00000020 cb d1 69 c7 e5 02 20 1c 97 e9 43 81 3b b8 eb ca |..i... ...C.;...| +peer1.org2.example.com | 00000030 32 54 3c c1 64 76 39 8f 8a ed 8a 1b f5 45 b2 d0 |2T<.dv9......E..| +peer1.org2.example.com | 00000040 e7 4e 10 38 be 67 4d |.N.8.gM| +peer1.org2.example.com | [26d0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26d1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [26d2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 skipping identity 0 because it has already been used +peer1.org2.example.com | [26d3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 principal evaluation fails +peer1.org2.example.com | [26d4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5d260 gate 1602702117292355400 evaluation succeeds +peer1.org2.example.com | [26d5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d4bee215-7b29-425f-a730-672f97dcb40c] +peer1.org2.example.com | [26d6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d4bee215-7b29-425f-a730-672f97dcb40c] +peer1.org2.example.com | [26d7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [26d8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 appears to be valid +peer1.org2.example.com | [26d9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004d54000 +peer1.org2.example.com | [26da 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004a27900 env 0xc004c9fe00 txn 0 +peer1.org2.example.com | [26db 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [26dc 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 14ms +peer1.org2.example.com | [26dd 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [26de 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [26df 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [26e0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [26e1 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [26e2 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [26e3 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [26e4 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [26e5 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [26e6 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [26e7 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [26e8 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org2.example.com | [26e9 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [26ea 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [26eb 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [26ec 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] marked as valid by state validator +peer1.org2.example.com | [26ed 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004d808c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004d80900)} +peer1.org2.example.com | [26ee 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [26ef 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [26f0 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [26f1 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer1.org2.example.com | [26f2 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer1.org2.example.com | [26f3 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer1.org2.example.com | [26f4 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org2.example.com | [26f5 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +peer1.org2.example.com | txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +peer1.org2.example.com | ] +peer1.org2.example.com | [26f6 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to txid-index +peer1.org2.example.com | [26f7 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to blockNumTranNum index +peer1.org2.example.com | [26f8 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [26f9 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [26fa 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [26fb 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | [26fc 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [26fd 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [2408 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2409 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [240a 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [240b 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [240c 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [240d 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [240e 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 gate 1602702113919010000 evaluation starts +peer0.org1.example.com | [240f 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2410 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2411 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 principal matched by identity 0 +peer0.org1.example.com | [2412 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +peer0.org1.example.com | 00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +peer0.org1.example.com | [2413 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +peer0.org1.example.com | 00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +peer0.org1.example.com | 00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +peer0.org1.example.com | 00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +peer0.org1.example.com | 00000040 eb d2 9f b7 12 e7 8c |.......| +peer0.org1.example.com | [2414 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2415 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 gate 1602702113919010000 evaluation succeeds +peer0.org1.example.com | [2417 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2418 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2419 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [241a 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [241b 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +peer0.org1.example.com | 00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +peer0.org1.example.com | [241c 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +peer0.org1.example.com | 00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +peer0.org1.example.com | 00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +peer0.org1.example.com | 00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +peer0.org1.example.com | 00000040 eb ba a9 6a 67 2e 62 |...jg.b| +peer0.org1.example.com | [2416 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [241d 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [241e 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [241f 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2420 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2421 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2422 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2423 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2424 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2425 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2426 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2427 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2428 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2429 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [242a 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [242b 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242c 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242d 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242e 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242f 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2430 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2431 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2432 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [220c 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [220d 10-14 19:01:54.41 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [220e 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +peer1.org1.example.com | txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +peer1.org1.example.com | ] +peer1.org1.example.com | [220f 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to txid-index +peer1.org1.example.com | [2211 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2210 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to blockNumTranNum index +peer1.org1.example.com | [2212 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org1.example.com | [2213 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org1.example.com | [2214 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2215 10-14 19:01:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2216 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org1.example.com | [2217 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org1.example.com | [2218 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2219 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161029 +peer1.org1.example.com | [221a 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 83F932D0B66B5B822256FD3D25C3F82DEB349FCB2F5481614F07233783758708 +peer1.org1.example.com | [221b 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [221c 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [221d 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [221e 10-14 19:01:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org1.example.com | [221f 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org1.example.com | [2220 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2221 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2222 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2223 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2225 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2226 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2224 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2227 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2228 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org1.example.com | [2229 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [222a 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [222b 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [222e 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [222c 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [222f 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [222d 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2230 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2231 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2232 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2233 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2234 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2235 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2236 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2237 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2238 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 gate 1602702114462204400 evaluation starts +peer1.org1.example.com | [2239 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [223a 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [223b 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 principal matched by identity 0 +peer1.org1.example.com | [223c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org1.example.com | [223d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org1.example.com | [223e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [223f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003822d0 gate 1602702114462204400 evaluation succeeds +peer1.org1.example.com | [2240 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2241 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2242 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2243 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2244 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2245 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2246 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2247 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2248 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2249 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [224a 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [224b 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 gate 1602702114463966200 evaluation starts +peer1.org1.example.com | [224c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [224d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [224e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 principal matched by identity 0 +peer1.org1.example.com | [224f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org1.example.com | [2250 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org1.example.com | [2251 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2252 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382ee0 gate 1602702114463966200 evaluation succeeds +peer1.org1.example.com | [2253 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2254 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2255 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2256 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2257 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2258 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2259 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [225a 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [225b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [225c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [225d 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24f8 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24f9 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24fa 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24fb 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24fc 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24fd 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24fe 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 gate 1602702118375097300 evaluation starts +peer0.org2.example.com | [24ff 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2500 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2501 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 principal matched by identity 0 +peer0.org2.example.com | [2502 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [2503 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [2504 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2505 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003259b40 gate 1602702118375097300 evaluation succeeds +peer0.org2.example.com | [2506 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2507 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2508 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2509 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [250a 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [250b 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [250c 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" secret_envelope:\363\236\017\002 3O0e[\311\327~\241>\021\260\316\217\t\234*\234\367\332\331}\362\262q\221\253ER\252\nw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [250d 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" secret_envelope:\363\236\017\002 3O0e[\311\327~\241>\021\260\316\217\t\234*\234\367\332\331}\362\262q\221\253ER\252\nw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [250e 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [250f 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2510 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer0.org2.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer0.org2.example.com | [2511 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer0.org2.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer0.org2.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer0.org2.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer0.org2.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer0.org2.example.com | [2512 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2513 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [225e 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [225f 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2260 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2261 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2262 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2263 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2264 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 gate 1602702114480938900 evaluation starts +peer1.org1.example.com | [2265 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2266 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2267 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 principal matched by identity 0 +peer1.org1.example.com | [2268 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org1.example.com | [2269 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org1.example.com | [226a 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [226b 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003aa5d0 gate 1602702114480938900 evaluation succeeds +peer1.org1.example.com | [226c 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [226d 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [226e 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [226f 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2270 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2271 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2272 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2273 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2274 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2275 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2276 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer1.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer1.org1.example.com | [2277 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer1.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer1.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer1.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer1.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer1.org1.example.com | [2278 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [227b 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a b8 5f 7a f9 0f 2e 9f 45 48 5d 06 |0D. Z._z....EH].| +peer1.org1.example.com | 00000010 6a 4f 3e 63 22 4a 35 6b a1 87 47 7a 04 8c a7 60 |jO>c"J5k..Gz...`| +peer1.org1.example.com | 00000020 f6 bc 3c 5d 02 20 30 23 c6 10 05 bf 6e 72 c7 a6 |..<]. 0#....nr..| +peer1.org1.example.com | 00000030 93 42 f1 48 65 80 e8 d2 3a 2b ee 2c a0 e3 1f 6a |.B.He...:+.,...j| +peer1.org1.example.com | 00000040 4e 3b 3d f4 5c 2b |N;=.\+| +peer1.org1.example.com | [227c 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [227a 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [227d 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2283 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2279 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [227e 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [227f 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org1.example.com | [2280 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [2281 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [71f68f51-9eb9-45c9-a387-d16b5acf35a4] +peer1.org1.example.com | [2282 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2284 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [2285 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2286 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2287 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org1.example.com | [2288 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org1.example.com | [2289 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org1.example.com | [228a 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [228b 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [228c 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [228d 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org1.example.com | [228e 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org1.example.com | [228f 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2290 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2291 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2292 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2293 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2294 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org1.example.com | [2295 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2296 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2297 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2298 10-14 19:01:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2299 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [71f68f51-9eb9-45c9-a387-d16b5acf35a4] +peer1.org1.example.com | [229a 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [229b 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org1.example.com | [229d 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [229e 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0D0DF898CA1FC9E16...08031A0C0A0565787030321203312E30 +peer1.org1.example.com | [229f 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8AACD9D7E712F8BFB1F76D45BAC9BCB2BF75D2BEE9CD0F949ECC33017273FFBC +peer1.org1.example.com | [229c 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22a0 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org1.example.com | [2433 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2434 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2435 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2436 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2437 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2438 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2439 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [243a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [243b 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [243c 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [243d 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [243e 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [243f 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 gate 1602702114173540900 evaluation starts +peer0.org1.example.com | [2440 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2441 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2442 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 principal matched by identity 0 +peer0.org1.example.com | [2443 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer0.org1.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer0.org1.example.com | [2444 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer0.org1.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer0.org1.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer0.org1.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer0.org1.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer0.org1.example.com | [2445 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2446 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 gate 1602702114173540900 evaluation succeeds +peer0.org1.example.com | [2447 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2448 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2449 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [244a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22a1 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22a4 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22a5 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22a3 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [22a2 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 130ms (state_validation=20ms block_and_pvtdata_commit=41ms state_commit=52ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org1.example.com | [22a7 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22a6 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22a8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org1.example.com | [22a9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22aa 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22ab 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org1.example.com | [22ad 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ae 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22af 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22b0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ac 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22b1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 gate 1602702114529422100 evaluation starts +peer1.org1.example.com | [22b2 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22b3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [22b4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 principal matched by identity 0 +peer1.org1.example.com | [22b5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer1.org1.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer1.org1.example.com | [22b6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer1.org1.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer1.org1.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer1.org1.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer1.org1.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer1.org1.example.com | [22b7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22b8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003c7b50 gate 1602702114529422100 evaluation succeeds +peer1.org1.example.com | [22b9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22ba 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22bb 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22bc 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22bd 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22be 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22bf 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [22c0 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer1.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer1.org1.example.com | [22c1 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer1.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer1.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer1.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer1.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer1.org1.example.com | [22c2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22c3 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [22c4 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22c5 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [22c6 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer1.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org1.example.com | [22c7 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer1.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer1.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer1.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer1.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer1.org1.example.com | [22c8 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [22c9 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22ca 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22cb 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22cd 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22cc 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22ce 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22cf 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22d1 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22d2 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [22d3 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d0 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2514 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2515 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2516 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2517 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2518 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2519 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [251a 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 gate 1602702118409140400 evaluation starts +peer0.org2.example.com | [251b 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [251c 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [251d 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [251e 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 07 91 33 71 72 53 67 7e 88 74 ae |0D. B..3qrSg~.t.| +peer0.org2.example.com | 00000010 05 0f 50 db 1c bb 45 c9 52 36 ab 16 73 67 57 5a |..P...E.R6..sgWZ| +peer0.org2.example.com | 00000020 3e f3 9e 0f 02 20 33 4f 30 65 5b c9 d7 7e a1 3e |>.... 3O0e[..~.>| +peer0.org2.example.com | 00000030 11 b0 ce 8f 09 9c 2a 9c f7 da d9 7d f2 b2 71 91 |......*....}..q.| +peer0.org2.example.com | 00000040 ab 45 52 aa 0a 77 |.ER..w| +peer0.org2.example.com | [251f 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2521 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2522 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2523 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2524 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2525 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2526 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2527 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2520 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 principal matched by identity 0 +peer0.org2.example.com | [2528 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2529 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252a 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252b 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [252c 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\221\004c\343`Nhc\360\205" secret_envelope:\363\236\017\002 3O0e[\311\327~\241>\021\260\316\217\t\234*\234\367\332\331}\362\262q\221\253ER\252\nw" > > alive: +peer0.org2.example.com | [252d 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [252e 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [252f 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | [26fe 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [26ff 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [2700 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [2701 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [2702 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [2703 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [2704 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org2.example.com | [2705 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer1.org2.example.com | [2706 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org2.example.com | [2707 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org2.example.com | [2708 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org2.example.com | [2709 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer1.org2.example.com | [270a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 33ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=7ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org2.example.com | [270b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [270c 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [270d 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [270e 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [270f 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2710 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2711 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2712 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d4 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22d5 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22d6 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22d7 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22d8 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22d9 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22da 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1602702114559781800 evaluation starts +peer1.org1.example.com | [22db 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22dc 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [22dd 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal matched by identity 0 +peer1.org1.example.com | [22de 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org1.example.com | [22df 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org1.example.com | [22e0 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22e1 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e380 gate 1602702114559781800 evaluation succeeds +peer1.org1.example.com | [22e2 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22e3 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22e4 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22e5 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22e6 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22e7 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22e8 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22e9 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22ea 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22eb 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22ec 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22ed 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 gate 1602702114572933500 evaluation starts +peer1.org1.example.com | [22ee 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22ef 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [22f0 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 principal matched by identity 0 +peer1.org1.example.com | [22f1 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org1.example.com | [22f2 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org1.example.com | [22f3 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22f4 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb10 gate 1602702114572933500 evaluation succeeds +peer1.org1.example.com | [22f5 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22f6 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22f7 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22f8 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22f9 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22fa 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [22fb 10-14 19:01:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22fc 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22fd 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22fe 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22ff 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2300 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2301 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2302 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 gate 1602702114582824000 evaluation starts +peer1.org1.example.com | [2303 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2304 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2305 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 principal matched by identity 0 +peer1.org1.example.com | [2306 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org1.example.com | [2307 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org1.example.com | [2308 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2309 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [230a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [230b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [230c 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [230d 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [230e 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [230f 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2310 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2311 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2312 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2313 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000350eb0 gate 1602702114582824000 evaluation succeeds +peer1.org1.example.com | [2314 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2315 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2316 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2317 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2318 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2319 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [231a 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [231b 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [231c 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [231d 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [231e 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [231f 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2320 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2321 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2322 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2323 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2324 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2325 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2326 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 gate 1602702114626261400 evaluation starts +peer1.org1.example.com | [2327 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2328 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2329 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 principal matched by identity 0 +peer1.org1.example.com | [232a 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer1.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer1.org1.example.com | [232b 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer1.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer1.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer1.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer1.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer1.org1.example.com | [232c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [232d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae4f0 gate 1602702114626261400 evaluation succeeds +peer1.org1.example.com | [232e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [232f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2330 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2331 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2332 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2333 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2334 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2336 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2337 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2338 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2339 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [233a 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [233b 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [233c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [233d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [233e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [233f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 gate 1602702114638739400 evaluation starts +peer1.org1.example.com | [2340 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2341 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2342 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 principal matched by identity 0 +peer1.org1.example.com | [2343 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer1.org1.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer1.org1.example.com | [2344 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer1.org1.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer1.org1.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer1.org1.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer1.org1.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer1.org1.example.com | [2345 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2346 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00286b140 gate 1602702114638739400 evaluation succeeds +peer1.org1.example.com | [2347 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2348 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2349 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [234a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [234b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [234c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [234d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [234e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +peer1.org1.example.com | 00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +peer1.org1.example.com | [2335 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [234f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +peer1.org1.example.com | 00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +peer1.org1.example.com | 00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +peer1.org1.example.com | 00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +peer1.org1.example.com | 00000040 66 93 ac 3b d3 c5 65 |f..;..e| +peer1.org1.example.com | [2351 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2350 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2352 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2353 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2354 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2355 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer1.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer1.org1.example.com | [2356 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer1.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer1.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer1.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer1.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer1.org1.example.com | [2357 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2358 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2359 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [235a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [235c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [235d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [235f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2360 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2361 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2362 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [2530 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [2531 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2532 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003235070 gate 1602702118409140400 evaluation succeeds +peer0.org2.example.com | [2533 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2534 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2535 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2536 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2537 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2538 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2539 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [253a 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [253b 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [253c 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [253d 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [253e 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [253f 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2540 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2541 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2542 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2543 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2544 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2545 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2546 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2547 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2548 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2549 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [254a 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [254b 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [254c 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [254d 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 gate 1602702118493117700 evaluation starts +peer0.org2.example.com | [254e 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [254f 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2550 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 principal matched by identity 0 +peer0.org2.example.com | [2551 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer0.org2.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer0.org2.example.com | [2552 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer0.org2.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer0.org2.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer0.org2.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer0.org2.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer0.org2.example.com | [2553 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2554 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00314ee50 gate 1602702118493117700 evaluation succeeds +peer0.org2.example.com | [2555 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2556 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2557 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2558 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2559 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [255a 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [255b 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [255c 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [255d 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [255e 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [255f 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2560 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2561 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2562 10-14 19:01:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2563 10-14 19:01:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2564 10-14 19:01:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2565 10-14 19:01:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\221\004c\343`Nhc\360\205" > alive:\016\025FG]L\260\032\350{\313\275" > alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > alive: +peer0.org2.example.com | [2566 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2567 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2568 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2569 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [256a 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [256b 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [256c 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [256d 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [256e 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [256f 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2570 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2571 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2572 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2573 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2574 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2575 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2576 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2577 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2578 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2579 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E0CCCDAC8DA1FC9E16...08051A0C0A0565787030321203312E30 +peer0.org2.example.com | [257a 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E2EC3C3A235DBF1DADFD2DBE081AB5F93C3346CF65F14045FDEE2917C70D2BE +peer0.org2.example.com | [257b 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [257c 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [257d 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [257e 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [257f 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2580 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2581 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2582 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2583 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2584 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2585 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2586 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2587 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2588 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2589 10-14 19:01:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [258a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [258b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [258c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org2.example.com | [258d 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org2.example.com | [258e 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [258f 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [2590 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2591 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2592 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2593 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2594 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2595 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2596 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2597 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2598 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 gate 1602702118628144300 evaluation starts +peer0.org2.example.com | [2599 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [259a 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [259b 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 principal matched by identity 0 +peer0.org2.example.com | [259c 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [259d 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [259e 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [259f 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00311f6a0 gate 1602702118628144300 evaluation succeeds +peer0.org2.example.com | [25a0 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25a1 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25a2 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25a3 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25a4 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25a5 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [244b 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [244c 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [244d 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [244e 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [244f 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2450 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2451 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2452 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2453 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2454 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2455 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2456 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2457 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2458 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2459 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [245a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [245b 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [245c 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [245d 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [245e 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [245f 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2460 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2461 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2462 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2463 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2464 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2465 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2466 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2467 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2468 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2469 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [246a 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [246b 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [246c 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [246d 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [246e 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [246f 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2470 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2471 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2472 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2473 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2474 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2475 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2476 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 gate 1602702114290641600 evaluation starts +peer0.org1.example.com | [2477 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2478 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2479 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 principal matched by identity 0 +peer0.org1.example.com | [247a 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer0.org1.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer0.org1.example.com | [247b 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer0.org1.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer0.org1.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer0.org1.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer0.org1.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer0.org1.example.com | [247c 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [247d 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 gate 1602702114290641600 evaluation succeeds +peer0.org1.example.com | [247e 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [247f 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2480 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2481 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2482 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2483 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2484 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2485 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2486 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2487 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2488 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2489 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [248a 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [248b 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248c 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248d 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [248e 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [248f 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2490 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2491 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2492 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer0.org1.example.com | [2493 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2494 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2495 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2496 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2497 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2498 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2499 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer0.org1.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer0.org1.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org1.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [249a 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 gate 1602702114315053700 evaluation starts +peer0.org1.example.com | [249b 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [249c 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [249d 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [249e 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [249f 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [24a0 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 principal matched by identity 0 +peer0.org1.example.com | [24a1 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e b5 32 af 5e 84 e5 36 ba ad 2c 51 c4 da b0 12 |..2.^..6..,Q....| +peer0.org1.example.com | 00000010 9e a7 95 4d 2a a6 de e1 5e e2 b9 3c d2 20 ee 5a |...M*...^..<. .Z| +peer0.org1.example.com | [24a2 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be bc 12 60 e2 0c 7a 31 f7 af 5d |0E.!....`..z1..]| +peer0.org1.example.com | 00000010 82 07 30 67 60 95 9a fc 9f 21 a3 bb eb a0 a0 3e |..0g`....!.....>| +peer0.org1.example.com | 00000020 0f 42 3e 5f b2 02 20 3f 16 3f 15 df a6 99 23 6a |.B>_.. ?.?....#j| +peer0.org1.example.com | 00000030 11 ae 88 0c f8 22 a8 0a 07 db e5 39 6b 65 91 91 |.....".....9ke..| +peer0.org1.example.com | 00000040 22 aa 43 a5 19 a1 bb |".C....| +peer0.org1.example.com | [24a3 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24a4 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 gate 1602702114315053700 evaluation succeeds +peer0.org2.example.com | [25a6 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25a7 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25a8 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25a9 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25aa 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25ab 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25ac 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 gate 1602702118633378000 evaluation starts +peer0.org2.example.com | [25ad 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25ae 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [25af 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 principal matched by identity 0 +peer0.org2.example.com | [25b0 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [25b1 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [25b2 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25b3 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003100a30 gate 1602702118633378000 evaluation succeeds +peer0.org2.example.com | [25b4 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25b5 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25b6 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25b7 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25b8 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25b9 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [25ba 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25bb 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org2.example.com | [25bc 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org2.example.com | [25bd 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [25be 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [25bf 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25c0 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2363 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2365 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2364 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2366 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2367 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2368 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2369 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer1.org1.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer1.org1.example.com | [236a 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer1.org1.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer1.org1.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer1.org1.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer1.org1.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer1.org1.example.com | [236b 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [236c 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 58 2f 15 4b 4e 6d ad 13 c8 39 47 |0D. wX/.KNm...9G| +peer1.org1.example.com | 00000010 fa 07 77 7e b2 8d 03 84 08 21 bd 69 3f 61 fa dc |..w~.....!.i?a..| +peer1.org1.example.com | 00000020 58 89 db 25 02 20 51 5d 8a d6 e5 91 0a 60 f6 b1 |X..%. Q].....`..| +peer1.org1.example.com | 00000030 66 f7 d1 87 b0 eb 19 7e 80 ba 90 15 fc c5 a0 6c |f......~.......l| +peer1.org1.example.com | 00000040 10 5a e7 c5 9b 63 |.Z...c| +peer1.org1.example.com | [236d 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [236e 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [236f 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2370 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2371 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2372 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2373 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2374 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2375 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2376 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2377 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2378 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [237a 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > alive: +peer1.org1.example.com | [237b 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [237c 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2379 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [237d 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [237e 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [237f 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 gate 1602702114674632000 evaluation starts +peer1.org1.example.com | [2380 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2381 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2382 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 principal matched by identity 0 +peer1.org1.example.com | [2383 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer1.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer1.org1.example.com | [2384 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer1.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer1.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer1.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer1.org1.example.com | [2385 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2386 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002958d50 gate 1602702114674632000 evaluation succeeds +peer1.org1.example.com | [2387 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2388 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2389 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [238a 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [238b 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238c 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [238d 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [238e 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [238f 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2390 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2391 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2392 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2393 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2394 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2395 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 gate 1602702114682797800 evaluation starts +peer1.org1.example.com | [2396 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2397 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2398 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 principal matched by identity 0 +peer1.org1.example.com | [2399 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [239a 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [239b 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [239c 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8a0a0 gate 1602702114682797800 evaluation succeeds +peer1.org1.example.com | [239d 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [239e 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [239f 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23a0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23a1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a2 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a3 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23a4 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23a5 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23a6 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23a7 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24a5 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [24a6 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [24a7 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [24a8 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [24a9 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [24aa 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org1.example.com | [24ab 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ac 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [24ad 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [24ae 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24af 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24b4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org1.example.com | [24b5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org1.example.com | [24b6 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [24b7 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org1.example.com | [24b8 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org1.example.com | [24b9 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [24ba 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0037f5740 env 0xc00373f590 txn 0 +peer0.org1.example.com | [24bb 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00373f590 +peer0.org1.example.com | [24bc 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer0.org1.example.com | [24bd 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [24be 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [24bf 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [24c0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [24c1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [24c2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer0.org1.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer0.org1.example.com | [24c3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer0.org1.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer0.org1.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer0.org1.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer0.org1.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer0.org1.example.com | [24c4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [24c5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0025d6a80, header channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +peer0.org1.example.com | [24c6 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [24c7 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [24c8 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [24c9 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [24ca 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +peer0.org1.example.com | [24cb 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [24cc 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002644000 +peer0.org1.example.com | [24cd 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [2713 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2714 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2715 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2716 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2717 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2718 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2719 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 gate 1602702117912676400 evaluation starts +peer1.org2.example.com | [271a 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [271b 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [271c 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [271d 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 principal evaluation fails +peer1.org2.example.com | [271e 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7920 gate 1602702117912676400 evaluation fails +peer1.org2.example.com | [271f 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2720 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2721 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2722 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 gate 1602702117915860400 evaluation starts +peer1.org2.example.com | [2723 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2724 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2725 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 principal matched by identity 0 +peer1.org2.example.com | [2726 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org2.example.com | [2727 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org2.example.com | [2728 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2729 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7e90 gate 1602702117915860400 evaluation succeeds +peer1.org2.example.com | [272a 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [272b 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [272c 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [272d 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [272e 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [272f 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2730 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2731 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2732 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2733 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2734 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2735 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 gate 1602702117923943000 evaluation starts +peer1.org2.example.com | [2736 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2737 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2738 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2739 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 principal evaluation fails +peer1.org2.example.com | [273a 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8a80 gate 1602702117923943000 evaluation fails +peer1.org2.example.com | [273b 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [273c 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24ce 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [40302d83-fecd-42f6-aee8-7530d58272e8] +peer0.org1.example.com | [24cf 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [40302d83-fecd-42f6-aee8-7530d58272e8] +peer0.org1.example.com | [24d0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24d1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [24d2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 gate 1602702114326064900 evaluation starts +peer0.org1.example.com | [24d3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24d4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [24d5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [24d6 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [24d7 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [24d8 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal matched by identity 0 +peer0.org1.example.com | [24d9 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d d1 7e f9 cd 39 41 91 e7 fe c6 aa ba 0b f2 3a |..~..9A........:| +peer0.org1.example.com | 00000010 08 3a 12 12 e3 9c 57 c2 15 e1 d3 66 0f 7e c9 e5 |.:....W....f.~..| +peer0.org1.example.com | [24da 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 36 5a e6 6d d9 08 99 36 4e 84 |0E.!..6Z.m...6N.| +peer0.org1.example.com | 00000010 c6 2b 58 d9 54 14 05 aa fa 5d 60 52 7f 30 72 e8 |.+X.T....]`R.0r.| +peer0.org1.example.com | 00000020 45 e2 38 c2 7f 02 20 0f f9 a7 2d 5d db 9d bd 9f |E.8... ...-]....| +peer0.org1.example.com | 00000030 54 6d 2b 62 ab e9 bc d9 7d 77 6d 0f d2 66 07 4c |Tm+b....}wm..f.L| +peer0.org1.example.com | 00000040 83 4e 0a 0e d1 2c bd |.N...,.| +peer0.org1.example.com | [24db 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24dc 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [24dd 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 skipping identity 0 because it has already been used +peer0.org1.example.com | [24de 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal evaluation fails +peer0.org1.example.com | [24df 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 gate 1602702114326064900 evaluation succeeds +peer0.org1.example.com | [24e0 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org1.example.com | [24e1 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [24e2 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [24e3 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org1.example.com | [24e4 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org1.example.com | [24e5 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [95fe1049-8ce8-4eeb-a0c1-d4b2d23c5c95] +peer0.org1.example.com | [24e6 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [24e7 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [95fe1049-8ce8-4eeb-a0c1-d4b2d23c5c95] +peer0.org1.example.com | [24e8 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org1.example.com | [24e9 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f80ae88a-7899-43f9-b724-9ff90f70c787] +peer0.org1.example.com | [24ea 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [24eb 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f80ae88a-7899-43f9-b724-9ff90f70c787] +peer0.org1.example.com | [24ec 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 gate 1602702114341277900 evaluation starts +peer0.org1.example.com | [24ed 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24ee 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [24ef 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal matched by identity 0 +peer0.org1.example.com | [24f0 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +peer0.org1.example.com | 00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +peer0.org1.example.com | [24f1 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +peer0.org1.example.com | 00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +peer0.org1.example.com | 00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +peer0.org1.example.com | 00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +peer0.org1.example.com | 00000040 e0 6a d1 21 ea 79 |.j.!.y| +peer0.org1.example.com | [24f2 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25c1 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25c2 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25c3 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25c4 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25c5 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25c6 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25c7 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 gate 1602702118635811300 evaluation starts +peer0.org2.example.com | [25c8 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25c9 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [25ca 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 principal matched by identity 0 +peer0.org2.example.com | [25cb 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [25cc 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [25cd 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25ce 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ace60 gate 1602702118635811300 evaluation succeeds +peer0.org2.example.com | [25cf 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25d0 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25d1 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25d2 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25d3 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d4 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d5 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25d6 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25d7 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25d8 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25d9 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25da 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25db 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 gate 1602702118638786900 evaluation starts +peer0.org2.example.com | [25dc 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25dd 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [25de 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 principal matched by identity 0 +peer0.org2.example.com | [25df 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [25e0 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [25e1 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25e2 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00309e2b0 gate 1602702118638786900 evaluation succeeds +peer0.org2.example.com | [25e3 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25e4 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25e5 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25e6 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25e7 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25e8 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [25e9 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org2.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org2.example.com | [25ea 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org2.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org2.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org2.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org2.example.com | [25eb 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [25ec 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [25ed 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25ee 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25ef 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25f0 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25f1 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25f2 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25f3 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25f4 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25f5 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 gate 1602702118640948900 evaluation starts +peer0.org2.example.com | [25f6 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25f7 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [25f8 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 principal matched by identity 0 +peer0.org2.example.com | [25f9 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org1.example.com | [24f3 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [24f4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [24f5 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 skipping identity 0 because it has already been used +peer0.org1.example.com | [24f6 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal evaluation fails +peer0.org1.example.com | [24f7 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 gate 1602702114341277900 evaluation succeeds +peer0.org1.example.com | [24f8 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org1.example.com | [24f9 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 appears to be valid +peer0.org1.example.com | [24fa 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002644000 +peer0.org1.example.com | [24fb 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [24fc 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 26ms +peer0.org1.example.com | [24fd 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [24fe 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [24ff 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org1.example.com | [2500 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2501 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2502 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2503 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org1.example.com | [2504 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2505 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [2506 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2507 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org1.example.com | [2508 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] marked as valid by state validator +peer0.org1.example.com | [2509 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003857bc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003857c00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003857c40)} +peer0.org1.example.com | [250a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [250b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [250c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [250d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0036a13b0)}} +peer0.org1.example.com | [250e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org1.example.com | [250f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2510 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [2511 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [2512 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org1.example.com | [2513 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [2514 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org1.example.com | [2515 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [273d 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [273e 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 gate 1602702117928676000 evaluation starts +peer1.org2.example.com | [273f 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2740 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2741 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 principal matched by identity 0 +peer1.org2.example.com | [2742 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org2.example.com | [2743 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org2.example.com | [2744 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2745 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2746 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc8ff0 gate 1602702117928676000 evaluation succeeds +peer1.org2.example.com | [2747 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2748 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2749 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [274a 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [274b 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [274c 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [274d 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [274e 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [274f 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2751 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2752 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2753 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [2754 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2755 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [25fa 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [25fb 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25fc 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030725f0 gate 1602702118640948900 evaluation succeeds +peer0.org2.example.com | [25fd 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25fe 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25ff 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2600 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2601 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2602 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2603 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2604 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2605 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2606 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2607 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2608 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2609 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 gate 1602702118642131700 evaluation starts +peer0.org2.example.com | [260a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [260b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [260c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 principal matched by identity 0 +peer0.org2.example.com | [260d 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [260e 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [260f 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2610 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030737f0 gate 1602702118642131700 evaluation succeeds +peer0.org2.example.com | [2611 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2612 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2613 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2614 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2615 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2616 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2617 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2618 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2619 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [261a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [261b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [261c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [261d 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [261e 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [261f 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2620 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2621 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 gate 1602702118644710100 evaluation starts +peer0.org2.example.com | [2622 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2623 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2624 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 principal matched by identity 0 +peer0.org2.example.com | [2625 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer0.org2.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer0.org2.example.com | [2626 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer0.org2.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer0.org2.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer0.org2.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer0.org2.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer0.org2.example.com | [2627 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2628 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00301ef50 gate 1602702118644710100 evaluation succeeds +peer0.org2.example.com | [2629 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [262a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [262b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [262c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [262d 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [262e 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [262f 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2630 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2631 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2632 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2633 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2634 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2635 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2636 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2637 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2638 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2639 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [263a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\221\004c\343`Nhc\360\205" > alive:\016\025FG]L\260\032\350{\313\275" > alive: +peer0.org2.example.com | [263b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [263c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [263d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [263e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [263f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2640 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2641 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2642 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [2643 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cf 82 3d a4 a5 2e 96 49 f4 4f 7a 83 a5 54 17 13 |..=....I.Oz..T..| +peer0.org2.example.com | 00000010 05 77 97 d1 f8 fc 8f b8 75 cd cb 74 6e 4c b4 56 |.w......u..tnL.V| +peer0.org2.example.com | [2644 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 da de 4b e0 91 e7 e8 aa 4e 31 b6 |0D. ...K.....N1.| +peer1.org1.example.com | [23a8 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 gate 1602702114688952200 evaluation starts +peer1.org1.example.com | [23a9 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23aa 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [23ab 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 principal matched by identity 0 +peer1.org1.example.com | [23ac 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [23ad 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [23ae 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23af 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b8ac90 gate 1602702114688952200 evaluation succeeds +peer1.org1.example.com | [23b0 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23b1 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23b2 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23b3 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23b4 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23b5 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23b6 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23b7 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [23b8 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23b9 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ba 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [23bb 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bc 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [23bd 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [23be 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bf 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org1.example.com | [23c0 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org1.example.com | [2516 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 151 164 150 3 42 54 251 198 220 254 243 232 7 63 158 185 190 98 224 235 201 1 135 123 87 193 150 10 223 70 214 201 2 32 66 100 160 197 58 176 43 73 229 185 34 203 0 187 205 83 123 33 80 76 138 144 89 127 55 227 56 130 84 227 91 153]} 0x151b080}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002a6e480 0xc0029b6fc0 {{0 0} 0 0 0 0} {false}})]} +peer0.org1.example.com | [2517 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2518 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00000ec80})} +peer0.org1.example.com | [2519 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org1.example.com | [251a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org1.example.com | [251b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org1.example.com | [251c 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org1.example.com | [251d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [251e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [251f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2520 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2521 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +peer0.org1.example.com | txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +peer0.org1.example.com | ] +peer0.org1.example.com | [2522 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to txid-index +peer0.org1.example.com | [2523 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to blockNumTranNum index +peer0.org1.example.com | [2524 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0037f5740 env 0xc00373f590 txn 0 +peer0.org1.example.com | [2525 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org1.example.com | [2526 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | [2527 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | [2528 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org1.example.com | [2529 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [252a 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [252b 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [252c 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [252d 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | [252e 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [252f 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [2530 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2531 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [85ac9dbf-94e1-4c46-808c-5de8e7780001] +peer0.org1.example.com | [2532 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org1.example.com | [2533 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2534 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org1.example.com | [2535 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [85ac9dbf-94e1-4c46-808c-5de8e7780001] +peer0.org1.example.com | [2536 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org1.example.com | [2537 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2538 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08031A0C0A0565787030321203312E30 +peer0.org1.example.com | [2539 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5400EED54209D605C245A392EC8274B9A193FEF06106B6BD25A5751F6CF2AFE9 +peer0.org1.example.com | [253a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [253b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org1.example.com | [253c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org1.example.com | [253e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org2.example.com | 00000010 66 ad b8 da c4 53 db c7 3f dd 0d e8 c5 45 53 fa |f....S..?....ES.| +peer0.org2.example.com | 00000020 87 92 04 3a 02 20 6b 0f 35 b7 44 92 f8 af 26 da |...:. k.5.D...&.| +peer0.org2.example.com | 00000030 65 a5 5f 70 74 e2 86 ad de 6f b2 d4 9a 3f ad f8 |e._pt....o...?..| +peer0.org2.example.com | 00000040 70 b6 36 4d 4c 45 |p.6MLE| +peer0.org2.example.com | [2645 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2646 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2647 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2648 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2649 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [264a 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264b 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264c 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [264d 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264e 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264f 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2650 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2651 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2756 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2757 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2758 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2759 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2750 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [275a 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [275b 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [275c 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [275d 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [275e 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 gate 1602702117967941000 evaluation starts +peer1.org2.example.com | [275f 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2760 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2761 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2762 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 principal evaluation fails +peer1.org2.example.com | [2763 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de6470 gate 1602702117967941000 evaluation fails +peer1.org2.example.com | [2764 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2765 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2766 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2767 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 gate 1602702117973367200 evaluation starts +peer1.org2.example.com | [2768 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2769 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [276a 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 principal matched by identity 0 +peer1.org2.example.com | [276b 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org2.example.com | [276c 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org2.example.com | [276d 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [276e 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de69e0 gate 1602702117973367200 evaluation succeeds +peer1.org2.example.com | [276f 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2770 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2771 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2772 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2773 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2774 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2775 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2776 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org1.example.com | [23c1 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c2 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23c3 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [23c4 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c5 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23c6 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23c7 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23c8 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23c9 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23ca 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [23cb 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 gate 1602702114705308200 evaluation starts +peer1.org1.example.com | [23cc 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23cd 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [23ce 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 principal matched by identity 0 +peer1.org1.example.com | [23cf 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [23d0 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [23d1 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23d2 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc8880 gate 1602702114705308200 evaluation succeeds +peer1.org1.example.com | [23d3 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23d4 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23d5 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23d6 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23d7 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23d8 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [23d9 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23da 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23db 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23dc 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23dd 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23de 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23df 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [23e0 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 gate 1602702114717950200 evaluation starts +peer1.org1.example.com | [23e1 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23e2 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [23e3 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 principal matched by identity 0 +peer1.org1.example.com | [23e4 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [23e5 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [23e6 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [23e7 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bc9cb0 gate 1602702114717950200 evaluation succeeds +peer1.org1.example.com | [23e8 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23e9 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23ea 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23eb 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23ec 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23ed 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ee 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23ef 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23f0 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23f1 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23f2 10-14 19:01:54.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23f3 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [23f4 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23f5 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23f6 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23f7 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23f8 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23f9 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23fa 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [23fb 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 gate 1602702114938673800 evaluation starts +peer1.org1.example.com | [23fc 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23fd 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [23fe 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 principal matched by identity 0 +peer1.org1.example.com | [23ff 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [2400 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [2401 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2402 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bacf90 gate 1602702114938673800 evaluation succeeds +peer1.org1.example.com | [2403 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2404 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2405 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2406 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2407 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2408 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2409 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [240a 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [240b 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [240c 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [240d 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [240e 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 gate 1602702114962418500 evaluation starts +peer1.org1.example.com | [240f 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2410 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2411 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 principal matched by identity 0 +peer1.org1.example.com | [2412 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [2413 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [2414 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2415 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002badb80 gate 1602702114962418500 evaluation succeeds +peer1.org1.example.com | [2416 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2417 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2418 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2419 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [241a 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [241b 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [241c 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [241d 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [241e 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [241f 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2420 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [2421 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2422 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2423 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2424 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2425 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2426 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2427 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2428 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2429 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 gate 1602702114992949800 evaluation starts +peer1.org1.example.com | [242a 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [242b 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [242c 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 principal matched by identity 0 +peer1.org1.example.com | [242d 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [242e 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [242f 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2430 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c0b9c0 gate 1602702114992949800 evaluation succeeds +peer1.org1.example.com | [2431 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2432 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2433 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2434 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2435 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2436 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2437 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2438 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2439 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [243a 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [243b 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [243c 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [243d 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [253f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org1.example.com | [2540 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org1.example.com | [2541 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org1.example.com | [2542 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 31ms (state_validation=3ms block_and_pvtdata_commit=13ms state_commit=12ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org1.example.com | [2543 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | [2544 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2545 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2546 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [2547 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2548 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2549 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [254a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [254b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [254c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [254d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [254e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [254f 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2550 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2551 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2552 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2553 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2554 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2555 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2556 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2557 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2558 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2559 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [255a 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [255b 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [255c 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 gate 1602702114449462900 evaluation starts +peer0.org1.example.com | [255d 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [255e 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [255f 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 principal matched by identity 0 +peer0.org1.example.com | [2560 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org1.example.com | [2561 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org1.example.com | [2562 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2563 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 gate 1602702114449462900 evaluation succeeds +peer0.org1.example.com | [2564 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2565 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2566 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2567 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2568 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2569 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [256a 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [256b 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [256c 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [256d 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [256e 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [256f 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 gate 1602702114454021000 evaluation starts +peer0.org1.example.com | [2570 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2571 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2572 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 principal matched by identity 0 +peer0.org1.example.com | [2573 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org1.example.com | [2574 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org1.example.com | [2575 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2576 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 gate 1602702114454021000 evaluation succeeds +peer0.org1.example.com | [2577 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2578 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2579 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [257a 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [257b 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [257c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [257d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [257e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [257f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2580 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2582 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2583 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [2581 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer0.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer0.org1.example.com | [2584 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2585 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer0.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer0.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer0.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer0.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer0.org1.example.com | [2586 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2587 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a b8 5f 7a f9 0f 2e 9f 45 48 5d 06 |0D. Z._z....EH].| +peer0.org1.example.com | 00000010 6a 4f 3e 63 22 4a 35 6b a1 87 47 7a 04 8c a7 60 |jO>c"J5k..Gz...`| +peer0.org1.example.com | 00000020 f6 bc 3c 5d 02 20 30 23 c6 10 05 bf 6e 72 c7 a6 |..<]. 0#....nr..| +peer0.org1.example.com | 00000030 93 42 f1 48 65 80 e8 d2 3a 2b ee 2c a0 e3 1f 6a |.B.He...:+.,...j| +peer0.org1.example.com | 00000040 4e 3b 3d f4 5c 2b |N;=.\+| +peer1.org1.example.com | [243e 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2652 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org1.example.com | [2588 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2777 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [243f 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2440 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2589 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2441 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2442 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2443 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2653 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org2.example.com | [2654 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2655 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2656 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2657 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2658 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2659 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [265a 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [265b 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [265c 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [265d 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [265e 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [265f 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2660 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2661 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 gate 1602702118937320600 evaluation starts +peer0.org2.example.com | [2662 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2663 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2664 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [2665 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 principal evaluation fails +peer0.org2.example.com | [2666 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1850 gate 1602702118937320600 evaluation fails +peer0.org2.example.com | [2667 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2668 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2669 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [266a 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 gate 1602702118938974900 evaluation starts +peer0.org2.example.com | [266b 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [266c 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [266d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 principal matched by identity 0 +peer0.org2.example.com | [266e 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [266f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2670 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2671 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fe1dc0 gate 1602702118938974900 evaluation succeeds +peer0.org2.example.com | [2672 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2673 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2674 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2675 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2676 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2677 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2678 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2679 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [267a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [267b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2444 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 gate 1602702114994674500 evaluation starts +peer1.org1.example.com | [2445 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2446 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2447 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 principal matched by identity 0 +peer1.org1.example.com | [2448 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [2449 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [244a 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [244b 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6f0b0 gate 1602702114994674500 evaluation succeeds +peer1.org1.example.com | [244c 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [244d 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [244e 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [244f 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2450 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2451 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2452 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2453 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2454 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2455 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2456 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2457 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2458 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2459 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [245a 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [245b 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [245c 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [245d 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [245e 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 gate 1602702115149813400 evaluation starts +peer1.org1.example.com | [245f 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2460 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2461 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 principal matched by identity 0 +peer1.org1.example.com | [2462 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2463 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f fe 40 34 23 6b 56 0b d7 82 13 da 13 73 04 5b |..@4#kV......s.[| +peer1.org1.example.com | 00000010 73 c0 4b a0 d9 34 9e ed 48 4b a4 3a 28 3b 6b e7 |s.K..4..HK.:(;k.| +peer1.org1.example.com | [2464 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 84 99 32 35 5e c9 84 fe e6 e6 |0E.!....25^.....| +peer1.org1.example.com | 00000010 12 1d 85 81 a5 32 1e c2 9f 12 c0 10 25 b8 c5 ca |.....2......%...| +peer1.org1.example.com | 00000020 81 8f 78 ac 4e 02 20 5e ae 73 b6 3b 1d db 8d 6e |..x.N. ^.s.;...n| +peer1.org1.example.com | 00000030 37 c4 15 56 cb 5c 22 d2 77 ce ce 5a e5 78 97 e8 |7..V.\".w..Z.x..| +peer1.org1.example.com | 00000040 09 c4 dc 13 5f 7f aa |...._..| +peer1.org1.example.com | [2465 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2466 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ce1100 gate 1602702115149813400 evaluation succeeds +peer1.org1.example.com | [2467 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2468 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2469 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [246a 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [246b 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [246c 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [246d 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [246e 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [246f 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2470 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2471 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2472 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2473 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2475 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2476 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2477 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2478 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2474 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [247a 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [247c 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2479 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [247d 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [247b 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [247e 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [247f 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2481 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2482 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2480 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2483 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2485 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2484 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2486 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2487 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2488 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [258a 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [258c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [258d 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [258b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [258e 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [258f 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2590 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2591 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2592 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2593 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2594 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2595 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2596 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2597 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2598 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2599 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > alive: +peer0.org1.example.com | [259a 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [259b 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [259c 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [259d 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [259e 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [259f 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25a0 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25a1 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25a2 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25a3 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25a4 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 gate 1602702114506385600 evaluation starts +peer0.org1.example.com | [25a5 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25a6 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [25a7 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 principal matched by identity 0 +peer0.org1.example.com | [25a8 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org1.example.com | [25a9 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer1.org2.example.com | [2778 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2779 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [277a 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [277b 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [277c 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [277d 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 gate 1602702117983677400 evaluation starts +peer1.org2.example.com | [277e 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [277f 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2780 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2781 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 principal evaluation fails +peer1.org2.example.com | [2782 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de7d30 gate 1602702117983677400 evaluation fails +peer1.org2.example.com | [2783 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2784 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2785 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2786 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 gate 1602702117986179100 evaluation starts +peer1.org2.example.com | [2787 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2788 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2789 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 principal matched by identity 0 +peer1.org2.example.com | [278a 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org2.example.com | [278b 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org2.example.com | [278c 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [278d 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0e2a0 gate 1602702117986179100 evaluation succeeds +peer1.org2.example.com | [278e 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [278f 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2790 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2791 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2792 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2793 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2794 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2795 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2796 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2797 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2798 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [267c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [267d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [267e 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [267f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2680 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2681 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2682 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2683 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2684 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2685 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2686 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2687 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2688 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2689 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes +peer0.org2.example.com | [268a 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [268b 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [268c 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [268d 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [268e 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [268f 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 gate 1602702120112090800 evaluation starts +peer0.org2.example.com | [2690 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2691 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2692 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 principal matched by identity 0 +peer0.org2.example.com | [2693 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d6 14 1a 1d d6 a3 5b a8 f3 79 8f a1 18 f1 f8 |.......[..y.....| +peer0.org2.example.com | 00000010 fd e7 fb 1d 46 7d 26 5c 74 83 00 1d bc fe 31 a5 |....F}&\t.....1.| +peer0.org2.example.com | [2694 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 42 c2 51 32 6b 05 18 86 df 65 2c |0D. .B.Q2k....e,| +peer0.org2.example.com | 00000010 06 82 de 32 c2 91 9c 08 bf ae ca 0c b5 84 82 bf |...2............| +peer0.org2.example.com | 00000020 bc 69 b1 65 02 20 70 35 60 60 26 37 76 b1 37 cf |.i.e. p5``&7v.7.| +peer0.org2.example.com | 00000030 73 f2 6f f3 fe 9a 5a 41 76 e6 30 ee b0 9a 90 41 |s.o...ZAv.0....A| +peer0.org2.example.com | 00000040 4b c3 34 b5 f4 ff |K.4...| +peer0.org2.example.com | [2695 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2696 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f3cea0 gate 1602702120112090800 evaluation succeeds +peer0.org2.example.com | [2697 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2698 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2699 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [269a 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [269b 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [269c 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org2.example.com | [269d 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [269e 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [269f 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [26a0 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [26a1 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org2.example.com | [26a2 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org2.example.com | [26a3 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org2.example.com | [26a4 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org2.example.com | [26a5 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org2.example.com | [26a6 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [26a7 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004e6cec0 env 0xc0030f2be0 txn 0 +peer0.org2.example.com | [26a8 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0030f2be0 +peer0.org2.example.com | [26a9 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org2.example.com | [26aa 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [26ab 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [26ac 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [26ad 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ae 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | [2489 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [248a 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [248b 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [248c 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [248d 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [248e 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [248f 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2490 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2491 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2492 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2493 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 gate 1602702115243192600 evaluation starts +peer1.org1.example.com | [2494 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2495 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2496 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 principal matched by identity 0 +peer1.org1.example.com | [2497 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 1e 63 bd e5 53 ad 55 f2 a8 61 57 71 d6 b2 18 |q.c..S.U..aWq...| +peer1.org1.example.com | 00000010 a0 fa 08 14 7e 73 46 d2 98 f2 c5 8a a9 3a 47 4b |....~sF......:GK| +peer1.org1.example.com | [2498 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 9e 09 00 a1 a8 aa 64 2b de f1 13 |0D. .......d+...| +peer1.org1.example.com | 00000010 a3 cf f7 89 b5 f0 14 b4 ce bc f3 b5 8f 93 bf 85 |................| +peer1.org1.example.com | 00000020 30 ba 14 e1 02 20 54 f1 25 7b 41 c5 8d e1 82 25 |0.... T.%{A....%| +peer1.org1.example.com | 00000030 7c b1 90 ec ab b1 ac 71 c5 7d 34 3b a3 37 df 65 ||......q.}4;.7.e| +peer1.org1.example.com | 00000040 41 57 f5 5c 41 66 |AW.\Af| +peer1.org1.example.com | [2499 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [249a 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032312c0 gate 1602702115243192600 evaluation succeeds +peer1.org1.example.com | [249b 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [249c 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [249d 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [249e 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [249f 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a0 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [24a1 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [24a2 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org1.example.com | [25aa 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25ab 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 gate 1602702114506385600 evaluation succeeds +peer0.org1.example.com | [25ac 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ad 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ae 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25af 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25b0 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25b1 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [26af 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [26b0 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [26b1 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [26b2 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [26b3 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +peer0.org2.example.com | 00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.| +peer0.org2.example.com | [26b4 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +peer0.org2.example.com | 00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +peer0.org2.example.com | 00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +peer0.org2.example.com | 00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +peer0.org2.example.com | 00000040 5c 21 63 9f f2 |\!c..| +peer0.org2.example.com | [26b5 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [26b6 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002993800, header channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org2.example.com | [26b7 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [26b8 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [26b9 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [26ba 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [26bb 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org2.example.com | [26bc 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [26bd 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002f93000 +peer0.org2.example.com | [26be 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [72414378-a51a-4815-a5e1-42416c16ca09] +peer0.org2.example.com | [26bf 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [26c0 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [72414378-a51a-4815-a5e1-42416c16ca09] +peer0.org2.example.com | [26c1 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [26c2 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b0a7ecfe-428d-462d-9320-821d640bed45] +peer0.org2.example.com | [26c3 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [26c4 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161025 +peer0.org2.example.com | [26c5 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0717977E5C516FD3984F5307ECA7B2A5E58410DE43DC6B6B100EC7E4E6868E61 +peer1.org1.example.com | [24a3 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [24a4 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a5 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a6 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a7 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a8 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24a9 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24aa 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24ab 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ac 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ad 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ae 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24af 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b0 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b1 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b2 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24b3 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b4 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b5 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24b6 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24b7 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24b8 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24b9 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ba 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24bb 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24bc 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24bd 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24be 10-14 19:01:55.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24bf 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [24c0 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102A +peer1.org1.example.com | [24c1 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E93171C5EF6B703C9E71A1A916C4470EA6460C808A6B1CCECB9D46E43B176D76 +peer1.org1.example.com | [24c2 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [24c3 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [24c4 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [24c5 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [24c6 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c7 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24c8 10-14 19:01:55.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [24c9 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ca 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [24cb 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24cc 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24cd 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ce 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24cf 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d1 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d0 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d2 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d3 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d4 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d5 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d6 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [24d7 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +peer1.org1.example.com | 00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +peer1.org1.example.com | [24d8 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +peer1.org1.example.com | 00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +peer1.org1.example.com | 00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +peer1.org1.example.com | 00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +peer1.org1.example.com | 00000040 e6 82 cf 5e 48 73 |...^Hs| +peer1.org1.example.com | [24d9 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24da 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [24db 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [24dc 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [24dd 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [24de 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24df 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e0 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e1 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e2 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e3 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24e4 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24e5 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [24e6 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24e7 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24e8 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24e9 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25b2 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25b3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25b4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25b5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25b6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25b7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25b8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25b9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25ba 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 gate 1602702114521626100 evaluation starts +peer0.org1.example.com | [25bb 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25bc 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [25bd 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 principal matched by identity 0 +peer0.org1.example.com | [25be 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org1.example.com | [25bf 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org1.example.com | [25c0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25c1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 gate 1602702114521626100 evaluation succeeds +peer0.org1.example.com | [25c2 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25c3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25c4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25c5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25c6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25c7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25c8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25c9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25ca 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25cb 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25cc 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25cd 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 gate 1602702114526838100 evaluation starts +peer0.org1.example.com | [25ce 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25cf 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [25d0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 principal matched by identity 0 +peer0.org1.example.com | [25d1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org1.example.com | [25d2 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org1.example.com | [25d3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25d4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 gate 1602702114526838100 evaluation succeeds +peer0.org1.example.com | [25d5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25d6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25d7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25d8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25d9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25da 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25db 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25dc 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25dd 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25de 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25df 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25e0 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25e1 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25e2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25e3 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 gate 1602702114534497900 evaluation starts +peer0.org1.example.com | [25e4 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25e5 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [25e6 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 principal matched by identity 0 +peer0.org1.example.com | [25e7 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org1.example.com | [25e8 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org1.example.com | [25e9 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25ea 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 gate 1602702114534497900 evaluation succeeds +peer0.org1.example.com | [25eb 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ec 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ed 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25ee 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25ef 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25f0 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25f1 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [24ea 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24eb 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24ec 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ed 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24ee 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24ef 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24f0 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24f1 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f2 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24f3 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f4 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24f5 10-14 19:01:57.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24f6 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [24f7 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24f8 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [24f9 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 gate 1602702117277365300 evaluation starts +peer1.org1.example.com | [24fa 10-14 19:01:57.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24fb 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [24fc 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 principal matched by identity 0 +peer1.org1.example.com | [24fd 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 60 23 8e 2f 2e 9c c3 53 dd 80 25 c3 de f5 72 |<`#./...S..%...r| +peer1.org1.example.com | 00000010 0f ee 92 30 ff d1 2e ce ce 04 c9 a6 a3 2e 23 e6 |...0..........#.| +peer1.org1.example.com | [24fe 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 39 6a 65 ef 43 f6 6c 6b 65 a3 |0E.!..9je.C.lke.| +peer1.org1.example.com | 00000010 d6 ef e9 ce e7 05 37 d7 ba 32 82 33 e3 7e 20 81 |......7..2.3.~ .| +peer1.org1.example.com | 00000020 f1 98 1d 9b bb 02 20 1a 27 ee dc ac 66 f6 83 a0 |...... .'...f...| +peer1.org1.example.com | 00000030 24 f6 12 42 cb c8 ab a5 21 3c 83 09 6d 66 37 b4 |$..B....!<..mf7.| +peer1.org1.example.com | 00000040 3f 20 a7 51 d8 52 08 |? .Q.R.| +peer1.org1.example.com | [24ff 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2500 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fd50 gate 1602702117277365300 evaluation succeeds +peer1.org1.example.com | [2501 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2502 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2503 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2504 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2505 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2506 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2507 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org1.example.com | [2508 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2509 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org1.example.com | [250a 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer1.org1.example.com | [250b 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer1.org1.example.com | [250c 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [250d 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00273eec0 env 0xc0032974a0 txn 0 +peer1.org1.example.com | [250e 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0032974a0 +peer1.org1.example.com | [250f 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer1.org1.example.com | [2510 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2511 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [2512 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [2513 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [2514 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2515 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +peer1.org1.example.com | 00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA| +peer1.org1.example.com | [2516 10-14 19:01:57.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +peer1.org1.example.com | 00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +peer1.org1.example.com | 00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +peer1.org1.example.com | 00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +peer1.org1.example.com | 00000040 2a 75 63 d1 1c 2e ca |*uc....| +peer1.org1.example.com | [2517 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [2518 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc000106000, header channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer1.org1.example.com | [2519 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | [251a 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org1.example.com | [251b 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org1.example.com | [251c 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [251d 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer1.org1.example.com | [251e 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [251f 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc00281ac00 +peer1.org1.example.com | [2520 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1ee9b214-14da-4042-ac2f-b0d590c1aa0f] +peer1.org1.example.com | [2521 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2522 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1ee9b214-14da-4042-ac2f-b0d590c1aa0f] +peer1.org1.example.com | [2523 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [2524 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [07ff7801-83a7-452d-bfac-b2f942b2e1e2] +peer1.org1.example.com | [2526 10-14 19:01:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [2527 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer1.org1.example.com | [2525 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [07ff7801-83a7-452d-bfac-b2f942b2e1e2] +peer1.org1.example.com | [2528 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 gate 1602702117306025200 evaluation starts +peer1.org1.example.com | [2529 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [252a 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [252b 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org1.example.com | [252c 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [252d 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 principal matched by identity 0 +peer1.org1.example.com | [252e 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 53 be 02 89 f0 4b 37 15 13 6b 2a a5 16 4a 08 |.S....K7..k*..J.| +peer1.org1.example.com | 00000010 04 f8 95 37 b7 bf f1 ab 1e 1a 22 93 92 07 32 29 |...7......"...2)| +peer1.org1.example.com | [252f 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 d5 0c 55 55 c3 fd 5a a5 f2 b3 |0E.!....UU..Z...| +peer1.org1.example.com | 00000010 99 8e a5 12 7d ef c0 95 f3 db f0 7a 60 f5 58 ff |....}......z`.X.| +peer1.org1.example.com | 00000020 cb d1 69 c7 e5 02 20 1c 97 e9 43 81 3b b8 eb ca |..i... ...C.;...| +peer1.org1.example.com | 00000030 32 54 3c c1 64 76 39 8f 8a ed 8a 1b f5 45 b2 d0 |2T<.dv9......E..| +peer1.org1.example.com | 00000040 e7 4e 10 38 be 67 4d |.N.8.gM| +peer1.org1.example.com | [2530 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2531 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2532 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 skipping identity 0 because it has already been used +peer1.org1.example.com | [2533 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 principal evaluation fails +peer1.org1.example.com | [2534 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cfb20 gate 1602702117306025200 evaluation succeeds +peer1.org1.example.com | [2535 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [82769b3b-fa78-4ca6-94d6-c41e6d282002] +peer1.org1.example.com | [2536 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [82769b3b-fa78-4ca6-94d6-c41e6d282002] +peer1.org1.example.com | [2537 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [25f3 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25f2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25f5 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org1.example.com | [25f6 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org1.example.com | [25f7 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25f8 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [25f9 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25fb 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25fc 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25fd 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [25fe 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25ff 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25f4 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2600 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [25fa 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2601 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2602 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2603 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2604 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2605 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 gate 1602702114547000500 evaluation starts +peer0.org1.example.com | [2607 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2608 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2609 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [260a 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [260b 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [260c 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 principal evaluation fails +peer0.org1.example.com | [260d 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 gate 1602702114547000500 evaluation fails +peer0.org1.example.com | [260e 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [260f 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2610 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2611 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 gate 1602702114549577400 evaluation starts +peer0.org1.example.com | [2612 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2613 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2614 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 principal matched by identity 0 +peer0.org1.example.com | [2606 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2615 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org1.example.com | [2617 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org1.example.com | [2616 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2619 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [261a 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [261b 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2618 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [261c 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [261d 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [261e 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 gate 1602702114549577400 evaluation succeeds +peer0.org1.example.com | [261f 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2620 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2621 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26c6 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [26c7 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [26c8 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [26c9 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [26ca 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b0a7ecfe-428d-462d-9320-821d640bed45] +peer0.org2.example.com | [26cb 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 gate 1602702120119401400 evaluation starts +peer0.org2.example.com | [26cc 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26cd 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [26ce 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 principal matched by identity 0 +peer0.org2.example.com | [26cf 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 1b 98 bd 78 03 45 58 8d f8 dc 77 22 ff b6 d5 |....x.EX...w"...| +peer0.org2.example.com | 00000010 b5 cc e7 b3 b3 e7 84 2f b1 62 40 16 e5 4a c9 a1 |......./.b@..J..| +peer0.org2.example.com | [26d0 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 e6 f5 4a 44 f9 fd 23 6f 73 f2 db |0D. u..JD..#os..| +peer0.org2.example.com | 00000010 94 10 af 74 b7 7f 02 c5 28 78 73 aa 3b 4b 12 ab |...t....(xs.;K..| +peer0.org2.example.com | 00000020 8a 7a ed 79 02 20 6c 16 1d 7b 22 87 af a0 55 cd |.z.y. l..{"...U.| +peer0.org2.example.com | 00000030 a3 05 bf be 46 84 23 02 55 ec 84 b8 d3 8f d8 ab |....F.#.U.......| +peer0.org2.example.com | 00000040 a7 5a d0 a6 1e 51 |.Z...Q| +peer0.org2.example.com | [26d1 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26d2 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [26d3 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 skipping identity 0 because it has already been used +peer0.org2.example.com | [26d4 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 principal evaluation fails +peer0.org2.example.com | [26d5 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f35be0 gate 1602702120119401400 evaluation succeeds +peer0.org2.example.com | [26d6 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6f8d02a1-a088-403d-9bdb-d3326c72ae9c] +peer0.org2.example.com | [26d7 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6f8d02a1-a088-403d-9bdb-d3326c72ae9c] +peer0.org2.example.com | [26d8 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [26d9 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd appears to be valid +peer0.org2.example.com | [26da 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002f93000 +peer0.org2.example.com | [26db 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [26dc 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 8ms +peer0.org2.example.com | [26dd 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [26de 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [26df 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org2.example.com | [26e0 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [26e1 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [26e2 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [26e3 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [26e4 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [26e5 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [26e6 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [26e7 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [26e8 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [26e9 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [26ea 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [26eb 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [26ec 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] marked as valid by state validator +peer0.org2.example.com | [26ed 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00317fcc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00317fd00)} +peer0.org2.example.com | [26ee 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [26ef 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [26f0 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [26f1 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [26f2 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [26f3 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [26f4 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004e6cec0 env 0xc0030f2be0 txn 0 +peer0.org2.example.com | [26f5 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f6 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f7 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f8 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26f9 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26fa 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26fb 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org2.example.com | [26fc 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [26fd 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26fe 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [26ff 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2700 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2622 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2701 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2538 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 appears to be valid +peer0.org2.example.com | [2702 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2539 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc00281ac00 +peer0.org1.example.com | [2623 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2703 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2799 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [253a 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00273eec0 env 0xc0032974a0 txn 0 +peer0.org1.example.com | [2624 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2704 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [279a 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [253b 10-14 19:01:57.30 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2625 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2705 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [279b 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [253c 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2626 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2706 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [279c 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer1.org1.example.com | [253d 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2627 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2707 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +peer1.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer1.org1.example.com | [253e 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2628 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +peer1.org1.example.com | [253f 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2629 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [262a 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [262b 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [262c 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [262d 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [262e 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2540 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [262f 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | ] +peer1.org2.example.com | [279d 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer1.org1.example.com | [2541 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2630 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2708 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to txid-index +peer0.org2.example.com | [2709 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx number:[0] ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to blockNumTranNum index +peer0.org2.example.com | [270a 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97566], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org2.example.com | [270b 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org2.example.com | [270c 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | [270d 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org2.example.com | [270e 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [270f 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [2710 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [2711 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [2712 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [2713 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [2714 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [2715 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org2.example.com | [2716 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org2.example.com | [2717 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org2.example.com | [2718 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [2719 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org2.example.com | [271a 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org2.example.com | [271b 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org2.example.com | [271c 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 50ms (state_validation=3ms block_and_pvtdata_commit=38ms state_commit=6ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [271d 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer1.org1.example.com | [2542 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2543 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 18ms +peer1.org1.example.com | [2544 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes +peer1.org1.example.com | [2545 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2546 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [2547 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [2548 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org1.example.com | [2549 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [254a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [254b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [254c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org1.example.com | [254d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [254e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [254f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org1.example.com | [2550 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2551 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org1.example.com | [2552 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2553 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2554 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | [2555 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] marked as valid by state validator +peer1.org1.example.com | [2556 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0026de840), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0026de880)} +peer1.org1.example.com | [2557 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [2558 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [2559 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [255a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer1.org1.example.com | [255b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer1.org1.example.com | [255c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer1.org1.example.com | [255d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org1.example.com | [255e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +peer1.org1.example.com | txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +peer1.org1.example.com | ] +peer1.org1.example.com | [255f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to txid-index +peer1.org1.example.com | [2560 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to blockNumTranNum index +peer1.org1.example.com | [2561 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org1.example.com | [2562 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org1.example.com | [2563 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org1.example.com | [2564 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org1.example.com | [2565 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2566 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2567 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2568 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2569 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [256a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [256b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [256c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org1.example.com | [256d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org1.example.com | [256e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [256f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org1.example.com | [2570 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer1.org1.example.com | [2571 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer1.org1.example.com | [2572 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 13ms (state_validation=2ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org1.example.com | [2573 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org1.example.com | [2574 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org1.example.com | [2575 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2576 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2577 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2578 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2579 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [257a 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [257b 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [257c 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [257d 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [257e 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [257f 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2580 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2581 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2582 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2583 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 gate 1602702117910193000 evaluation starts +peer1.org1.example.com | [2584 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2585 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2586 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2587 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 principal evaluation fails +peer1.org1.example.com | [2588 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003466da0 gate 1602702117910193000 evaluation fails +peer1.org1.example.com | [2589 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [258a 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [258b 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [258c 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 gate 1602702117918248900 evaluation starts +peer1.org1.example.com | [258d 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [258e 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [258f 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 principal matched by identity 0 +peer1.org1.example.com | [2590 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [2591 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [2592 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2593 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467310 gate 1602702117918248900 evaluation succeeds +peer1.org1.example.com | [2594 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2595 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2596 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2597 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2598 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2599 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [259a 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [259b 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [259c 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [259d 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [259e 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [259f 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a0 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [25a1 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2631 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2632 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2633 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org1.example.com | [2634 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org1.example.com | [2635 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2636 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2637 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2638 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2639 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [263a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [263b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [263c 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [263d 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [263e 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [263f 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 gate 1602702114587283900 evaluation starts +peer0.org1.example.com | [2640 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2641 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2642 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 principal matched by identity 0 +peer0.org1.example.com | [2643 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +peer0.org1.example.com | 00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +peer0.org1.example.com | [2644 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +peer0.org1.example.com | 00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +peer0.org1.example.com | 00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +peer0.org1.example.com | 00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +peer0.org1.example.com | 00000040 9e a1 4c 06 fd 98 |..L...| +peer0.org1.example.com | [2645 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2646 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 gate 1602702114587283900 evaluation succeeds +peer0.org1.example.com | [2647 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2648 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2649 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [264a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [264b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [264c 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [264d 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [264e 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [264f 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2650 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2651 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2652 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2653 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161025 +peer0.org1.example.com | [2654 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5DA4B741ECB0BAEFF7A6D229504A085632B8666C70DBD4DFC5EF2FDE18870C18 +peer0.org1.example.com | [2655 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [271e 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [271f 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2720 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2721 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2722 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 ab f1 a0 52 a6 78 1e bf 8e ee 3b fa 45 6f c6 |3...R.x....;.Eo.| +peer0.org2.example.com | 00000010 18 b4 da 0e 58 92 52 5a c7 72 e0 a6 0c c9 40 bc |....X.RZ.r....@.| +peer0.org2.example.com | [2723 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 72 25 4a 02 f1 6c 9b a9 f8 26 06 |0D. jr%J..l...&.| +peer0.org2.example.com | 00000010 00 31 c9 e4 63 cd ce 5d f2 ea 51 54 95 33 b6 77 |.1..c..]..QT.3.w| +peer0.org2.example.com | 00000020 03 7b 95 ca 02 20 59 75 75 f8 14 b0 3a 2f 67 47 |.{... Yuu...:/gG| +peer0.org2.example.com | 00000030 38 7b b5 ea eb 10 c8 4d b6 f1 a7 69 e7 e4 ba 73 |8{.....M...i...s| +peer0.org2.example.com | 00000040 0e 00 dc b7 8b 09 |......| +peer0.org2.example.com | [2724 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2725 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2726 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2727 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2728 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2729 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [272a 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [272b 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [272c 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [272d 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [272e 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [272f 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2730 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2731 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2732 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2733 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2734 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2735 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2736 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2737 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2738 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2739 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [273a 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [273b 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [273c 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [273d 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [273e 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [273f 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2740 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2741 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2742 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2743 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2744 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2745 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2746 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2747 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2748 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2749 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 gate 1602702120416395400 evaluation starts +peer0.org2.example.com | [274a 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [274b 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [274c 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 principal matched by identity 0 +peer0.org2.example.com | [274d 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 38 52 e9 9f f8 2b d8 7a b8 1f 4d 59 e1 f4 32 |n8R...+.z..MY..2| +peer0.org2.example.com | 00000010 d8 55 e8 45 a4 80 b0 18 35 75 0d 0b 4b 24 ad a5 |.U.E....5u..K$..| +peer0.org2.example.com | [274e 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 e2 81 c9 2f 58 7b af cd ac 34 |0E.!...../X{...4| +peer0.org2.example.com | 00000010 c0 5f 75 d6 82 0b a4 bb 58 50 7d 21 bf c4 52 98 |._u.....XP}!..R.| +peer0.org2.example.com | 00000020 a2 dc 72 09 f6 02 20 26 6f 2b 4f 92 e5 22 c0 73 |..r... &o+O..".s| +peer0.org2.example.com | 00000030 5e b4 71 4e ad 21 e4 a5 d9 8e 2f ba f4 50 4a a9 |^.qN.!..../..PJ.| +peer0.org2.example.com | 00000040 49 10 40 1e 0d 48 77 |I.@..Hw| +peer0.org2.example.com | [274f 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2750 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e46df0 gate 1602702120416395400 evaluation succeeds +peer0.org2.example.com | [2751 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2752 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2753 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2754 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2755 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2756 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2757 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2758 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2759 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [275a 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [275b 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [275c 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [275d 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275e 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275f 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2760 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2761 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2762 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2763 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2764 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2765 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2766 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2767 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2768 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2769 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276a 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [276b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [276d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a2 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [25a3 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [25a4 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [25a5 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [25a6 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a7 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25a8 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [25a9 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [25aa 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [25ab 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ac 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer1.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer1.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer1.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer1.org2.example.com | [279e 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [27a0 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [279f 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 0a 31 22 7e e1 e0 ea bb f4 d6 d5 |0D. ].1"~.......| +peer1.org2.example.com | 00000010 ca 00 0c 72 e2 3e 42 b5 9a 49 17 08 4b 31 48 6a |...r.>B..I..K1Hj| +peer1.org2.example.com | 00000020 ad e5 24 64 02 20 05 40 16 85 81 cd 6b a4 01 d0 |..$d. .@....k...| +peer1.org2.example.com | 00000030 e4 9f 63 78 f0 e6 4f ee ce 81 78 c2 6b 74 1a b0 |..cx..O...x.kt..| +peer1.org2.example.com | 00000040 43 b7 ec 56 2b f7 |C..V+.| +peer1.org2.example.com | [27a1 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [27a2 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [27a3 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [27a4 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [27a5 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [27a6 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a7 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a9 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [27aa 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ab 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27ac 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27ad 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:B\265\232I\027\010K1Hj\255\345$d\002 \005@\026\205\201\315k\244\001\320\344\237cx\360\346O\356\316\201x\302kt\032\260C\267\354V+\367" > > alive: +peer1.org2.example.com | [27ae 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [27af 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a8 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27b0 10-14 19:01:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [27b1 10-14 19:01:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27b2 10-14 19:01:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2656 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2657 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2658 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2659 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [265a 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [265b 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [265c 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [265d 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [265e 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [265f 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2660 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2661 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2662 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2663 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2664 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2665 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2666 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2667 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [276f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2770 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2771 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2772 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2773 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2774 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2775 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2776 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2777 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ad 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [25ae 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [25af 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [25b0 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [25b1 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25b2 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [25b3 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [25b4 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [25b5 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25b6 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25b7 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25b8 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25b9 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ba 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25bb 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [25bc 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25bd 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [25be 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [25bf 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25c0 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [25c1 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [25c2 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25c3 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [25c4 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25c5 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [25c6 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [25c7 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [25c8 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [25c9 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 gate 1602702118167079200 evaluation starts +peer1.org1.example.com | [25ca 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25cb 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [25cc 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 principal matched by identity 0 +peer1.org1.example.com | [25cd 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer1.org1.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer1.org1.example.com | [25ce 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer1.org1.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer1.org1.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer1.org1.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer1.org1.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer1.org1.example.com | [25cf 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25d0 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a4540 gate 1602702118167079200 evaluation succeeds +peer1.org1.example.com | [25d1 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25d2 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [25d3 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [25d4 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [25d5 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [25d6 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [25d7 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [25d8 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [25d9 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [25da 10-14 19:01:58.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25db 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25dc 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25dd 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [25de 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25df 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25e0 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25e1 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [25e2 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e4 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25e3 10-14 19:01:58.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > alive: alive: alive: +peer1.org1.example.com | [25e5 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b3 10-14 19:01:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27b4 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [27b5 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27b6 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [27b7 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b8 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27b9 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27ba 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27bb 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27bc 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27bd 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27be 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27bf 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c0 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c1 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c2 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c3 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27c4 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [27c5 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c6 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [27c7 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c8 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c9 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ca 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [27cb 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [27cc 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161024 +peer1.org2.example.com | [27cd 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DF35965BF9C7E4097526DA86D5641939C45200A9E2102F62358CFE0F1EE4A208 +peer1.org2.example.com | [27ce 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [27cf 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2778 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2779 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [277a 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [277b 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [277c 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [277d 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [277e 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 gate 1602702120594128400 evaluation starts +peer0.org2.example.com | [277f 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2780 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2781 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 principal matched by identity 0 +peer0.org2.example.com | [2782 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 0b d0 83 d9 74 00 30 5d a2 da 77 13 c2 0d fb |M....t.0]..w....| +peer0.org2.example.com | 00000010 8f 10 65 de 19 a1 ed 42 2b d0 af c4 24 39 cb ef |..e....B+...$9..| +peer0.org2.example.com | [2783 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 22 08 68 7f 7b 2d 80 52 b8 19 05 |0D. .".h.{-.R...| +peer0.org2.example.com | 00000010 3e ff 87 c5 83 38 5e 60 cd 77 29 e1 c3 72 47 c8 |>....8^`.w)..rG.| +peer0.org2.example.com | 00000020 52 78 da 6c 02 20 7e e8 e8 6a c5 39 5d 2b 36 27 |Rx.l. ~..j.9]+6'| +peer0.org2.example.com | 00000030 a2 90 c4 50 d3 0b 6c 52 0f 48 fb 12 30 00 aa 4d |...P..lR.H..0..M| +peer0.org2.example.com | 00000040 16 f2 bb 7e 39 8d |...~9.| +peer0.org2.example.com | [2784 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2785 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a130f0 gate 1602702120594128400 evaluation succeeds +peer0.org2.example.com | [2786 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2787 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2788 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2789 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [278a 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [278b 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [278c 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [278d 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [278e 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [278f 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2790 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2791 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2792 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2793 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2794 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2795 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2796 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2797 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2798 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2799 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [279a 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [279b 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [279c 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [279d 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [279e 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [279f 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27a0 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a1 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27a2 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a3 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27a4 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a5 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27a6 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a7 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27a8 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [27a9 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27aa 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ab 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27ac 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ad 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [27ae 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27af 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27b0 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27b1 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27b2 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27b3 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27b4 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27b5 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 gate 1602702121901287500 evaluation starts +peer0.org2.example.com | [27b6 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27b7 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [27b8 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 principal matched by identity 0 +peer0.org2.example.com | [27b9 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [27ba 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [27bb 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27bc 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee1d20 gate 1602702121901287500 evaluation succeeds +peer0.org2.example.com | [27bd 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27be 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27bf 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27c0 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27c1 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c2 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c3 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27c4 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27c5 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27c6 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27c7 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27c8 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 gate 1602702121902395600 evaluation starts +peer0.org2.example.com | [27c9 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27ca 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [27cb 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 principal matched by identity 0 +peer0.org2.example.com | [27cc 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [27cd 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [27ce 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25e6 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [25e7 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25e8 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25e9 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ea 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25eb 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ec 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ed 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [25f0 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25ef 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [25f1 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0D0DF898CA1FC9E16...08051A0C0A0565787030321203312E30 +peer1.org1.example.com | [25f2 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEBD12A6E63D73B50ABEE7479E98BA81C5E7C893C51FC30E1FF2C0079FFC9449 +peer1.org1.example.com | [25ee 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f3 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25f4 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [25f5 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25f6 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25f8 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25f9 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25f7 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [25fa 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [25fb 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25fc 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25fd 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org1.example.com | [25fe 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25ff 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2600 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2601 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2602 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2603 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2605 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2604 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [2606 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [2607 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org1.example.com | [2608 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org1.example.com | [2609 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [260a 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27d0 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [27d1 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" secret_envelope:\363\236\017\002 3O0e[\311\327~\241>\021\260\316\217\t\234*\234\367\332\331}\362\262q\221\253ER\252\nw" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27d2 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27d3 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27d5 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27d6 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27d7 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [27d8 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27d9 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" secret_envelope:\363\236\017\002 3O0e[\311\327~\241>\021\260\316\217\t\234*\234\367\332\331}\362\262q\221\253ER\252\nw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [27da 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27db 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [27dc 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27d4 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27dd 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [27de 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27cf 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f8910 gate 1602702121902395600 evaluation succeeds +peer0.org2.example.com | [27d0 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27d1 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27d2 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27d3 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27d4 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27d5 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27d6 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27d7 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [27d8 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27d9 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27da 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [27db 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27dc 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [27dd 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [260b 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [260c 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [260d 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [260e 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [260f 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2610 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2612 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 gate 1602702118263134600 evaluation starts +peer1.org1.example.com | [2611 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2613 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2614 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2615 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 principal matched by identity 0 +peer1.org1.example.com | [2616 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [2617 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [2618 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2619 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fef10 gate 1602702118263134600 evaluation succeeds +peer1.org1.example.com | [261a 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [261b 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [261c 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [261d 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [261e 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [261f 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2620 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2621 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2622 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2623 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2624 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2625 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2626 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 gate 1602702118285981300 evaluation starts +peer1.org1.example.com | [2627 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2628 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2629 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 principal matched by identity 0 +peer1.org1.example.com | [262a 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [262b 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [262c 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [262d 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003512110 gate 1602702118285981300 evaluation succeeds +peer1.org1.example.com | [262e 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [262f 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2630 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2631 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2632 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [2633 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [2634 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2635 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [27de 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [27df 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e0 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27e1 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27e2 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27e3 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27e4 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27e5 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27e6 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 gate 1602702121921013300 evaluation starts +peer0.org2.example.com | [27e7 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27e8 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [27e9 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 principal matched by identity 0 +peer0.org2.example.com | [27ea 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [27eb 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [27ec 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [27ed 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a09c10 gate 1602702121921013300 evaluation succeeds +peer0.org2.example.com | [27ee 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27ef 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [27f0 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [27f1 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [27f2 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27f3 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [27f4 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27f5 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27f6 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27f7 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27f8 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [27f9 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [27fa 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [27fb 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 gate 1602702121924863200 evaluation starts +peer0.org2.example.com | [27fc 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [27fd 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [27fe 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 principal matched by identity 0 +peer0.org2.example.com | [27ff 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2800 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2801 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2802 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00299c2f0 gate 1602702121924863200 evaluation succeeds +peer0.org2.example.com | [2803 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2804 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2805 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2806 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2807 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2808 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2809 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [280a 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [280b 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [280c 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [280d 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [280e 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [280f 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2810 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2811 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2812 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2813 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2814 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2815 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2816 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2817 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2818 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2819 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [281a 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [281b 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [281c 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [281d 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [281e 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [281f 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161026 +peer0.org2.example.com | [2820 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F49738374BD8BCE88A1CAA8A9E5106724A87540737D1762771ABEE69F19170FD +peer0.org2.example.com | [2821 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2822 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2636 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2637 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org1.example.com | [2638 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org1.example.com | [2639 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [263a 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [263b 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [263c 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [263d 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [263e 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [263f 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2640 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2641 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 gate 1602702118330617700 evaluation starts +peer1.org1.example.com | [2642 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2643 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2644 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 principal matched by identity 0 +peer1.org1.example.com | [2645 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [2646 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [2647 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2648 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f0d50 gate 1602702118330617700 evaluation succeeds +peer1.org1.example.com | [2649 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [264a 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [264b 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [264c 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [264d 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [264e 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [264f 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2650 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2651 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2652 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2653 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2654 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2655 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 gate 1602702118334441900 evaluation starts +peer1.org1.example.com | [2656 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2657 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2658 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 principal matched by identity 0 +peer1.org1.example.com | [2659 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [265a 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [265b 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [265c 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [265d 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [265e 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100C1801 +peer1.org1.example.com | [265f 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC13A671BF6A3ED4D09E7D361CC2570DF86D24C1BF3446E7506A47935810358D +peer0.org2.example.com | [2823 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2824 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2825 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2826 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2827 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2828 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2829 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [282a 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [282b 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [282c 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [282d 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [282e 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [282f 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2830 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2831 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2832 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2833 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org2.example.com | [2834 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org2.example.com | [2835 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2836 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2837 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2839 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2838 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [283a 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [283b 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [283c 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [283d 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org2.example.com | [283e 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org2.example.com | [283f 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2840 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 43 b4 b5 36 65 d3 da 65 e6 bb |0E.!..C..6e..e..| +peer0.org2.example.com | 00000010 3b 61 a3 c8 03 b7 c4 9e 65 98 e7 d9 72 8f 9d 51 |;a......e...r..Q| +peer0.org2.example.com | 00000020 fc ec 9e 22 0c 02 20 56 df 26 91 1d bf 5f f1 3b |...".. V.&..._.;| +peer0.org2.example.com | 00000030 18 ff 19 bb 59 d5 5a a5 e5 22 b7 1e 1c 19 19 d6 |....Y.Z.."......| +peer0.org2.example.com | 00000040 c6 66 b9 32 08 a5 6c |.f.2..l| +peer0.org2.example.com | [2841 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2842 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2843 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2844 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2845 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2846 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2847 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2848 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2849 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer1.org2.example.com | [27df 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27e0 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27e1 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [27e2 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [27e3 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [27e4 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 gate 1602702118321495000 evaluation starts +peer1.org2.example.com | [27e5 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27e6 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [27e7 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [27e8 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 principal evaluation fails +peer1.org2.example.com | [27e9 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e37fb0 gate 1602702118321495000 evaluation fails +peer1.org2.example.com | [27ea 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27eb 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27ec 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [27ed 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 gate 1602702118340631800 evaluation starts +peer1.org2.example.com | [27ee 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27ef 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [27f0 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 principal matched by identity 0 +peer1.org2.example.com | [27f1 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [27f2 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [27f3 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [27f4 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e78520 gate 1602702118340631800 evaluation succeeds +peer1.org2.example.com | [27f5 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27f6 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27f7 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [27f8 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [27f9 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27fa 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27fb 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27fc 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27fd 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [27fe 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [27ff 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2800 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 gate 1602702118353023200 evaluation starts +peer1.org2.example.com | [2801 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2802 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2803 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2804 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 principal evaluation fails +peer1.org2.example.com | [2805 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79110 gate 1602702118353023200 evaluation fails +peer1.org2.example.com | [2806 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2807 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2808 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2809 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 gate 1602702118360763300 evaluation starts +peer1.org2.example.com | [280a 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [280b 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [280c 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 principal matched by identity 0 +peer1.org2.example.com | [280d 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [280e 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [280f 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [284a 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org2.example.com | [284b 10-14 19:02:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [284c 10-14 19:02:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [284d 10-14 19:02:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [284e 10-14 19:02:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [284f 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2850 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2851 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2852 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2853 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2854 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2855 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2856 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2857 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2858 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2859 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [285a 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [285b 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [285c 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [285d 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [285e 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [285f 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2860 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 gate 1602702122270839000 evaluation starts +peer0.org2.example.com | [2861 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2862 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2863 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 principal matched by identity 0 +peer0.org2.example.com | [2864 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [2660 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2661 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1f70 gate 1602702118334441900 evaluation succeeds +peer1.org1.example.com | [2662 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2663 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [2664 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2665 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2666 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2667 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [2668 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [2669 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266a 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [266b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [266c 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266d 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [266e 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [266f 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2670 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2671 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2672 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2673 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2674 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2675 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2676 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2677 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2678 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2679 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [267a 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2810 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e79680 gate 1602702118360763300 evaluation succeeds +peer1.org2.example.com | [2811 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2812 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2813 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2814 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2816 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2817 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2818 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2815 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2819 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [281b 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [281a 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [281c 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [281d 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [281e 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [281f 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2820 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2821 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2822 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2823 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [2824 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2825 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2865 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2866 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2867 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002950b20 gate 1602702122270839000 evaluation succeeds +peer0.org2.example.com | [2868 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2869 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [286a 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [286b 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [286c 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [286d 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [286e 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [286f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2870 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2871 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2872 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2873 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 gate 1602702122284405500 evaluation starts +peer0.org2.example.com | [2874 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2875 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2876 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 principal matched by identity 0 +peer0.org2.example.com | [2877 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2878 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2879 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [287a 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951710 gate 1602702122284405500 evaluation succeeds +peer0.org2.example.com | [287b 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [287c 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [287d 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [287e 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [287f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2880 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2881 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2882 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2883 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2668 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2669 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [266a 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [266b 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [266c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [266d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [266e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [266f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2670 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2671 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2672 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2673 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 gate 1602702114635922000 evaluation starts +peer0.org1.example.com | [2674 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2675 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2676 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 principal matched by identity 0 +peer0.org1.example.com | [2677 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +peer0.org1.example.com | 00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +peer0.org1.example.com | [2678 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +peer0.org1.example.com | 00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +peer0.org1.example.com | 00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +peer0.org1.example.com | 00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +peer0.org1.example.com | 00000040 af 5e ad 10 29 18 |.^..).| +peer0.org1.example.com | [2679 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [267a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [267b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 gate 1602702114635922000 evaluation succeeds +peer0.org1.example.com | [267c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [267d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [267e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [267f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2680 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2681 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [267b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [267c 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [267d 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [267e 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 gate 1602702118342998800 evaluation starts +peer1.org1.example.com | [267f 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2680 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2681 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 principal matched by identity 0 +peer1.org1.example.com | [2682 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer1.org1.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer1.org1.example.com | [2683 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer1.org1.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer1.org1.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer1.org1.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org1.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer1.org1.example.com | [2684 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2685 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003539c20 gate 1602702118342998800 evaluation succeeds +peer1.org1.example.com | [2686 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2687 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2688 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2689 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [268a 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [268b 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [268c 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [268d 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [268e 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [268f 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2690 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2691 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2692 10-14 19:01:58.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2693 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2694 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2695 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2696 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2697 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > alive: alive:\221\004c\343`Nhc\360\205" > alive: +peer1.org1.example.com | [2698 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2699 10-14 19:01:58.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [269a 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269b 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269d 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [269e 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [269f 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [26a0 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269c 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [26a1 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a2 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a3 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a4 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a6 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26a5 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26a7 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26a8 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26a9 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26aa 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26ab 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26ac 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 gate 1602702118378199200 evaluation starts +peer1.org1.example.com | [26ad 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26ae 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [26af 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 principal matched by identity 0 +peer1.org1.example.com | [26b0 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [26b1 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [26b2 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26b3 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036856d0 gate 1602702118378199200 evaluation succeeds +peer1.org1.example.com | [26b4 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26b5 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26b6 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26b7 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26b8 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26b9 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2682 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2683 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2684 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2685 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2686 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2687 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2688 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2689 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [268a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 gate 1602702114641801600 evaluation starts +peer0.org1.example.com | [268b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [268c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [268d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 principal matched by identity 0 +peer0.org1.example.com | [268e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org1.example.com | [268f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org1.example.com | [2690 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2691 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 gate 1602702114641801600 evaluation succeeds +peer0.org1.example.com | [2692 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2693 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2694 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2695 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2696 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2697 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2698 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2699 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [269a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [269b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [269c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [269d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 gate 1602702114642491200 evaluation starts +peer0.org1.example.com | [269e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [269f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [26a0 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 principal matched by identity 0 +peer0.org1.example.com | [26a1 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org1.example.com | [26a2 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | [2884 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2885 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2886 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2887 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2888 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 gate 1602702122295407800 evaluation starts +peer0.org2.example.com | [2889 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [288a 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [288b 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 principal matched by identity 0 +peer0.org2.example.com | [288c 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [288d 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [288e 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [288f 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2890 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2891 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c09c0 gate 1602702122295407800 evaluation succeeds +peer0.org2.example.com | [2892 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2893 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2894 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2895 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2896 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2897 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2898 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2899 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [289a 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [289b 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [289c 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [289d 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [289e 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [289f 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [28a0 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28a1 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [28a2 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [28a3 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer0.org2.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer0.org2.example.com | [28a4 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer0.org2.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer0.org2.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer0.org2.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer0.org2.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer0.org2.example.com | [28a5 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [28a6 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 20 f3 ec ef bd d6 ed 20 8e 4a |0E.!.. ...... .J| +peer0.org2.example.com | 00000010 f7 28 0e 30 43 c3 7a 13 ac ad 9f 68 f3 d5 6c 7b |.(.0C.z....h..l{| +peer0.org2.example.com | 00000020 e0 73 6c d5 81 02 20 11 3a ab 6a bc 46 93 d4 30 |.sl... .:.j.F..0| +peer0.org2.example.com | 00000030 ed 7d 82 c0 7c c7 62 de a4 1f 2f 72 9f c2 19 cf |.}..|.b.../r....| +peer0.org2.example.com | 00000040 be 22 93 5e 44 5e 97 |.".^D^.| +peer0.org2.example.com | [28a7 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [28a8 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [28a9 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28aa 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28ab 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28ac 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28ad 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28ae 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28af 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28b0 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 gate 1602702122329256300 evaluation starts +peer0.org2.example.com | [28b1 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28b2 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [28b3 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 principal matched by identity 0 +peer0.org2.example.com | [28b4 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [28b5 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [28b6 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28b7 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c1f80 gate 1602702122329256300 evaluation succeeds +peer0.org2.example.com | [28b8 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28b9 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28ba 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28bb 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28bc 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28bd 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [28be 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [28bf 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [28c0 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [28c1 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c2 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c3 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c4 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [28c5 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c6 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c7 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [28c8 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [28c9 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [28ca 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28cb 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28cc 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28cd 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28ce 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28cf 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28d0 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28d1 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28d2 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28d3 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [28d4 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28d5 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [28d6 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28d7 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [28d8 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [28d9 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28da 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28db 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28dc 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28dd 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28de 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28df 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28e0 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 gate 1602702122496421400 evaluation starts +peer0.org2.example.com | [28e1 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28e2 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [28e3 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 principal matched by identity 0 +peer0.org2.example.com | [28e4 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer0.org2.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer0.org2.example.com | [28e5 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer0.org2.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer0.org2.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer0.org2.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer0.org2.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer0.org2.example.com | [28e6 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28e7 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027fb480 gate 1602702122496421400 evaluation succeeds +peer0.org2.example.com | [28e8 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28e9 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28ea 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28eb 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28ec 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [28ed 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [28ee 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [28ef 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [28f0 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [28f1 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28f2 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28f3 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28f4 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [28f5 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28f6 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26ba 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26bb 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26bc 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26bd 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26be 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26bf 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26c0 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 gate 1602702118383398400 evaluation starts +peer1.org1.example.com | [26c1 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26c2 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [26c3 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 principal matched by identity 0 +peer1.org1.example.com | [26c5 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [26c6 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [26c4 10-14 19:01:58.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [26c7 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c8 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26c9 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28d0 gate 1602702118383398400 evaluation succeeds +peer1.org1.example.com | [26cb 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26ca 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org1.example.com | [26cc 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26cd 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26ce 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26cf 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org1.example.com | [26d0 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer1.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [26d1 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [26d2 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26d3 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [26d4 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26d5 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [26d6 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26d7 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [26d8 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26d9 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org1.example.com | [26da 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | [28f7 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28f8 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [28f9 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > alive: alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > alive: +peer0.org2.example.com | [28fa 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [28fb 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28fc 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28fd 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [28fe 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28ff 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2900 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2901 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2902 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2903 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2904 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2905 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2906 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2907 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2908 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2909 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [290a 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [290b 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [290c 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [290d 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [290e 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [290f 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2910 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E0CCCDAC8DA1FC9E16...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [2911 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D8BCD29F9C6043C249A49C55C6C52A910F868F36FC8797FA5F221E4BA7CDC425 +peer0.org2.example.com | [2912 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2913 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2914 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2915 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2916 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2917 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2918 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2919 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [291a 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [291b 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [291c 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [291d 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [291e 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [291f 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [2920 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2921 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org2.example.com | [2922 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org2.example.com | [2923 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org2.example.com | [2924 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2925 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | [2826 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2827 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2828 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2829 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [282b 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 gate 1602702118387405800 evaluation starts +peer1.org2.example.com | [282c 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [282a 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [282d 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [282f 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2830 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 principal evaluation fails +peer1.org2.example.com | [2831 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e98b60 gate 1602702118387405800 evaluation fails +peer1.org2.example.com | [2832 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2833 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [282e 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2834 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2835 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 gate 1602702118393452000 evaluation starts +peer1.org2.example.com | [2836 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2837 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2838 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 principal matched by identity 0 +peer1.org2.example.com | [2839 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [283a 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [283b 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [283c 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e2dd00 gate 1602702118393452000 evaluation succeeds +peer1.org2.example.com | [283d 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [283e 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [283f 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2840 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2841 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2842 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2843 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2844 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2845 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2846 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer1.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer1.org2.example.com | [2847 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer1.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer1.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer1.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer1.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer1.org2.example.com | [2848 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2849 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [284a 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [284b 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer1.org2.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer1.org2.example.com | [284d 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer1.org2.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer1.org2.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer1.org2.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org2.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer1.org2.example.com | [284e 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [284f 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2850 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2851 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [284c 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2852 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2853 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2854 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2855 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2856 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2857 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2858 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2859 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [285a 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [285b 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [285c 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 gate 1602702118408836200 evaluation starts +peer1.org2.example.com | [285d 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [285e 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org1.example.com | [26a3 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [26a4 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 gate 1602702114642491200 evaluation succeeds +peer0.org1.example.com | [26a5 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26a6 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26a7 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [26a8 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [26a9 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26aa 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ab 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ac 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [26ad 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ae 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [26b0 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26af 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [26b2 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26b1 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26b3 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [26b4 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [26b5 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26b6 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [26b7 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [26b8 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26b9 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org1.example.com | [26db 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26dc 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [26dd 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [26df 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26e0 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [26de 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org1.example.com | [26e1 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26e2 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org1.example.com | [26e3 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26e4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26e5 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26e6 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org1.example.com | [26e7 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer1.org1.example.com | [26e8 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26e9 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ea 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26eb 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ec 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ed 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ee 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ef 10-14 19:01:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26f0 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [26f1 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102B +peer1.org1.example.com | [26f2 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 503AA0BC408CEA42C3CDCAA4A550958738AE680704BFF7DDB7182E3E9EAEE273 +peer1.org1.example.com | [26f3 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [26f4 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2926 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2927 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2928 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2929 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [292a 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [292b 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [292c 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [292d 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [292e 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 gate 1602702122635416500 evaluation starts +peer0.org2.example.com | [292f 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2930 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2931 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 principal matched by identity 0 +peer0.org2.example.com | [2932 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2933 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2934 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2935 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c080 gate 1602702122635416500 evaluation succeeds +peer0.org2.example.com | [2936 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2937 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2938 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2939 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [293a 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [293b 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [293c 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [293d 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [293e 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [293f 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2940 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2941 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2942 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 gate 1602702122642212600 evaluation starts +peer0.org2.example.com | [2943 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2944 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2945 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 principal matched by identity 0 +peer0.org2.example.com | [2946 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2947 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2948 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2949 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268d280 gate 1602702122642212600 evaluation succeeds +peer0.org2.example.com | [294a 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [294b 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [294c 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [294d 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [294e 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [294f 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2950 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org1.example.com | [26f5 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [26f6 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26f7 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26f8 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26f9 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26fa 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26fb 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [26fc 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26fd 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [26fe 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ff 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2700 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2701 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2702 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2703 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2704 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2705 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2706 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer1.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer1.org1.example.com | [2707 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer1.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer1.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer1.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer1.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer1.org1.example.com | [2708 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [285f 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2860 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 principal evaluation fails +peer1.org2.example.com | [2861 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8e40 gate 1602702118408836200 evaluation fails +peer1.org2.example.com | [2862 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2863 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2864 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2865 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2866 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2867 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer1.org2.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer1.org2.example.com | [2868 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer1.org2.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer1.org2.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer1.org2.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer1.org2.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer1.org2.example.com | [2869 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [286a 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [286b 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [286c 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer1.org2.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer1.org2.example.com | [286d 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer1.org2.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer1.org2.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer1.org2.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org2.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer1.org2.example.com | [286e 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [286f 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2870 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2871 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2872 10-14 19:01:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2873 10-14 19:01:58.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 gate 1602702118409800800 evaluation starts +peer1.org2.example.com | [2874 10-14 19:01:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2875 10-14 19:01:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2876 10-14 19:01:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 principal matched by identity 0 +peer1.org2.example.com | [2877 10-14 19:01:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [2878 10-14 19:01:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [2879 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [287a 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec93b0 gate 1602702118409800800 evaluation succeeds +peer1.org2.example.com | [287b 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [287c 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [287d 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [287e 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [287f 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2880 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2881 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2883 10-14 19:01:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2884 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2885 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2886 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2887 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2882 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2888 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2889 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288a 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288b 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [288c 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [288d 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [288e 10-14 19:01:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [288f 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer1.org2.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer1.org2.example.com | [2890 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer1.org2.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer1.org2.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer1.org2.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org2.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer0.org2.example.com | [2951 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2952 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2953 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2954 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2955 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2956 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2957 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2958 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2959 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [295a 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [295b 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [295c 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 gate 1602702122674116800 evaluation starts +peer0.org2.example.com | [295d 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [295e 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [295f 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 principal matched by identity 0 +peer0.org2.example.com | [2960 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2961 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2962 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2963 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002685460 gate 1602702122674116800 evaluation succeeds +peer0.org2.example.com | [2964 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2965 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2966 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2967 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2968 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2969 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [296a 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [296b 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [296c 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [296d 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [296e 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [296f 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2970 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 gate 1602702122679789000 evaluation starts +peer0.org2.example.com | [2971 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2972 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2973 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 principal matched by identity 0 +peer0.org2.example.com | [2974 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2975 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2976 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2977 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266e660 gate 1602702122679789000 evaluation succeeds +peer0.org2.example.com | [2978 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2979 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [297a 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [297b 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [297c 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297d 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [297e 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [297f 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2980 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2981 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2982 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2983 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2984 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2985 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2986 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2987 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 gate 1602702122682360100 evaluation starts +peer0.org2.example.com | [2988 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2989 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [298a 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 principal matched by identity 0 +peer0.org2.example.com | [298b 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer0.org2.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer0.org2.example.com | [298c 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer0.org2.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer0.org2.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer0.org2.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer0.org2.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer0.org2.example.com | [298d 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [298e 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264ead0 gate 1602702122682360100 evaluation succeeds +peer0.org2.example.com | [298f 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2990 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2991 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2992 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2993 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2994 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2995 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2996 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2997 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2998 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2999 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [299a 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [299b 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [299c 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299d 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299e 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [299f 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [29a0 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > alive: alive: +peer0.org2.example.com | [29a1 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a2 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a3 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a4 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [29a5 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a6 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a7 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [29a8 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29a9 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29aa 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [29ab 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [29ac 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29ad 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29ae 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [29af 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [29b0 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [29b1 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | [2891 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2892 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 07 91 33 71 72 53 67 7e 88 74 ae |0D. B..3qrSg~.t.| +peer1.org2.example.com | 00000010 05 0f 50 db 1c bb 45 c9 52 36 ab 16 73 67 57 5a |..P...E.R6..sgWZ| +peer1.org2.example.com | 00000020 3e f3 9e 0f 02 20 33 4f 30 65 5b c9 d7 7e a1 3e |>.... 3O0e[..~.>| +peer1.org2.example.com | 00000030 11 b0 ce 8f 09 9c 2a 9c f7 da d9 7d f2 b2 71 91 |......*....}..q.| +peer1.org2.example.com | 00000040 ab 45 52 aa 0a 77 |.ER..w| +peer1.org2.example.com | [2893 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2894 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2895 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2896 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2897 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2898 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2899 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [289a 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [289b 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [289c 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [289d 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [289e 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [289f 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28a0 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28a1 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28a2 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28a3 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 gate 1602702118543128000 evaluation starts +peer1.org2.example.com | [28a4 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28a5 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [28a6 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [26ba 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26bb 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26bc 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [26bd 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [26be 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [26bf 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 gate 1602702114668202100 evaluation starts +peer0.org1.example.com | [26c0 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [26c1 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [26c2 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 principal matched by identity 0 +peer0.org1.example.com | [26c3 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +peer0.org1.example.com | 00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +peer0.org1.example.com | [26c4 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +peer0.org1.example.com | 00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +peer0.org1.example.com | 00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +peer0.org1.example.com | 00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +peer0.org1.example.com | 00000040 4c 39 e8 8a eb 22 |L9..."| +peer0.org1.example.com | [26c5 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [26c7 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 gate 1602702114668202100 evaluation succeeds +peer0.org1.example.com | [26c8 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26c9 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26c6 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [26ca 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [26cb 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [26cc 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26cd 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26ce 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [26cf 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer0.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer0.org1.example.com | [26d0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer0.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer0.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer0.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer0.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer0.org1.example.com | [26d1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26d2 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26d3 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [26d4 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer0.org1.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer0.org1.example.com | [26d5 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer0.org1.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer0.org1.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer0.org1.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer0.org1.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer0.org1.example.com | [26d6 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26d7 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26d8 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26d9 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26da 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [26db 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26dc 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [26dd 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer0.org1.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer0.org1.example.com | [26de 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer0.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [29b2 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29b3 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29b4 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29b5 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29b6 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29b7 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29b8 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29b9 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29ba 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 gate 1602702122712993300 evaluation starts +peer0.org2.example.com | [29bb 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29bc 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [29bd 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 principal matched by identity 0 +peer0.org2.example.com | [29be 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [29bf 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [29c0 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29c1 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002612c20 gate 1602702122712993300 evaluation succeeds +peer0.org2.example.com | [29c2 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29c3 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29c4 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29c5 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29c6 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29c7 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29c8 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [29c9 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29ca 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29cb 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29cc 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29cd 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29ce 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 gate 1602702122734681600 evaluation starts +peer0.org2.example.com | [29cf 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29d0 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [29d1 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 principal matched by identity 0 +peer0.org2.example.com | [29d2 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [29d3 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [29d4 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29d5 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002613f40 gate 1602702122734681600 evaluation succeeds +peer0.org2.example.com | [29d6 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29d7 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29d8 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29d9 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29da 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29db 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [29dc 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [29dd 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29de 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [29df 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29e0 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29e1 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29e2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [29e3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [29e4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [29e5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29e6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29e7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29e8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29e9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29ea 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 gate 1602702122933072600 evaluation starts +peer0.org2.example.com | [29eb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29ec 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [29ed 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [29ee 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 principal evaluation fails +peer0.org2.example.com | [29ef 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d58f0 gate 1602702122933072600 evaluation fails +peer0.org2.example.com | [29f0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29f1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29f2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29f3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 gate 1602702122933858000 evaluation starts +peer0.org2.example.com | [29f4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29f5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [29f6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 principal matched by identity 0 +peer0.org2.example.com | [29f7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [29f8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [29f9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29fa 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025d5e60 gate 1602702122933858000 evaluation succeeds +peer0.org2.example.com | [29fb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29fc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29fd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29fe 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29ff 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a00 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a01 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a02 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2a03 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a04 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a05 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a06 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a07 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a08 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a09 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a0a 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [2a0b 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [2a0c 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a0d 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0e 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a0f 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [2a10 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [2a11 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a12 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a13 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a14 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a15 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2a16 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a17 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2a18 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2a19 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [2a1a 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a1b 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 38 65 3d 0e a8 12 de ab 98 4e 4c 7f a3 7c 5e c4 |8e=......NL..|^.| +peer0.org2.example.com | 00000010 60 af 1d 96 a1 f7 fc b8 70 52 d6 3c 18 25 ef 93 |`.......pR.<.%..| +peer0.org2.example.com | [2a1c 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 00 56 9c 9f 67 db d9 22 22 35 34 |0D. ..V..g..""54| +peer0.org2.example.com | 00000010 68 f8 14 3a 6a 91 d0 e6 96 ee 22 ce bc e1 5b b0 |h..:j....."...[.| +peer0.org2.example.com | 00000020 f1 1e 69 40 02 20 61 bc 8d 56 7f e2 c4 d0 53 5d |..i@. a..V....S]| +peer0.org2.example.com | 00000030 cb 0a 76 42 06 61 d5 6c 6e 9c ad 78 08 1a 7d 62 |..vB.a.ln..x..}b| +peer0.org2.example.com | 00000040 ef 31 15 d7 1c b2 |.1....| +peer0.org2.example.com | [2a1d 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a1e 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a1f 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a20 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2a21 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2a22 10-14 19:02:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [2a23 10-14 19:02:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a24 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161027 +peer0.org2.example.com | [2a25 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6E6B369B712F1B657A2BF4D6386B23DC46A88A9EA4864519F431FF2067931FB5 +peer0.org2.example.com | [2a26 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2a27 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2a28 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2a29 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [28a7 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 principal evaluation fails +peer1.org2.example.com | [28a8 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8b40 gate 1602702118543128000 evaluation fails +peer1.org2.example.com | [28a9 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28aa 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28ab 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28ac 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 gate 1602702118546540800 evaluation starts +peer1.org2.example.com | [28ad 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28ae 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [28af 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 principal matched by identity 0 +peer1.org2.example.com | [28b0 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer1.org2.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer1.org2.example.com | [28b1 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer1.org2.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer1.org2.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer1.org2.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer1.org2.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer1.org2.example.com | [28b2 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28b3 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec90c0 gate 1602702118546540800 evaluation succeeds +peer1.org2.example.com | [28b4 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28b5 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28b6 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28b7 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28b8 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [28b9 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [28ba 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [28bb 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [28bc 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [28bd 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28be 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28bf 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28c0 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [28c1 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c2 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c3 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c4 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [28c5 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > alive:\016\025FG]L\260\032\350{\313\275" > alive: +peer1.org2.example.com | [28c6 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [28c7 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28c8 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer0.org1.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer0.org1.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer0.org1.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer0.org1.example.com | [26df 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [26e0 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 58 2f 15 4b 4e 6d ad 13 c8 39 47 |0D. wX/.KNm...9G| +peer0.org1.example.com | 00000010 fa 07 77 7e b2 8d 03 84 08 21 bd 69 3f 61 fa dc |..w~.....!.i?a..| +peer0.org1.example.com | 00000020 58 89 db 25 02 20 51 5d 8a d6 e5 91 0a 60 f6 b1 |X..%. Q].....`..| +peer0.org1.example.com | 00000030 66 f7 d1 87 b0 eb 19 7e 80 ba 90 15 fc c5 a0 6c |f......~.......l| +peer0.org1.example.com | 00000040 10 5a e7 c5 9b 63 |.Z...c| +peer0.org1.example.com | [26e1 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [26e2 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e3 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [26e4 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26e5 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26e6 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [26e7 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [26e8 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [26e9 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [26ea 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [26ec 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26eb 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 gate 1602702114698214200 evaluation starts +peer0.org1.example.com | [26ed 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [26ee 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [26ef 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 principal matched by identity 0 +peer0.org1.example.com | [26f0 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org1.example.com | [26f1 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org1.example.com | [26f2 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [26f3 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 gate 1602702114698214200 evaluation succeeds +peer0.org1.example.com | [26f4 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26f5 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [26f6 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a2a 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a2b 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a2c 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2a2d 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a2e 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2a2f 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a30 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2a31 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a32 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a33 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a34 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2a35 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a36 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a37 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a38 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a39 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a3a 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2a3b 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 6b 36 9b 71 2f 1b 65 7a 2b f4 d6 38 6b 23 dc |nk6.q/.ez+..8k#.| +peer0.org2.example.com | 00000010 46 a8 8a 9e a4 86 45 19 f4 31 ff 20 67 93 1f b5 |F.....E..1. g...| +peer0.org2.example.com | [2a3c 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e ae 66 be f3 57 67 41 9f dc |0E.!..n.f..WgA..| +peer0.org2.example.com | 00000010 db 1e 45 ea 52 e6 03 4c 95 81 b9 f4 9c b5 e5 78 |..E.R..L.......x| +peer0.org2.example.com | 00000020 b1 c8 8c a5 82 02 20 7c 38 52 21 70 4b 1b aa 76 |...... |8R!pK..v| +peer0.org2.example.com | 00000030 70 98 64 6b e6 4a 2b e5 1b 35 6d bc 68 ab 50 e0 |p.dk.J+..5m.h.P.| +peer0.org2.example.com | 00000040 63 8c 10 5b 2e ac aa |c..[...| +peer0.org2.example.com | [2a3d 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a3e 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a3f 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2a40 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a41 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2a42 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2a43 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 1d 94 e2 48 42 c2 93 2c df 23 85 5e d7 83 03 |....HB..,.#.^...| +peer0.org2.example.com | 00000010 ac b7 05 c8 b6 46 0d d2 75 70 31 72 2d a8 2e 4e |.....F..up1r-..N| +peer0.org2.example.com | [2a44 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 42 f8 aa e1 63 7f d3 62 e1 a2 |0E.!..B...c..b..| +peer0.org2.example.com | 00000010 6d 3b 0c 6d 74 33 cc 8d a9 6a dd 8d f3 cf be 39 |m;.mt3...j.....9| +peer0.org2.example.com | 00000020 29 ea 13 6a cb 02 20 7b 32 eb 95 30 bc 09 72 d1 |)..j.. {2..0..r.| +peer0.org2.example.com | 00000030 2e e5 0d 3c fa 39 33 12 b2 8c 41 47 13 8f 52 c3 |...<.93...AG..R.| +peer0.org2.example.com | 00000040 72 f5 d9 a6 fa f4 d5 |r......| +peer0.org2.example.com | [2a45 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [28c9 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [28ca 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28cb 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28cc 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28cd 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ce 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28cf 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d0 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [28d1 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28d2 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [28d3 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [28d4 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [28d5 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d6 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28d7 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28d8 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [28d9 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [28da 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org2.example.com | [28db 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28dc 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28dd 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28de 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28df 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28e0 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 gate 1602702118601109500 evaluation starts +peer1.org2.example.com | [28e1 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28e2 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [28e3 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 principal matched by identity 0 +peer1.org2.example.com | [28e4 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [28e5 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org2.example.com | [28e6 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28e7 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ad490 gate 1602702118601109500 evaluation succeeds +peer1.org2.example.com | [28e8 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28e9 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28ea 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28eb 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28ec 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28ed 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ee 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ef 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [28f0 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26f7 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [26f8 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f9 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26fa 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [26fb 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [26fc 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26fd 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [26fe 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26ff 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2700 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2701 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2702 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2703 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 gate 1602702114716922200 evaluation starts +peer0.org1.example.com | [2704 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2705 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2706 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 principal matched by identity 0 +peer0.org1.example.com | [2707 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org1.example.com | [2708 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org1.example.com | [2709 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [270a 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 gate 1602702114716922200 evaluation succeeds +peer0.org1.example.com | [270b 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [270c 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [270d 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [270e 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [270f 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2710 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2711 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2712 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2713 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a46 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 f8 5e ea a6 b1 1f a5 3d bb 23 7a |0D. ..^.....=.#z| +peer0.org2.example.com | 00000010 76 1b ed 17 58 48 e0 2a 70 2b 75 a7 e1 62 ed 81 |v...XH.*p+u..b..| +peer0.org2.example.com | 00000020 a1 c7 5b db 02 20 57 99 91 b2 21 8f 02 10 49 7b |..[.. W...!...I{| +peer0.org2.example.com | 00000030 01 65 89 fb b4 cc 9c 85 34 b5 f2 0d 0e 71 1e 48 |.e......4....q.H| +peer0.org2.example.com | 00000040 d3 5a 87 6d e4 77 |.Z.m.w| +peer0.org2.example.com | [2a47 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2a48 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2a49 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2a4a 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2a4b 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2a4c 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a4d 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a4e 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a4f 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a50 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a51 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a52 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2a53 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a54 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a55 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a56 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2a57 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a58 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a59 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a5a 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a5b 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a5c 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a5d 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a5e 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a5f 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a60 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a61 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a62 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a63 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a64 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2a65 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f1 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [28f2 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f3 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28f4 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [28f5 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f7 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f8 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [28f9 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [28fa 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [28fb 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org2.example.com | [28fc 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [28fe 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ff 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2900 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28fd 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2901 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28f6 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2902 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2903 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2904 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2905 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2906 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 gate 1602702118635413700 evaluation starts +peer0.org2.example.com | [2a66 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a67 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a68 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a69 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a6a 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a6b 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2a6c 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 gate 1602702125426102900 evaluation starts +peer0.org2.example.com | [2a6d 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a6e 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2a6f 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 principal matched by identity 0 +peer0.org2.example.com | [2a70 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 64 a2 b3 bc d2 13 51 a9 fc fb a5 d7 d2 30 9d |.d.....Q......0.| +peer0.org2.example.com | 00000010 b6 6c 21 97 6d 75 3a fa 54 ac 47 87 cf c6 42 e1 |.l!.mu:.T.G...B.| +peer0.org2.example.com | [2a71 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 17 37 fb 44 6e 58 59 96 f5 fb e2 |0D. 0.7.DnXY....| +peer0.org2.example.com | 00000010 8a ed 02 27 14 24 b9 29 41 14 36 8f 79 48 7a 48 |...'.$.)A.6.yHzH| +peer0.org2.example.com | 00000020 a4 a7 eb 25 02 20 49 51 26 17 90 4a 3d 68 e1 70 |...%. IQ&..J=h.p| +peer0.org2.example.com | 00000030 ad cb 9a 47 03 f8 56 cd 9c 8f 5e 39 44 4b 78 b5 |...G..V...^9DKx.| +peer0.org2.example.com | 00000040 1b 00 74 8b 03 87 |..t...| +peer0.org2.example.com | [2a72 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a73 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024fbb70 gate 1602702125426102900 evaluation succeeds +peer0.org2.example.com | [2a74 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a75 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a76 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a77 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a78 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a79 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2a7a 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2a7b 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2a7c 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2a7d 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a7e 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a7f 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a80 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a81 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2709 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 af 68 bb 4d bb e7 05 16 df 68 |0E.!...h.M.....h| +peer1.org1.example.com | 00000010 ec 0e 5e 7c 0f 81 9a 16 e0 77 8f e1 c0 44 50 fc |..^|.....w...DP.| +peer1.org1.example.com | 00000020 0c f7 c5 0e 49 02 20 07 84 69 9a a2 d2 06 4c 29 |....I. ..i....L)| +peer1.org1.example.com | 00000030 10 63 2a 57 64 aa a4 2a f2 3c 63 7d 3a bd bc 99 |.c*Wd..*. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [270b 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [270c 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [270d 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [270e 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [270f 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2710 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2711 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2712 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2713 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2714 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2715 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2716 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2717 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2718 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2719 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [271a 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 gate 1602702118543864800 evaluation starts +peer1.org1.example.com | [271b 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [271c 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [271d 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 principal matched by identity 0 +peer1.org1.example.com | [271e 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer1.org1.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer1.org1.example.com | [271f 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer1.org1.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer1.org1.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer1.org1.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org1.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer1.org1.example.com | [2720 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2721 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00377deb0 gate 1602702118543864800 evaluation succeeds +peer1.org1.example.com | [2722 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2723 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2724 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2725 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2726 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2727 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2728 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2729 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [272a 10-14 19:01:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [272c 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [272d 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer1.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer1.org1.example.com | [272e 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer1.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer1.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer1.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer1.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer1.org1.example.com | [272f 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2730 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [272b 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2731 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2732 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2733 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2734 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2735 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2736 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2737 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2738 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2739 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [273a 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [273b 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a82 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a83 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a84 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a85 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a86 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a87 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a88 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a89 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8a 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8b 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8c 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8d 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8e 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a8f 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2a90 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a91 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2a92 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a93 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a94 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a95 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a96 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a97 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a98 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a99 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2a9a 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a9b 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a9c 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a9d 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2907 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2908 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2909 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [290a 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 principal evaluation fails +peer1.org2.example.com | [290b 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033db6e0 gate 1602702118635413700 evaluation fails +peer1.org2.example.com | [290c 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [290d 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [290e 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [290f 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 gate 1602702118635762400 evaluation starts +peer1.org2.example.com | [2910 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2911 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2912 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 principal matched by identity 0 +peer1.org2.example.com | [2913 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer1.org2.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer1.org2.example.com | [2914 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer1.org2.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer1.org2.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer1.org2.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer1.org2.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer1.org2.example.com | [2915 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2916 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dbc50 gate 1602702118635762400 evaluation succeeds +peer1.org2.example.com | [2917 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2918 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2919 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [291a 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [291b 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [291c 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [291d 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [291e 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [291f 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2920 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2921 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2922 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2923 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2924 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2925 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2926 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2927 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2928 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\016\025FG]L\260\032\350{\313\275" > alive: alive: alive: +peer1.org1.example.com | [273c 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [273d 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [273e 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [273f 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2740 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2741 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2742 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 gate 1602702118566672400 evaluation starts +peer1.org1.example.com | [2743 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2744 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2745 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 principal matched by identity 0 +peer1.org1.example.com | [2746 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer1.org1.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer1.org1.example.com | [2747 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer1.org1.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer1.org1.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer1.org1.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer1.org1.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer1.org1.example.com | [2748 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2749 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003839e40 gate 1602702118566672400 evaluation succeeds +peer1.org1.example.com | [274a 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [274b 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [274c 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [274d 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [274e 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [274f 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2750 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2751 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer1.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer1.org1.example.com | [2752 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer1.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer1.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer1.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer1.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer1.org1.example.com | [2753 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2754 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2755 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2756 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2757 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2758 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2759 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [275a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [275b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [275c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2929 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [292a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [292b 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [292c 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [292d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [292e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100C1801 +peer1.org2.example.com | [292f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CF823DA4A52E9649F44F7A83A5541713057797D1F8FC8FB875CDCB746E4CB456 +peer1.org2.example.com | [2930 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2931 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2932 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2933 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2934 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2935 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2936 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2937 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2938 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2939 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [293a 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [293b 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [293c 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [293d 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [293e 10-14 19:01:58.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [293f 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2940 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4F3E4C58EA1FC9E16...08051A0C0A0565787030321203312E30 +peer1.org2.example.com | [2942 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9B875A791FF606C2A841B59351FD25056E33B4FA4C41A1CBDB9780D370A21537 +peer1.org2.example.com | [2941 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2943 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2944 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2945 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2946 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2947 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [294a 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2948 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [294b 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2949 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [294c 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [294d 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [294e 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [294f 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2950 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2951 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [2952 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2953 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2954 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2955 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2956 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2957 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2958 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [295a 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2959 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org2.example.com | [295b 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org2.example.com | [295c 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [295d 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [295e 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [295f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2960 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2961 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2962 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2963 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2964 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 gate 1602702118942519900 evaluation starts +peer1.org2.example.com | [2965 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2966 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2967 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2968 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 principal evaluation fails +peer1.org2.example.com | [2969 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff2d0 gate 1602702118942519900 evaluation fails +peer1.org2.example.com | [296a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [296b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [296c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [296d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 gate 1602702118942901900 evaluation starts +peer1.org2.example.com | [296e 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [296f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2970 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 principal matched by identity 0 +peer1.org2.example.com | [2971 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer1.org2.example.com | [2972 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | [2a9e 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a9f 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2aa0 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2aa1 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 gate 1602702125593725300 evaluation starts +peer0.org2.example.com | [2aa2 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2aa3 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2aa4 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 principal matched by identity 0 +peer0.org2.example.com | [2aa5 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 a2 03 ab c2 7f 0b 33 ba 43 25 4d 7e e7 7a |\.......3.C%M~.z| +peer0.org2.example.com | 00000010 e4 a3 83 57 0b 6b c4 dd 04 22 f5 80 b0 2d 4f bc |...W.k..."...-O.| +peer0.org2.example.com | [2aa6 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 45 4e 56 91 0e 21 36 3c 3b 89 7c |0D. BENV..!6<;.|| +peer0.org2.example.com | 00000010 ed 7a 1c 09 c5 d2 8b 2b 86 38 22 2a 69 87 29 e5 |.z.....+.8"*i.).| +peer0.org2.example.com | 00000020 7c b4 c2 46 02 20 58 b9 ff 90 f7 79 c4 66 69 c0 ||..F. X....y.fi.| +peer0.org2.example.com | 00000030 54 5c 35 47 ab 91 59 e9 27 93 88 1c 56 f4 3b 21 |T\5G..Y.'...V.;!| +peer0.org2.example.com | 00000040 87 e5 70 ef 9d 45 |..p..E| +peer0.org2.example.com | [2aa7 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2aa8 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024e9d10 gate 1602702125593725300 evaluation succeeds +peer0.org2.example.com | [2aa9 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2aaa 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2aab 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2aac 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2aad 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2aae 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2aaf 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2ab0 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2ab1 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2ab2 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab3 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab4 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab5 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ab6 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab7 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ab8 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ab9 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aba 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abb 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abc 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abd 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abe 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abf 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac0 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ac1 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2ac2 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ac3 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac4 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ac5 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac6 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ac7 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2ac9 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ac8 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2aca 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2acb 10-14 19:02:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2acc 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2acd 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ace 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2acf 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ad0 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ad1 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2ad2 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ad3 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ad4 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ad5 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2ad6 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ad7 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2ad8 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ad9 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ada 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2adb 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2adc 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2add 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ade 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2adf 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ae0 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae1 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae2 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ae3 10-14 19:02:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae4 10-14 19:02:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ae5 10-14 19:02:06.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ae6 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ae7 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161028 +peer0.org2.example.com | [2ae8 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE9DE5A2FDB3CA7AC9E16B52457D84443B04A3A816CE1C8882515619DD28474F +peer0.org2.example.com | [2ae9 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2aea 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2aeb 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2aec 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2aed 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aee 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af0 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aef 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2af1 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2af2 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2af4 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af3 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af5 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2af6 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af7 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2af8 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2af9 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2afa 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer0.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer0.org2.example.com | [2afb 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer0.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer0.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer0.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer0.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer0.org2.example.com | [2afc 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2afd 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 b2 08 2c ee fd e8 db 0d e0 b9 cf |0D. D..,........| +peer0.org2.example.com | 00000010 74 9d 6d cf 50 25 4a b6 5c b8 4c 10 10 52 34 0a |t.m.P%J.\.L..R4.| +peer0.org2.example.com | 00000020 72 81 2e b8 02 20 1c 7b 90 9e ce e5 b5 2d 48 a3 |r.... .{.....-H.| +peer0.org2.example.com | 00000030 24 d9 1b b7 e1 47 84 25 ae 1d 67 a4 00 47 33 d3 |$....G.%..g..G3.| +peer0.org2.example.com | 00000040 94 9c 5e 8f ab 67 |..^..g| +peer0.org2.example.com | [2afe 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2aff 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2b00 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b01 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b02 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b03 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b04 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b05 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2714 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2715 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2716 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2717 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2718 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2719 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [271a 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [271b 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [271c 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 gate 1602702114724600900 evaluation starts +peer0.org1.example.com | [271d 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [271e 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [271f 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 principal matched by identity 0 +peer0.org1.example.com | [2720 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +peer0.org1.example.com | 00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +peer0.org1.example.com | [2721 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +peer0.org1.example.com | 00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +peer0.org1.example.com | 00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +peer0.org1.example.com | 00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +peer0.org1.example.com | 00000040 a0 b9 2d 85 e1 58 |..-..X| +peer0.org1.example.com | [2722 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2723 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2724 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 gate 1602702114724600900 evaluation succeeds +peer0.org1.example.com | [2725 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2726 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2727 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2728 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2729 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272a 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [272b 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [272c 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +peer0.org1.example.com | 00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +peer0.org1.example.com | [272d 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +peer0.org1.example.com | 00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +peer0.org1.example.com | 00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +peer0.org1.example.com | 00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +peer0.org1.example.com | 00000040 7d 20 76 51 57 97 |} vQW.| +peer0.org1.example.com | [272e 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [272f 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2730 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2731 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2732 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +peer0.org1.example.com | 00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +peer0.org1.example.com | [2733 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +peer0.org1.example.com | 00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +peer0.org1.example.com | 00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +peer0.org1.example.com | 00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +peer0.org1.example.com | 00000040 a8 43 1d 37 fe 92 |.C.7..| +peer0.org1.example.com | [2734 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2735 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2736 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2737 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41768 +peer0.org1.example.com | [2738 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00325bd10 +peer0.org1.example.com | [2739 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [273a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [273b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [273c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [273d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [273e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 35 a9 ed 07 94 87 b6 b5 a7 e4 ac d5 4e 12 |..5...........N.| +peer0.org1.example.com | 00000010 37 e1 bf cd fc 0c d6 03 22 38 f8 81 71 b4 83 2a |7......."8..q..*| +peer0.org1.example.com | [273f 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 59 41 7b 8f 9b 26 8d a0 06 42 |0E.!..YA{..&...B| +peer0.org1.example.com | 00000010 ad b5 fc fb 0a 56 31 92 7a 96 88 3c e5 4a 42 02 |.....V1.z..<.JB.| +peer0.org1.example.com | 00000020 73 a7 aa db 70 02 20 70 1b 8f 3c 73 81 68 8b 67 |s...p. p.. DEBU exits successfully +peer0.org1.example.com | [2741 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e1810, header 0xc002ca0140 +peer0.org1.example.com | [2742 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2743 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] processing txid: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098 +peer0.org1.example.com | [2744 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +peer0.org1.example.com | [2745 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2746 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2747 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2748 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2749 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [274a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 gate 1602702114885946100 evaluation starts +peer0.org1.example.com | [274b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [274c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [274d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 principal matched by identity 0 +peer0.org1.example.com | [274e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 35 a9 ed 07 94 87 b6 b5 a7 e4 ac d5 4e 12 |..5...........N.| +peer0.org1.example.com | 00000010 37 e1 bf cd fc 0c d6 03 22 38 f8 81 71 b4 83 2a |7......."8..q..*| +peer0.org1.example.com | [274f 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 59 41 7b 8f 9b 26 8d a0 06 42 |0E.!..YA{..&...B| +peer0.org1.example.com | 00000010 ad b5 fc fb 0a 56 31 92 7a 96 88 3c e5 4a 42 02 |.....V1.z..<.JB.| +peer0.org1.example.com | 00000020 73 a7 aa db 70 02 20 70 1b 8f 3c 73 81 68 8b 67 |s...p. p.. DEBU 0xc0028bb950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2751 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 gate 1602702114885946100 evaluation succeeds +peer0.org1.example.com | [2752 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2753 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2754 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2755 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2756 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2757 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +peer0.org1.example.com | [2758 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2759 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [275a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [275b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][af9659d4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [275c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [275d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [275e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] handling GET_STATE from chaincode +peer0.org1.example.com | [275f 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2760 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2761 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2762 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2763 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] notifying Txid:af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, channelID:businesschannel +peer0.org1.example.com | [2764 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2765 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][af9659d4] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [2766 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2767 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +peer0.org1.example.com | [2768 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Exit +peer0.org1.example.com | [2769 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Entry chaincode: name:"exp02" +peer0.org1.example.com | [276a 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [276b 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, chaincode: exp02} +peer0.org1.example.com | [276c 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208201DF2DC956A57855219D5097CC...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [276d 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B1D5542891C2E0B4CD2C384B2669AF43B5E655FFDA976E471513B4C1431629B4 +peer0.org1.example.com | [276e 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, chaincode: exp02} +peer0.org1.example.com | [276f 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Exit +peer0.org1.example.com | [2770 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +peer0.org1.example.com | [2771 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41768 +peer0.org1.example.com | [2772 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41768 grpc.code=OK grpc.call_duration=11.9773ms +peer0.org1.example.com | [2773 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2774 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2775 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2776 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2777 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2778 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2779 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [277a 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [277b 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [277c 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [277d 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org2.example.com | [2973 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2974 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032ff840 gate 1602702118942901900 evaluation succeeds +peer1.org2.example.com | [2975 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2976 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2977 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2978 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2979 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [297a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [297b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [297c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [297d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [297e 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [297f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2980 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2981 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 gate 1602702118943999000 evaluation starts +peer1.org2.example.com | [2982 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2983 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2984 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2985 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 principal evaluation fails +peer1.org2.example.com | [2986 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e2a40 gate 1602702118943999000 evaluation fails +peer1.org2.example.com | [2987 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2988 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2989 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [298a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 gate 1602702118945423800 evaluation starts +peer1.org2.example.com | [298b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [298c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [298d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 principal matched by identity 0 +peer1.org2.example.com | [298e 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [298f 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [2990 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2991 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e3020 gate 1602702118945423800 evaluation succeeds +peer1.org2.example.com | [2992 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2993 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2994 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b06 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2b07 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer0.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer0.org2.example.com | [2b08 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer0.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer0.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer0.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer0.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer0.org2.example.com | [2b09 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0a 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0b 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0c 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0d 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b0e 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0f 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b10 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2b11 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer0.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer0.org2.example.com | [2b12 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer0.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer0.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer0.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer0.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer0.org2.example.com | [2b13 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b14 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b15 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b16 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b17 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b18 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b19 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2b1a 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b1b 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b1c 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1d 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1e 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b1f 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b20 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b21 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b22 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b23 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2b24 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer0.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer0.org2.example.com | [2b25 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer0.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer0.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer0.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2b27 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 fd 41 25 22 f1 b3 8b 53 03 51 |0E.!...A%"...S.Q| +peer0.org2.example.com | 00000010 8c 33 93 6a 9e 59 98 d9 38 b0 57 f5 c1 59 9e 64 |.3.j.Y..8.W..Y.d| +peer0.org2.example.com | 00000020 a8 ea 7c 14 62 02 20 46 01 d3 a2 6d 43 78 fd a4 |..|.b. F...mCx..| +peer0.org2.example.com | 00000030 95 68 79 56 64 68 2c b2 ff 58 2c cf bd e8 32 fc |.hyVdh,..X,...2.| +peer0.org2.example.com | 00000040 b3 96 1a a3 6c 6e 60 |....ln`| +peer0.org2.example.com | [2b28 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2b29 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [2b2a 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b2b 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [277e 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [275d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2995 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b2c 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [277f 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [275e 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2996 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | [2b2d 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2780 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [275f 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [2b2e 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2781 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b2f 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b30 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2b31 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b32 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2760 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b33 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2761 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2997 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | [2782 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b34 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2762 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | [2783 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b35 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | [2784 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 gate 1602702114948053200 evaluation starts +peer0.org2.example.com | [2b36 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2763 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | [2785 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b37 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2786 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b38 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer1.org2.example.com | [2998 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2999 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2787 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 principal matched by identity 0 +peer1.org1.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer1.org2.example.com | [299a 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2788 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | [2b39 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer1.org2.example.com | [299b 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [2b3a 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2767 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org1.example.com | [2789 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | [2b3b 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [299c 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | [2b3c 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | [2b3d 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | [2768 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 db 9c 47 d8 ff b2 0b f2 51 0d |0E.!....G.....Q.| +peer0.org2.example.com | [2b3e 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | 00000010 00 26 42 3d 45 2f f1 70 98 fc b5 4b c7 88 1f e0 |.&B=E/.p...K....| +peer1.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | [2b3f 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | 00000020 fd 04 29 0c a8 02 20 5e b5 34 40 aa b5 8e 5e 71 |..)... ^.4@...^q| +peer1.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [2b40 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org2.example.com | [299d 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b41 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [278a 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 c4 8d 9c 6f 89 59 4a e4 4d 56 3f a8 0a 41 0a 57 |...o.YJ.MV?..A.W| +peer0.org2.example.com | [2b42 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [278b 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 gate 1602702114948053200 evaluation succeeds +peer1.org1.example.com | 00000040 be 69 af c1 73 1c cc |.i..s..| +peer1.org2.example.com | [299e 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b43 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [278c 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2769 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [299f 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b44 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [278d 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [276a 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [29a0 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b45 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [278e 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [276b 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [29a1 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b46 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [278f 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [276c 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [29a2 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b47 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2790 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276d 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [29a3 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b48 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2791 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276e 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29a4 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b49 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2792 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [276f 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29a5 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b4a 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2793 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2770 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29a6 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 gate 1602702118967404700 evaluation starts +peer0.org2.example.com | [2b4b 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2794 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2771 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [29a7 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b4c 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 gate 1602702126526558400 evaluation starts +peer0.org1.example.com | [2795 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2764 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [29a8 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b4d 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2796 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2765 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [29a9 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2797 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 gate 1602702114969010600 evaluation starts +peer0.org2.example.com | [2b4e 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [29aa 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 principal evaluation fails +peer1.org1.example.com | [2766 10-14 19:01:58.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2798 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b4f 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 principal matched by identity 0 +peer1.org2.example.com | [29ab 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032712e0 gate 1602702118967404700 evaluation fails +peer1.org1.example.com | [2772 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2799 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b50 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org2.example.com | [29ac 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2774 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [279a 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 principal matched by identity 0 +peer0.org2.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org2.example.com | [29ad 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2775 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [279b 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | [2b51 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org2.example.com | [29ae 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2776 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org2.example.com | [29af 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 gate 1602702118969257100 evaluation starts +peer1.org1.example.com | [2777 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [279c 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org2.example.com | [29b0 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2778 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org2.example.com | [29b1 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2773 10-14 19:01:58.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org2.example.com | [29b2 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 principal matched by identity 0 +peer1.org1.example.com | [2779 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | [2b52 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [277a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29b3 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | [2b53 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180650 gate 1602702126526558400 evaluation succeeds +peer1.org1.example.com | [277b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org1.example.com | [279d 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b54 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [277c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29b4 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org1.example.com | [279e 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 gate 1602702114969010600 evaluation succeeds +peer0.org2.example.com | [2b55 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [277d 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org1.example.com | [279f 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b56 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [277e 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org1.example.com | [27a0 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b57 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [277f 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 gate 1602702118646889300 evaluation starts +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org1.example.com | [27a1 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b58 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2780 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org1.example.com | [27a2 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b59 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2781 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [29b5 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27a3 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b5a 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2782 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 principal matched by identity 0 +peer1.org2.example.com | [29b6 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003271860 gate 1602702118969257100 evaluation succeeds +peer0.org1.example.com | [27a4 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b5b 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2783 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | [29b7 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [27a5 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b5c 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [29b8 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [27a6 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2b5d 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2784 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | [29b9 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27a7 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b5e 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | [29ba 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27a8 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b5f 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | [29bb 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27a9 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b60 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org2.example.com | [29bc 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27aa 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b61 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org2.example.com | [29bd 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27ab 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b62 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2785 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29be 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27ac 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b63 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2786 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5170 gate 1602702118646889300 evaluation succeeds +peer1.org2.example.com | [29bf 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27ad 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b64 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2787 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29c0 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27ae 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b65 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2788 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29c1 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27af 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b66 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2789 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29c2 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27b0 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b67 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278a 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29c3 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 gate 1602702118970353900 evaluation starts +peer0.org1.example.com | [27b1 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b68 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [278b 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29c4 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27b2 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b69 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [278c 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29c5 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [27b3 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b6a 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278d 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29c6 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [27b4 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b6b 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29c7 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 principal evaluation fails +peer1.org1.example.com | [278e 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27b5 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b6c 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29c8 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320cac0 gate 1602702118970353900 evaluation fails +peer1.org1.example.com | [278f 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27b6 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 gate 1602702114996303000 evaluation starts +peer0.org2.example.com | [2b6d 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29c9 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2790 10-14 19:01:58.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27b7 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b6e 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29ca 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2791 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27b8 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b6f 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29cb 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2792 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 gate 1602702118651825400 evaluation starts +peer0.org1.example.com | [27b9 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 principal matched by identity 0 +peer1.org2.example.com | [29cc 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 gate 1602702118970762000 evaluation starts +peer0.org2.example.com | [2b70 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2793 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27ba 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org2.example.com | [29cd 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b71 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2794 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org2.example.com | [29ce 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b72 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2795 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 principal matched by identity 0 +peer0.org1.example.com | [27bb 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org2.example.com | [29cf 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 principal matched by identity 0 +peer0.org2.example.com | [2b73 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2796 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org2.example.com | [29d0 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | [2b74 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [2b75 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2797 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org2.example.com | [29d1 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | [2b76 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | [2b77 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | [27bc 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | [2b78 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | [27bd 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 gate 1602702114996303000 evaluation succeeds +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [29d2 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29d3 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00320d050 gate 1602702118970762000 evaluation succeeds +peer1.org2.example.com | [29d4 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29d5 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29d6 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b79 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b7a 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29d7 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b7b 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [27be 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29d8 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | [2b7c 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2798 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27bf 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [2b7d 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2799 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e5d60 gate 1602702118651825400 evaluation succeeds +peer0.org1.example.com | [27c0 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29d9 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | [2b7e 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [279a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27c1 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | [2b7f 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [279b 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27c2 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | [2b80 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [279c 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27c3 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | [2b81 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [279d 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27c4 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2b82 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [279e 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27c5 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29da 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b83 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [279f 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [27c6 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [29db 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b84 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 gate 1602702126647401500 evaluation starts +peer1.org1.example.com | [27a0 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27c7 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29dc 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | [2b85 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27a1 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27c8 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [2b86 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27a2 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27c9 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29dd 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer0.org2.example.com | [2b87 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 principal matched by identity 0 +peer1.org1.example.com | [27a3 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27ca 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | [2b88 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | [27a4 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27cb 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [27a5 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27cc 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 gate 1602702115017354500 evaluation starts +peer1.org2.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | [2b89 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | [27a6 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27cd 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | [27a7 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 gate 1602702118654348800 evaluation starts +peer0.org1.example.com | [27ce 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [29de 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | [27a8 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27cf 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 principal matched by identity 0 +peer1.org2.example.com | [29df 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | [27a9 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [27d0 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org2.example.com | [29e0 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [27aa 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 principal matched by identity 0 +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org2.example.com | [29e1 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b8a 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27ab 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | [27d1 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org2.example.com | [29e2 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b8b 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00025bb20 gate 1602702126647401500 evaluation succeeds +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org2.example.com | [29e3 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b8c 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [27ac 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org2.example.com | [29e4 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b8d 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org2.example.com | [29e5 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b8e 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org2.example.com | [29e6 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b8f 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | [27d2 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29e7 10-14 19:01:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b90 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [27d3 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 gate 1602702115017354500 evaluation succeeds +peer1.org2.example.com | [29e8 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b91 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27ad 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27d4 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29e9 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b92 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27ae 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d020 gate 1602702118654348800 evaluation succeeds +peer0.org1.example.com | [27d5 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [29ea 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b93 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27af 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27d6 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [29eb 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b94 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27b0 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27d7 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [29ec 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b95 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [27b1 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27d8 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29ed 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b96 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [27b2 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27d9 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [29ee 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b97 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [27b3 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27da 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [29ef 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 gate 1602702118985056200 evaluation starts +peer0.org2.example.com | [2b98 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 gate 1602702126651283500 evaluation starts +peer1.org1.example.com | [27b4 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27db 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [29f0 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b99 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27b6 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [29f1 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [27dc 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b9a 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27b7 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f2 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [27dd 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2b9b 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 principal matched by identity 0 +peer1.org1.example.com | [27b8 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27de 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [29f3 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 principal evaluation fails +peer0.org2.example.com | [2b9c 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | [27b9 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27df 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [29f4 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd210 gate 1602702118985056200 evaluation fails +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [27ba 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27e0 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29f5 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b9d 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | [27bb 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27e1 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [29f6 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | [27bc 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27e2 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [29f7 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | [27bd 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27e3 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [29f8 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 gate 1602702118986611700 evaluation starts +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | [27be 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 gate 1602702118656930000 evaluation starts +peer0.org1.example.com | [27e4 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [29f9 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [27bf 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27e5 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 gate 1602702115129143400 evaluation starts +peer1.org2.example.com | [29fa 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2b9e 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27c0 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [27e6 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29fb 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 principal matched by identity 0 +peer0.org2.example.com | [2b9f 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000364f00 gate 1602702126651283500 evaluation succeeds +peer1.org1.example.com | [27c1 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 principal matched by identity 0 +peer0.org1.example.com | [27e7 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [29fc 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org2.example.com | [2ba0 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [27c2 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | [27e8 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 principal matched by identity 0 +peer1.org2.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org2.example.com | [2ba1 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [27e9 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f fe 40 34 23 6b 56 0b d7 82 13 da 13 73 04 5b |..@4#kV......s.[| +peer1.org2.example.com | [29fd 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org2.example.com | [2ba2 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27c3 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 73 c0 4b a0 d9 34 9e ed 48 4b a4 3a 28 3b 6b e7 |s.K..4..HK.:(;k.| +peer1.org2.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org2.example.com | [2ba3 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | [27ea 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 84 99 32 35 5e c9 84 fe e6 e6 |0E.!....25^.....| +peer1.org2.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org2.example.com | [2ba4 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000010 12 1d 85 81 a5 32 1e c2 9f 12 c0 10 25 b8 c5 ca |.....2......%...| +peer1.org2.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000020 81 8f 78 ac 4e 02 20 5e ae 73 b6 3b 1d db 8d 6e |..x.N. ^.s.;...n| +peer1.org2.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org2.example.com | [2ba5 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | 00000030 37 c4 15 56 cb 5c 22 d2 77 ce ce 5a e5 78 97 e8 |7..V.\".w..Z.x..| +peer1.org2.example.com | [29fe 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | [27c4 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 09 c4 dc 13 5f 7f aa |...._..| +peer1.org2.example.com | [29ff 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031dd780 gate 1602702118986611700 evaluation succeeds +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | [27c5 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944370 gate 1602702118656930000 evaluation succeeds +peer0.org1.example.com | [27eb 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a00 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | [27c6 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27ec 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 gate 1602702115129143400 evaluation succeeds +peer1.org2.example.com | [2a01 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [27c7 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27ed 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a02 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ba6 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | [27c8 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [27ee 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a03 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [27c9 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27ef 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a04 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ba7 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | [27ca 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27f0 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a05 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | [27b5 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27f1 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a06 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | [27cb 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27f2 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2a07 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | [27cc 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [27f3 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a08 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [27cd 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27f4 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a09 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ba8 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ce 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27f5 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a0a 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ba9 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [27cf 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [27f6 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0b 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2baa 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27d0 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27f7 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0c 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 gate 1602702118987902100 evaluation starts +peer0.org2.example.com | [2bab 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27d1 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [27f8 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0d 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bac 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27d2 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27f9 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0e 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27d3 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bad 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27fa 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0f 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [27d4 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bae 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27fb 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a10 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 principal evaluation fails +peer1.org1.example.com | [27d5 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2baf 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27fd 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a11 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2990 gate 1602702118987902100 evaluation fails +peer1.org1.example.com | [27d6 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bb0 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27fc 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a12 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27d7 10-14 19:01:58.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb1 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27fe 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a13 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27d8 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb2 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [27ff 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a14 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [27d9 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb3 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 gate 1602702126665465400 evaluation starts +peer0.org1.example.com | [2800 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a15 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 gate 1602702118988215100 evaluation starts +peer1.org1.example.com | [27da 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bb4 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2801 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a16 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27db 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bb5 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2802 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a17 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27dc 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bb6 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 principal matched by identity 0 +peer0.org1.example.com | [2803 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27dd 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a18 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 principal matched by identity 0 +peer0.org2.example.com | [2bb7 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | [2804 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a19 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org1.example.com | [27de 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [2805 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org1.example.com | [27df 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2bb8 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | [2806 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a1a 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org1.example.com | [27e0 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | [2807 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org1.example.com | [27e1 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 gate 1602702118945466100 evaluation starts +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | [2808 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e2 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | [2809 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org1.example.com | [27e3 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [280a 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org1.example.com | [27e4 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 principal matched by identity 0 +peer0.org2.example.com | [2bb9 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [280b 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org1.example.com | [27e5 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | [2bba 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000379540 gate 1602702126665465400 evaluation succeeds +peer0.org1.example.com | [280c 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a1b 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2bbb 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [280d 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a1c 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b2f00 gate 1602702118988215100 evaluation succeeds +peer1.org1.example.com | [27e6 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | [2bbc 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [280e 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a1d 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | [2bbd 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [280f 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a1e 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | [2bbe 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2810 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41772 +peer1.org2.example.com | [2a1f 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | [2bbf 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2811 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002c651d0 +peer1.org2.example.com | [2a20 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2bc0 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2812 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2a21 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org1.example.com | [27e7 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2bc1 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2813 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org1.example.com | [27e8 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a80b0 gate 1602702118945466100 evaluation succeeds +peer0.org2.example.com | [2bc2 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2814 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2a22 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org1.example.com | [27e9 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bc3 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2815 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org1.example.com | [27ea 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bc4 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2816 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org1.example.com | [27eb 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2bc5 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2817 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a9 17 da 96 da d8 b4 90 37 4d 6c 04 8c ad ab |.........7Ml....| +peer1.org2.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org1.example.com | [27ec 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2bc6 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 eb 2b 9f 1e dc f1 e9 b0 2a 11 b0 7f f2 49 b6 47 |.+......*....I.G| +peer1.org2.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org1.example.com | [27ed 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc7 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 gate 1602702126692235700 evaluation starts +peer0.org1.example.com | [2818 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 ee db 5e 48 a0 c3 fd e1 52 49 |0D. s2..^H....RI| +peer1.org2.example.com | [2a23 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ee 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bc8 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 30 60 e0 a1 c2 af 09 bd 82 a7 af 71 d0 f3 d5 1e |0`.........q....| +peer1.org2.example.com | [2a24 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [27ef 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bc9 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000020 d4 10 28 fc 02 20 0e 10 32 94 5a a3 a4 2d ef 20 |..(.. ..2.Z..-. | +peer1.org2.example.com | [2a25 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org1.example.com | [27f0 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bca 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 principal matched by identity 0 +peer0.org1.example.com | 00000030 b6 9e ea 95 45 a4 1b a2 8d 41 64 67 6b 36 43 07 |....E....Adgk6C.| +peer1.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org1.example.com | [27f1 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2bcb 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000040 03 0f 41 d1 ab 50 |..A..P| +peer1.org2.example.com | [2a26 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org1.example.com | [27f2 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [2819 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org1.example.com | [27f3 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2bcc 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | [281a 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00286f9d0, header 0xc002c65680 +peer1.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org1.example.com | [27f4 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 gate 1602702118946364600 evaluation starts +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | [281b 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer1.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org1.example.com | [27f5 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | [281c 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] processing txid: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 +peer1.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org1.example.com | [27f6 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | [281d 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer1.org2.example.com | [2a27 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27f7 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 principal matched by identity 0 +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [281e 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer1.org2.example.com | [2a28 10-14 19:01:58.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27f8 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | [2bcd 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [281f 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer1.org2.example.com | [2a29 10-14 19:01:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2bce 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000808760 gate 1602702126692235700 evaluation succeeds +peer0.org1.example.com | [2820 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer1.org2.example.com | [2a2a 10-14 19:01:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer1.org1.example.com | [27f9 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | [2bcf 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2821 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a2b 10-14 19:01:58.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | [2822 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer1.org2.example.com | [2a2c 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | [2bd0 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2823 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 gate 1602702115214863200 evaluation starts +peer1.org2.example.com | [2a2d 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | [2bd1 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2824 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a2e 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2bd2 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2825 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27fa 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2bd3 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | [2826 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 principal matched by identity 0 +peer1.org2.example.com | [2a2f 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [27fb 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a8cb0 gate 1602702118946364600 evaluation succeeds +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [2827 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a9 17 da 96 da d8 b4 90 37 4d 6c 04 8c ad ab |.........7Ml....| +peer1.org2.example.com | [2a30 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [27fc 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bd4 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 eb 2b 9f 1e dc f1 e9 b0 2a 11 b0 7f f2 49 b6 47 |.+......*....I.G| +peer1.org2.example.com | [2a31 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 gate 1602702120083636000 evaluation starts +peer1.org1.example.com | [27fd 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | [2828 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 ee db 5e 48 a0 c3 fd e1 52 49 |0D. s2..^H....RI| +peer1.org2.example.com | [2a32 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27fe 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000010 30 60 e0 a1 c2 af 09 bd 82 a7 af 71 d0 f3 d5 1e |0`.........q....| +peer1.org2.example.com | [2a33 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [27ff 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000020 d4 10 28 fc 02 20 0e 10 32 94 5a a3 a4 2d ef 20 |..(.. ..2.Z..-. | +peer1.org2.example.com | [2a34 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 principal matched by identity 0 +peer1.org1.example.com | [2800 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | 00000030 b6 9e ea 95 45 a4 1b a2 8d 41 64 67 6b 36 43 07 |....E....Adgk6C.| +peer1.org2.example.com | [2a35 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d6 14 1a 1d d6 a3 5b a8 f3 79 8f a1 18 f1 f8 |.......[..y.....| +peer1.org1.example.com | [2801 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bd5 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000040 03 0f 41 d1 ab 50 |..A..P| +peer1.org2.example.com | 00000010 fd e7 fb 1d 46 7d 26 5c 74 83 00 1d bc fe 31 a5 |....F}&\t.....1.| +peer1.org1.example.com | [2802 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [2829 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a36 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 42 c2 51 32 6b 05 18 86 df 65 2c |0D. .B.Q2k....e,| +peer1.org1.example.com | [2803 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 06 82 de 32 c2 91 9c 08 bf ae ca 0c b5 84 82 bf |...2............| +peer0.org1.example.com | [282a 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 gate 1602702115214863200 evaluation succeeds +peer1.org1.example.com | [2804 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 bc 69 b1 65 02 20 70 35 60 60 26 37 76 b1 37 cf |.i.e. p5``&7v.7.| +peer0.org2.example.com | [2bd6 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | [282b 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2805 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 73 f2 6f f3 fe 9a 5a 41 76 e6 30 ee b0 9a 90 41 |s.o...ZAv.0....A| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | [282c 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2806 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 4b c3 34 b5 f4 ff |K.4...| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | [282d 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org1.example.com | [2807 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a37 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | [282e 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org1.example.com | [2808 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a38 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c69c0 gate 1602702120083636000 evaluation succeeds +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [282f 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [2809 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 gate 1602702118956949600 evaluation starts +peer0.org2.example.com | [2bd7 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2830 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer1.org1.example.com | [280b 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a39 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2bd8 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2831 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Entry chaincode: name:"exp02" +peer1.org1.example.com | [280c 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2a3a 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2bd9 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2832 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [280d 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 principal matched by identity 0 +peer1.org2.example.com | [2a3b 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2bda 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [2833 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer1.org1.example.com | [280e 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | [2a3c 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2bdb 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2834 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b42739d3] Entry chaincode: name:"exp02" +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | [2a3d 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [2bdc 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2835 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [280f 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | [2a3e 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [2bde 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2836 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | [2a3f 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [2bdf 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2837 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling GET_STATE from chaincode +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | [2a41 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer0.org1.example.com | [2838 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] getting state for chaincode exp02, key a, channel businesschannel +peer0.org2.example.com | [2be0 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | [2a42 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2839 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [2be1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2a43 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | [283a 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed GET_STATE. Sending RESPONSE +peer0.org2.example.com | [2be2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [280a 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a40 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | [283b 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org2.example.com | [2be3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2810 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a44 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org1.example.com | [283c 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling GET_STATE from chaincode +peer0.org2.example.com | [2bdd 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2811 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9f80 gate 1602702118956949600 evaluation succeeds +peer1.org2.example.com | [2a45 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [283d 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] getting state for chaincode exp02, key b, channel businesschannel +peer0.org2.example.com | [2be4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2812 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a46 10-14 19:02:00.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org1.example.com | [283e 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [2be6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2813 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a47 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org1.example.com | [283f 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed GET_STATE. Sending RESPONSE +peer0.org2.example.com | [2be7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 gate 1602702126700806700 evaluation starts +peer1.org1.example.com | [2814 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a48 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2840 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org2.example.com | [2be8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2815 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a49 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004d80a80 env 0xc0031d1950 txn 0 +peer0.org1.example.com | [2841 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling PUT_STATE from chaincode +peer0.org2.example.com | [2be9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2816 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a4a 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031d1950 +peer0.org1.example.com | [2842 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed PUT_STATE. Sending RESPONSE +peer0.org2.example.com | [2bea 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 principal matched by identity 0 +peer1.org1.example.com | [2817 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a4b 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org1.example.com | [2843 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org2.example.com | [2beb 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | [2818 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a4c 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2844 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling PUT_STATE from chaincode +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2819 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a4d 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2845 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed PUT_STATE. Sending RESPONSE +peer0.org2.example.com | [2bec 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | [281a 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2a4e 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2846 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | [281b 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a4f 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2847 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] notifying Txid:b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, channelID:businesschannel +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | [281c 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a50 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2848 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | [281d 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [2849 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b42739d3] Exit chaincode: name:"exp02" (9ms) +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [281e 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [284a 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [2bed 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [281f 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [284b 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer0.org2.example.com | [2bee 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037ec00 gate 1602702126700806700 evaluation succeeds +peer1.org1.example.com | [2820 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 gate 1602702118960344700 evaluation starts +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [284c 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Exit +peer0.org2.example.com | [2bef 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2821 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [284d 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Entry chaincode: name:"exp02" +peer0.org2.example.com | [2bf0 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2822 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | [2bf1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [284e 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] escc for chaincode name:"exp02" is escc +peer1.org1.example.com | [2823 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 principal matched by identity 0 +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | [2bf2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2824 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | [2bf3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [284f 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, chaincode: exp02} +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | [2bf4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2850 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E3FB391561259C14E9AA871CB8AF...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [2825 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | [2bf5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2851 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E953BE0289F04B3715136B2AA5164A0804F89537B7BFF1AB1E1A229392073229 +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | [2bf6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2852 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, chaincode: exp02} +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | [2bf7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2853 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Exit +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2bf8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2854 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2a51 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [2bf9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2855 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41772 +peer1.org1.example.com | [2826 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a52 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [2bfa 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2856 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41772 grpc.code=OK grpc.call_duration=21.981ms +peer0.org1.example.com | [2857 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a53 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [2bfb 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 gate 1602702126701585200 evaluation starts +peer1.org1.example.com | [2827 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a54 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2bfc 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2858 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2828 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a55 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +peer0.org2.example.com | [2bfd 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2859 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2829 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00479f2d0 gate 1602702118960344700 evaluation succeeds +peer1.org2.example.com | 00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.| +peer0.org2.example.com | [2bfe 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 principal matched by identity 0 +peer0.org1.example.com | [285a 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [282a 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a56 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +peer0.org2.example.com | [2bff 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | [285b 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [282b 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | 00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [285c 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [282c 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +peer0.org2.example.com | [2c00 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | [285d 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [282d 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | [285e 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [282e 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 5c 21 63 9f f2 |\!c..| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | [285f 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [282f 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a57 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | [2860 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2830 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a58 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0028d7800, header channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [2861 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2831 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a59 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2c01 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2862 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2832 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a5a 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2c02 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00037feb0 gate 1602702126701585200 evaluation succeeds +peer0.org1.example.com | [2863 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 gate 1602702115239045600 evaluation starts +peer1.org1.example.com | [2833 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a5b 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2c03 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2864 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2834 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2a5c 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2c04 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2865 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2835 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a5d 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org2.example.com | [2c05 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2866 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 principal matched by identity 0 +peer1.org1.example.com | [2836 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a5e 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2c06 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2867 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 1e 63 bd e5 53 ad 55 f2 a8 61 57 71 d6 b2 18 |q.c..S.U..aWq...| +peer1.org1.example.com | [2837 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a5f 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0029d4800 +peer0.org2.example.com | [2c07 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 a0 fa 08 14 7e 73 46 d2 98 f2 c5 8a a9 3a 47 4b |....~sF......:GK| +peer1.org1.example.com | [2838 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2a60 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [133da931-d5ae-4325-9cba-3a1a95e48bde] +peer0.org1.example.com | [2868 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 9e 09 00 a1 a8 aa 64 2b de f1 13 |0D. .......d+...| +peer1.org1.example.com | [2839 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c08 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | [2a61 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | 00000010 a3 cf f7 89 b5 f0 14 b4 ce bc f3 b5 8f 93 bf 85 |................| +peer1.org1.example.com | [283a 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | [2a62 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [133da931-d5ae-4325-9cba-3a1a95e48bde] +peer0.org1.example.com | 00000020 30 ba 14 e1 02 20 54 f1 25 7b 41 c5 8d e1 82 25 |0.... T.%{A....%| +peer1.org1.example.com | [283b 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 gate 1602702120095458400 evaluation starts +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | [2a63 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | 00000030 7c b1 90 ec ab b1 ac 71 c5 7d 34 3b a3 37 df 65 ||......q.}4;.7.e| +peer1.org1.example.com | [283c 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | [2a64 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a32d1187-827f-46a2-82dd-63ad5e83d7e0] +peer0.org1.example.com | 00000040 41 57 f5 5c 41 66 |AW.\Af| +peer1.org1.example.com | [283d 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2a65 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a32d1187-827f-46a2-82dd-63ad5e83d7e0] +peer0.org1.example.com | [2869 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [283e 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 principal matched by identity 0 +peer0.org2.example.com | [2c09 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | [2a66 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 gate 1602702120098281400 evaluation starts +peer0.org1.example.com | [286a 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 gate 1602702115239045600 evaluation succeeds +peer1.org1.example.com | [283f 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d6 14 1a 1d d6 a3 5b a8 f3 79 8f a1 18 f1 f8 |.......[..y.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [2a67 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [286b 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 fd e7 fb 1d 46 7d 26 5c 74 83 00 1d bc fe 31 a5 |....F}&\t.....1.| +peer0.org2.example.com | [2c0a 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | [2a68 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [286c 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2840 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 42 c2 51 32 6b 05 18 86 df 65 2c |0D. .B.Q2k....e,| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | [2a69 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 principal matched by identity 0 +peer0.org1.example.com | [286d 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 06 82 de 32 c2 91 9c 08 bf ae ca 0c b5 84 82 bf |...2............| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | [2a6a 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 1b 98 bd 78 03 45 58 8d f8 dc 77 22 ff b6 d5 |....x.EX...w"...| +peer0.org1.example.com | [286e 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 bc 69 b1 65 02 20 70 35 60 60 26 37 76 b1 37 cf |.i.e. p5``&7v.7.| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000010 b5 cc e7 b3 b3 e7 84 2f b1 62 40 16 e5 4a c9 a1 |......./.b@..J..| +peer0.org1.example.com | [286f 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 73 f2 6f f3 fe 9a 5a 41 76 e6 30 ee b0 9a 90 41 |s.o...ZAv.0....A| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [2a6b 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 e6 f5 4a 44 f9 fd 23 6f 73 f2 db |0D. u..JD..#os..| +peer0.org1.example.com | [2870 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000040 4b c3 34 b5 f4 ff |K.4...| +peer0.org2.example.com | [2c0b 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 94 10 af 74 b7 7f 02 c5 28 78 73 aa 3b 4b 12 ab |...t....(xs.;K..| +peer0.org1.example.com | [2871 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2841 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2be5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 8a 7a ed 79 02 20 6c 16 1d 7b 22 87 af a0 55 cd |.z.y. l..{"...U.| +peer0.org1.example.com | [2872 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2842 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c3dc0 gate 1602702120095458400 evaluation succeeds +peer0.org2.example.com | [2c0c 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 a3 05 bf be 46 84 23 02 55 ec 84 b8 d3 8f d8 ab |....F.#.U.......| +peer0.org1.example.com | [2873 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2843 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2c0d 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 a7 5a d0 a6 1e 51 |.Z...Q| +peer0.org1.example.com | [2874 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2844 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2c0e 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a6c 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2875 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2845 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2c0f 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a6d 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2876 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2846 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [2c10 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a6e 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 skipping identity 0 because it has already been used +peer0.org1.example.com | [2877 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c11 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2847 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [2a6f 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 principal evaluation fails +peer0.org1.example.com | [2878 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c12 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 gate 1602702126702734300 evaluation starts +peer1.org1.example.com | [2848 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [2a70 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b5b0 gate 1602702120098281400 evaluation succeeds +peer0.org1.example.com | [2879 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c13 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2849 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2a71 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0e957d44-8f8c-49a1-99f6-8fa48568db22] +peer0.org1.example.com | [287a 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c14 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [284a 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer1.org2.example.com | [2a72 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0e957d44-8f8c-49a1-99f6-8fa48568db22] +peer0.org1.example.com | [287b 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c15 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 principal matched by identity 0 +peer1.org1.example.com | [284b 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2a73 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [287c 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c16 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org1.example.com | [284c 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer1.org2.example.com | [2a74 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd appears to be valid +peer0.org1.example.com | [287d 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org1.example.com | [284d 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer1.org2.example.com | [2a75 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0029d4800 +peer0.org1.example.com | [287e 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2c17 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org1.example.com | [284e 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2a76 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004d80a80 env 0xc0031d1950 txn 0 +peer0.org1.example.com | [287f 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org1.example.com | [284f 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [2a77 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2880 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org1.example.com | [2850 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org2.example.com | [2a78 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 9ms +peer0.org1.example.com | [2881 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org1.example.com | [2851 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org2.example.com | [2a79 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2882 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org1.example.com | [2852 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2a7a 10-14 19:02:00.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2883 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2853 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc000413940 env 0xc00380d7c0 txn 0 +peer0.org2.example.com | [2c18 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a7b 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | [2884 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2854 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00380d7c0 +peer0.org2.example.com | [2c19 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000309f80 gate 1602702126702734300 evaluation succeeds +peer1.org2.example.com | [2a7c 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2885 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2855 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org2.example.com | [2c1a 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a7d 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2886 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2856 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2c1b 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a7e 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2887 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2857 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2c1c 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a7f 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [2888 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [2858 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2c1d 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a80 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2889 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [2859 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c1e 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a81 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [288a 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [285a 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [2c1f 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2a82 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [288c 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | [2c20 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a83 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [288b 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [2c21 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a84 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [288d 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | [2c22 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a85 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [288e 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | [2c23 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a86 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [288f 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [2c24 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a87 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | [2890 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2c25 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a88 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] marked as valid by state validator +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | [2891 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c26 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2a89 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004d81e80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004d81ec0)} +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | [2892 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2c27 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a8a 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | [2893 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2c28 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a8b 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | [2894 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 31 71 c5 ef 6b 70 3c 9e 71 a1 a9 16 c4 47 0e |.1q..kp<.q....G.| +peer0.org2.example.com | [2c29 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a8c 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | 00000010 a6 46 0c 80 8a 6b 1c ce cb 9d 46 e4 3b 17 6d 76 |.F...k....F.;.mv| +peer0.org2.example.com | [2c2a 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2a8d 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | [2895 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b0 5a b1 68 69 4c 5e 03 38 05 e0 |0D. ..Z.hiL^.8..| +peer0.org2.example.com | [2c2b 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive: +peer1.org2.example.com | [2a8e 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | 00000010 c7 c0 a2 da 2a 22 76 5c 8a ca 58 86 2a 5e 3a 80 |....*"v\..X.*^:.| +peer0.org2.example.com | [2c2c 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a8f 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer1.org1.example.com | [285b 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | 00000020 59 bc 33 97 02 20 63 5f 9f 72 4f ec 8b 6c c4 2d |Y.3.. c_.rO..l.-| +peer0.org2.example.com | [2c2d 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a90 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285c 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | 00000030 57 a2 10 bd 92 ef 80 b3 0b 87 d1 d5 54 38 f4 d6 |W...........T8..| +peer0.org2.example.com | [2c2e 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a91 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285d 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000040 5b c5 ef d9 c7 f6 |[.....| +peer0.org2.example.com | [2c2f 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a92 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285e 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2896 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [2c30 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2a93 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285f 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [2c31 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a94 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.| +peer0.org1.example.com | [2897 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd e4 14 a6 05 c8 95 47 08 11 5a |0E.!........G..Z| +peer0.org2.example.com | [2c32 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a95 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2860 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +peer0.org1.example.com | 00000010 12 1f 21 c9 19 3f 17 8e 69 1e 63 12 2c 76 8b f8 |..!..?..i.c.,v..| +peer0.org2.example.com | [2c33 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2a96 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +peer0.org1.example.com | 00000020 9c 2b b4 60 3c 02 20 04 22 10 35 8a cc 4b ab f7 |.+.`<. .".5..K..| +peer0.org2.example.com | [2c34 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a97 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +peer0.org1.example.com | 00000030 dd ef 66 f3 c6 f5 ad 79 b8 c4 f9 bc f5 51 30 99 |..f....y.....Q0.| +peer0.org2.example.com | [2c35 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a98 10-14 19:02:00.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +peer0.org1.example.com | 00000040 86 e3 fc 64 d3 45 55 |...d.EU| +peer0.org2.example.com | [2c36 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a99 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer1.org1.example.com | 00000040 5c 21 63 9f f2 |\!c..| +peer0.org1.example.com | [2898 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2c37 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a9a 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +peer1.org1.example.com | [2861 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2899 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [2c38 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +peer1.org1.example.com | [2862 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0033d4000, header channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org1.example.com | [289a 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2c39 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | ] +peer1.org1.example.com | [2863 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [289b 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2c3a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a9b 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to txid-index +peer1.org1.example.com | [2864 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [289c 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2c3b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a9c 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx number:[0] ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to blockNumTranNum index +peer1.org1.example.com | [2865 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [289d 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c3c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a9d 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97566], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [289e 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2866 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2c3d 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a9e 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [289f 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2867 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org2.example.com | [2c3e 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a9f 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [28a0 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2868 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2c3f 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [2aa0 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [28a1 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2869 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0033ce000 +peer0.org2.example.com | [2c40 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aa1 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [28a2 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286a 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [47c5763c-8653-4b9f-97c1-250e07bc99e5] +peer0.org2.example.com | [2c41 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [2aa2 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [28a3 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [286b 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2c42 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 72 83 b0 51 9b 32 a5 1b 04 59 51 d5 cb 7e 7e |.r..Q.2...YQ..~~| +peer1.org2.example.com | [2aa3 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [28a4 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286c 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [47c5763c-8653-4b9f-97c1-250e07bc99e5] +peer0.org2.example.com | 00000010 ee 03 d3 e8 04 0f 97 4a b1 e8 ee 90 96 e8 e8 db |.......J........| +peer1.org2.example.com | [2aa4 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [28a5 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [286d 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2c43 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db b0 2c 17 44 92 d0 d1 1b 15 b9 |0E.!...,.D......| +peer1.org2.example.com | [2aa5 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [28a6 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [286e 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [9d9bd93f-d9d5-4db4-9f2a-9e11ac367aa8] +peer0.org2.example.com | 00000010 60 fa c0 dc 55 af 1e cf 03 12 81 1b d8 19 80 9a |`...U...........| +peer1.org2.example.com | [2aa6 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [28a8 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [286f 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9d9bd93f-d9d5-4db4-9f2a-9e11ac367aa8] +peer0.org2.example.com | 00000020 83 28 85 bd 1b 02 20 74 a2 ab 34 92 d9 0b a9 d6 |.(.... t..4.....| +peer1.org2.example.com | [2aa7 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [28a7 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2870 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 gate 1602702120105618500 evaluation starts +peer0.org2.example.com | 00000030 f4 8a 81 b5 06 d0 e9 1b bd 92 7e ba 61 74 5e 09 |..........~.at^.| +peer1.org2.example.com | [2aa8 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [28a9 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2871 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 26 d4 50 87 f2 06 9a |&.P....| +peer1.org2.example.com | [2aa9 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [28aa 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2872 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2c44 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aaa 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [28ab 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2873 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 principal matched by identity 0 +peer0.org2.example.com | [2c45 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aab 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28ac 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2874 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 1b 98 bd 78 03 45 58 8d f8 dc 77 22 ff b6 d5 |....x.EX...w"...| +peer0.org2.example.com | [2c46 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aac 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 b5 cc e7 b3 b3 e7 84 2f b1 62 40 16 e5 4a c9 a1 |......./.b@..J..| +peer0.org1.example.com | [28ad 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c47 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org2.example.com | [2aad 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2875 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 e6 f5 4a 44 f9 fd 23 6f 73 f2 db |0D. u..JD..#os..| +peer0.org1.example.com | [28ae 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c48 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org2.example.com | [2aae 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 94 10 af 74 b7 7f 02 c5 28 78 73 aa 3b 4b 12 ab |...t....(xs.;K..| +peer0.org1.example.com | [28af 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c49 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aaf 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | 00000020 8a 7a ed 79 02 20 6c 16 1d 7b 22 87 af a0 55 cd |.z.y. l..{"...U.| +peer0.org1.example.com | [28b0 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c4a 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ab0 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 17 97 7e 5c 51 6f d3 98 4f 53 07 ec a7 b2 a5 |...~\Qo..OS.....| +peer1.org1.example.com | 00000030 a3 05 bf be 46 84 23 02 55 ec 84 b8 d3 8f d8 ab |....F.#.U.......| +peer0.org1.example.com | [28b1 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c4b 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 e5 84 10 de 43 dc 6b 6b 10 0e c7 e4 e6 86 8e 61 |....C.kk.......a| +peer1.org1.example.com | 00000040 a7 5a d0 a6 1e 51 |.Z...Q| +peer0.org1.example.com | [28b2 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c4c 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ab1 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 8a a3 fb 0b e8 b7 68 ea 89 bc |0E.!........h...| +peer1.org1.example.com | [2876 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [28b3 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c4d 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 ea 1e 92 78 10 bf d0 11 cb e0 af 5b 73 5b 5c 8e |...x.......[s[\.| +peer1.org1.example.com | [2877 10-14 19:02:00.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [28b4 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41778 +peer0.org2.example.com | [2c4e 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000020 19 fd 40 49 65 02 20 3f 36 2f 8d 12 82 67 59 3c |..@Ie. ?6/...gY<| +peer1.org1.example.com | [2878 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 skipping identity 0 because it has already been used +peer0.org1.example.com | [28b5 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002bafbd0 +peer0.org2.example.com | [2c4f 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 e8 bc 1a e6 5c e2 b8 4e b3 56 db 6b 92 90 24 58 |....\..N.V.k..$X| +peer1.org1.example.com | [2879 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 principal evaluation fails +peer0.org1.example.com | [28b6 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2c50 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000040 60 20 09 fe 17 e7 a3 |` .....| +peer1.org1.example.com | [287a 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c920 gate 1602702120105618500 evaluation succeeds +peer0.org1.example.com | [28b7 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2c51 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2ab2 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [287b 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [eb79e7e3-544c-4ced-9eef-5a53ebf02330] +peer0.org1.example.com | [28b8 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2c52 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [287c 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [eb79e7e3-544c-4ced-9eef-5a53ebf02330] +peer1.org2.example.com | [2ab3 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [28b9 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c53 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [287d 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [2ab4 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [28ba 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [2c54 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [287e 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd appears to be valid +peer1.org2.example.com | [2ab5 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | [2c55 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [287f 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0033ce000 +peer1.org2.example.com | [2ab6 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [2c56 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2880 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc000413940 env 0xc00380d7c0 txn 0 +peer1.org2.example.com | [2ab7 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | [2c57 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2881 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [2ab8 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | [2c58 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2882 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 19ms +peer1.org2.example.com | [2ab9 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [2c59 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2883 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [2aba 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | [2c5a 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2884 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [2abb 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | [2c5b 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161029 +peer1.org1.example.com | [2885 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer1.org2.example.com | [2abc 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | [2c5c 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 095D3CC2CCE210846AAE1F66B04F61380C2875DEF3CC5D1AC4B809711CCF807A +peer1.org1.example.com | [2886 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2abd 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | [2c5d 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2887 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2abe 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | [2c5e 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2888 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [2abf 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | [2c5f 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [2889 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer1.org2.example.com | [2ac0 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | [2c60 10-14 19:02:10.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [288a 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [2ac1 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2c61 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [288b 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [2ac2 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [28bb 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [2c62 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [288c 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [2ac3 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28bc 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [288d 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org2.example.com | [2ac4 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28bd 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [2c63 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [288e 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [28be 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2c64 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [288f 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer1.org2.example.com | [2ac5 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28bf 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 1f ed 70 f2 e3 d0 a4 02 d7 23 49 69 67 43 f5 |g..p......#IigC.| +peer0.org2.example.com | [2c65 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2890 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2ac6 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4d ca a2 c7 65 a4 14 77 1d 6f 7d 38 18 7d 89 37 |M...e..w.o}8.}.7| +peer0.org2.example.com | [2c66 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2891 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer1.org2.example.com | [2ac7 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [28c0 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8c 4c 72 67 da c7 20 74 df fa |0E.!...Lrg.. t..| +peer0.org2.example.com | [2c67 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2892 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] marked as valid by state validator +peer1.org2.example.com | [2ac8 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 83ms (state_validation=0ms block_and_pvtdata_commit=50ms state_commit=23ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org1.example.com | 00000010 f7 90 c4 38 08 a4 60 8d de 3d 36 7f 41 a5 77 51 |...8..`..=6.A.wQ| +peer0.org2.example.com | [2c68 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2893 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002884440), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002884480)} +peer1.org2.example.com | [2ac9 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | 00000020 f3 1d 4f ef c1 02 20 65 60 d1 66 94 82 ad 96 19 |..O... e`.f.....| +peer0.org2.example.com | [2c69 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2894 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [2aca 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 f2 8c 86 7b 18 39 3a 62 84 a5 38 e1 37 65 9a c0 |...{.9:b..8.7e..| +peer0.org2.example.com | [2c6a 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2895 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [2acb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 b9 5b fb c2 25 f9 0c |.[..%..| +peer0.org2.example.com | [2c6b 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2896 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [2acc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c1 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [2c6c 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2897 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer1.org2.example.com | [2acd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28c2 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00012b180, header 0xc002a7a000 +peer0.org2.example.com | [2c6d 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2898 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer1.org2.example.com | [2ace 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c3 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org2.example.com | [2c6e 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2899 10-14 19:02:00.12 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer1.org2.example.com | [2acf 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28c4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] processing txid: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d +peer0.org2.example.com | [2c6f 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [289a 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +peer0.org2.example.com | [2c70 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [289b 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28c6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org2.example.com | [2c71 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [289c 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad2 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org2.example.com | [2c72 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [289d 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad3 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [28c8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org2.example.com | [2c73 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [289e 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2ad4 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161025 +peer0.org1.example.com | [28c9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c74 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [289f 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad5 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 33ABF1A052A6781EBF8EEE3BFA456FC618B4DA0E5892525AC772E0A60CC940BC +peer0.org1.example.com | [28ca 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org2.example.com | [2c75 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [28a0 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ad6 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [28cb 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 gate 1602702115501457000 evaluation starts +peer0.org2.example.com | [2c76 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a1 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ad7 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [28cc 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c77 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [28a2 10-14 19:02:00.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28cd 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2ad8 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [2c78 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16102A +peer1.org1.example.com | [28a3 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [28ce 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [2ad9 10-14 19:02:00.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2c79 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7E900C0D1D1D26941D18A01C475A240A1C443B906C28E9707FC36AC4B48369A9 +peer1.org1.example.com | [28a4 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +peer0.org1.example.com | [28cf 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 principal evaluation fails +peer1.org2.example.com | [2ada 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7a 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +peer0.org1.example.com | [28d0 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 gate 1602702115501457000 evaluation fails +peer1.org2.example.com | [2adb 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7b 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | ] +peer0.org1.example.com | [28d1 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [2adc 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7c 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [28a5 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to txid-index +peer0.org1.example.com | [28d2 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [2add 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2c7d 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28a6 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx number:[0] ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to blockNumTranNum index +peer0.org1.example.com | [28d3 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer1.org2.example.com | [2ade 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2c7e 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28a7 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97566], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [28d4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 gate 1602702115503036900 evaluation starts +peer1.org2.example.com | [2adf 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c80 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28a8 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [28d5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ae0 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c7f 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [28a9 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [28d6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2c82 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c81 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28aa 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [28d7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [2c83 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae1 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28ab 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [28d8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [2c84 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae2 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ac 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [28d9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [2c85 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2ae3 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ad 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [28da 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 principal matched by identity 0 +peer0.org2.example.com | [2c86 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae4 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [28ae 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [28db 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 1f ed 70 f2 e3 d0 a4 02 d7 23 49 69 67 43 f5 |g..p......#IigC.| +peer0.org2.example.com | [2c87 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae5 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28af 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | 00000010 4d ca a2 c7 65 a4 14 77 1d 6f 7d 38 18 7d 89 37 |M...e..w.o}8.}.7| +peer0.org2.example.com | [2c88 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae6 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28b0 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [28dc 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8c 4c 72 67 da c7 20 74 df fa |0E.!...Lrg.. t..| +peer0.org2.example.com | [2c89 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ae7 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28b1 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | 00000010 f7 90 c4 38 08 a4 60 8d de 3d 36 7f 41 a5 77 51 |...8..`..=6.A.wQ| +peer0.org2.example.com | [2c8a 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ae8 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28b2 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | 00000020 f3 1d 4f ef c1 02 20 65 60 d1 66 94 82 ad 96 19 |..O... e`.f.....| +peer0.org2.example.com | [2c8b 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2ae9 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 f2 8c 86 7b 18 39 3a 62 84 a5 38 e1 37 65 9a c0 |...{.9:b..8.7e..| +peer0.org2.example.com | [2c8c 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org2.example.com | [2aea 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28b3 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | 00000040 b9 5b fb c2 25 f9 0c |.[..%..| +peer0.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org2.example.com | [2aeb 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [28b4 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [28dd 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c8d 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org2.example.com | [2aec 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28b5 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | [28de 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 gate 1602702115503036900 evaluation succeeds +peer0.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org2.example.com | [2aed 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [28b6 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | [28df 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org2.example.com | [2aee 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28b8 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28e0 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org2.example.com | [2aef 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28b9 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28e1 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org2.example.com | [2af0 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28ba 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e2 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org2.example.com | [2c8e 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [2af1 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28bc 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [28e3 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2af2 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28bd 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 46ms (state_validation=0ms block_and_pvtdata_commit=30ms state_commit=4ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org1.example.com | [28e4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +peer0.org2.example.com | [2c8f 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 03 2a 5d 70 86 b3 23 69 8c 82 |0E.!...*]p..#i..| +peer1.org2.example.com | [2af3 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 gate 1602702120424203500 evaluation starts +peer1.org1.example.com | [28b7 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [28e5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +peer0.org2.example.com | 00000010 a3 a1 58 8f 18 9a 01 3c a8 ad c4 48 cc 59 a4 6a |..X....<...H.Y.j| +peer1.org2.example.com | [2af4 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28be 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | [28e6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000020 ec 4d 33 28 9c 02 20 4b f4 ed 93 50 69 85 f0 02 |.M3(.. K...Pi...| +peer1.org2.example.com | [2af5 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [28bb 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [28e7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org2.example.com | 00000030 f7 0f 42 c0 0c 7e 2a 3b e7 9e 76 03 96 15 85 25 |..B..~*;..v....%| +peer1.org2.example.com | [2af6 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [28bf 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [28e8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +peer0.org2.example.com | 00000040 13 61 22 f7 98 34 d4 |.a"..4.| +peer1.org2.example.com | [2af7 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 principal evaluation fails +peer1.org1.example.com | [28c0 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28e9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [2c90 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2af8 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa6270 gate 1602702120424203500 evaluation fails +peer0.org1.example.com | [28ea 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org1.example.com | [28c1 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c91 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2af9 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28eb 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] handling GET_STATE from chaincode +peer1.org1.example.com | [28c2 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c92 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2afa 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28ec 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] getting state for chaincode exp02, key a, channel businesschannel +peer1.org1.example.com | [28c3 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c93 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2afb 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [28ed 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org1.example.com | [28c4 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c94 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2afc 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 gate 1602702120424494100 evaluation starts +peer0.org1.example.com | [28ee 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Completed GET_STATE. Sending RESPONSE +peer1.org1.example.com | [28c5 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c95 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2afd 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28ef 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [28c6 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c96 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2afe 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [28f0 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] notifying Txid:5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, channelID:businesschannel +peer1.org1.example.com | [28c7 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 gate 1602702120180210800 evaluation starts +peer0.org2.example.com | [2c97 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2aff 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 principal matched by identity 0 +peer0.org1.example.com | [28f1 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [28c8 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c98 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b00 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 38 52 e9 9f f8 2b d8 7a b8 1f 4d 59 e1 f4 32 |n8R...+.z..MY..2| +peer0.org1.example.com | [28f2 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5e22eae9] Exit chaincode: name:"exp02" (4ms) +peer1.org1.example.com | [28c9 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | 00000010 d8 55 e8 45 a4 80 b0 18 35 75 0d 0b 4b 24 ad a5 |.U.E....5u..K$..| +peer0.org2.example.com | [2c99 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [28f3 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [28ca 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 principal matched by identity 0 +peer1.org2.example.com | [2b02 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c9a 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28f4 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +peer1.org1.example.com | [28cb 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 17 97 7e 5c 51 6f d3 98 4f 53 07 ec a7 b2 a5 |...~\Qo..OS.....| +peer1.org2.example.com | [2b03 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c9b 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28f5 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Exit +peer1.org1.example.com | 00000010 e5 84 10 de 43 dc 6b 6b 10 0e c7 e4 e6 86 8e 61 |....C.kk.......a| +peer1.org2.example.com | [2b01 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 e2 81 c9 2f 58 7b af cd ac 34 |0E.!...../X{...4| +peer0.org2.example.com | [2c9c 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [28f6 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +peer1.org1.example.com | [28cc 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 8a a3 fb 0b e8 b7 68 ea 89 bc |0E.!........h...| +peer1.org2.example.com | 00000010 c0 5f 75 d6 82 0b a4 bb 58 50 7d 21 bf c4 52 98 |._u.....XP}!..R.| +peer0.org2.example.com | [2c9d 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28f7 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] escc for chaincode name:"exp02" is escc +peer1.org1.example.com | 00000010 ea 1e 92 78 10 bf d0 11 cb e0 af 5b 73 5b 5c 8e |...x.......[s[\.| +peer1.org2.example.com | 00000020 a2 dc 72 09 f6 02 20 26 6f 2b 4f 92 e5 22 c0 73 |..r... &o+O..".s| +peer0.org2.example.com | [2c9e 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [28f8 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, chaincode: exp02} +peer1.org1.example.com | 00000020 19 fd 40 49 65 02 20 3f 36 2f 8d 12 82 67 59 3c |..@Ie. ?6/...gY<| +peer1.org2.example.com | 00000030 5e b4 71 4e ad 21 e4 a5 d9 8e 2f ba f4 50 4a a9 |^.qN.!..../..PJ.| +peer0.org2.example.com | [2c9f 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 gate 1602702130195255900 evaluation starts +peer0.org1.example.com | [28f9 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A204D97F6D0E07B02B2CB10AD339963...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000030 e8 bc 1a e6 5c e2 b8 4e b3 56 db 6b 92 90 24 58 |....\..N.V.k..$X| +peer1.org2.example.com | 00000040 49 10 40 1e 0d 48 77 |I.@..Hw| +peer0.org2.example.com | [2ca0 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28fa 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6AD822634A59BFB64D73CAD62DBAA278E299DA144D0A9BB57390EF16FE11B1AC +peer1.org1.example.com | 00000040 60 20 09 fe 17 e7 a3 |` .....| +peer1.org2.example.com | [2b04 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ca1 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [28fb 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, chaincode: exp02} +peer1.org1.example.com | [28cd 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b05 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fa67e0 gate 1602702120424494100 evaluation succeeds +peer0.org2.example.com | [2ca2 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 principal matched by identity 0 +peer0.org1.example.com | [28fc 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Exit +peer1.org1.example.com | [28ce 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cbfa0 gate 1602702120180210800 evaluation succeeds +peer1.org2.example.com | [2b06 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ca3 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer0.org1.example.com | [28fd 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +peer1.org1.example.com | [28cf 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b07 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer0.org1.example.com | [28fe 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41778 +peer1.org1.example.com | [28d1 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b08 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ca4 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer0.org1.example.com | [28ff 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41778 grpc.code=OK grpc.call_duration=18.4622ms +peer1.org1.example.com | [28d0 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b09 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer0.org1.example.com | [2900 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [28d2 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b0a 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer0.org1.example.com | [2901 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [28d3 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b0b 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer0.org1.example.com | [2902 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [28d4 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b0c 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer0.org1.example.com | [2903 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161026 +peer1.org1.example.com | [28d5 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2b0d 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2ca5 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2904 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B7F8E5EC1BD732E60B072D283D530FD657422FB2F1E8A2994B72C17CCE56A341 +peer1.org1.example.com | [28d6 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b0e 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2ca6 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c81d0 gate 1602702130195255900 evaluation succeeds +peer0.org1.example.com | [2905 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [28d7 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b0f 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ca7 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2906 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [28d8 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2b10 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ca8 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2907 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [28d9 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b11 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ca9 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2908 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [28da 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b12 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2caa 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2909 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28db 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b13 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cab 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [290a 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28dc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b14 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cac 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [290b 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28dd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b15 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cad 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [28de 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [290c 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2b16 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cae 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org1.example.com | [28df 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [290d 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b17 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org1.example.com | [28e0 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [290e 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b18 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2caf 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer0.org1.example.com | [2910 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e1 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b19 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer0.org1.example.com | [290f 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [28e2 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1a 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer0.org1.example.com | [2911 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28e3 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer0.org1.example.com | [2913 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e4 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org2.example.com | [2b1c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2914 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28e5 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cb0 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b1d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2915 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28e6 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2cb1 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b1e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2916 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [28e7 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cb2 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b1f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2917 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +peer1.org1.example.com | [28e8 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2cb3 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2b20 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +peer1.org1.example.com | [28e9 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b21 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cb4 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer0.org1.example.com | [2918 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +peer1.org1.example.com | [28ea 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b22 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer0.org1.example.com | 00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +peer1.org1.example.com | [28eb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b23 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cb5 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer0.org1.example.com | 00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +peer1.org1.example.com | [28ec 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b24 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer0.org1.example.com | 00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +peer1.org1.example.com | [28ed 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b25 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer0.org1.example.com | 00000040 e6 82 cf 5e 48 73 |...^Hs| +peer1.org1.example.com | [28ee 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b26 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28ef 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b27 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 1d 3f 52 93 7d 0e |.?R.}.| +peer0.org1.example.com | [291a 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b28 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cb6 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [291b 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b29 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cb7 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2912 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [28f2 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b2a 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2cb8 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [291c 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28f3 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b2b 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cb9 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [291d 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f4 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b2c 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2cba 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [291e 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28f5 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2b2d 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cbb 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [291f 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28f6 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b2e 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cbc 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2920 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28f7 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b2f 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2cbd 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2921 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [28f8 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b30 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2cbe 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2922 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [28f9 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b31 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2cbf 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28fa 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2923 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +peer1.org2.example.com | [2b32 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 gate 1602702120612238800 evaluation starts +peer0.org2.example.com | [2cc0 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28fb 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +peer1.org2.example.com | [2b33 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cc1 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28fc 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2924 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +peer1.org2.example.com | [2b34 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2cc2 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28fd 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 gate 1602702120248618600 evaluation starts +peer0.org1.example.com | 00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +peer1.org2.example.com | [2b35 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2cc3 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +peer1.org2.example.com | [2b36 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 principal evaluation fails +peer0.org2.example.com | [2cc4 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 gate 1602702130205566400 evaluation starts +peer0.org1.example.com | 00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +peer1.org1.example.com | [28fe 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b37 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f546f0 gate 1602702120612238800 evaluation fails +peer0.org2.example.com | [2cc5 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 e6 82 cf 5e 48 73 |...^Hs| +peer1.org1.example.com | [28ff 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2b38 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cc6 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2925 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2900 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 principal matched by identity 0 +peer1.org2.example.com | [2b39 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2cc7 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 principal matched by identity 0 +peer0.org1.example.com | [2926 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2901 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 ab f1 a0 52 a6 78 1e bf 8e ee 3b fa 45 6f c6 |3...R.x....;.Eo.| +peer1.org2.example.com | [2b3a 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2cc8 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer0.org1.example.com | [2927 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 18 b4 da 0e 58 92 52 5a c7 72 e0 a6 0c c9 40 bc |....X.RZ.r....@.| +peer1.org2.example.com | [2b3b 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 gate 1602702120612501500 evaluation starts +peer0.org2.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer0.org1.example.com | [2928 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2902 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 72 25 4a 02 f1 6c 9b a9 f8 26 06 |0D. jr%J..l...&.| +peer1.org2.example.com | [2b3c 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cc9 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer0.org1.example.com | [2929 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 00 31 c9 e4 63 cd ce 5d f2 ea 51 54 95 33 b6 77 |.1..c..]..QT.3.w| +peer1.org2.example.com | [2b3d 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer0.org1.example.com | [292a 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | 00000020 03 7b 95 ca 02 20 59 75 75 f8 14 b0 3a 2f 67 47 |.{... Yuu...:/gG| +peer1.org2.example.com | [2b3e 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 principal matched by identity 0 +peer0.org2.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer0.org1.example.com | [292b 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 38 7b b5 ea eb 10 c8 4d b6 f1 a7 69 e7 e4 ba 73 |8{.....M...i...s| +peer1.org2.example.com | [2b3f 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 0b d0 83 d9 74 00 30 5d a2 da 77 13 c2 0d fb |M....t.0]..w....| +peer0.org2.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer0.org1.example.com | [292c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | 00000040 0e 00 dc b7 8b 09 |......| +peer1.org2.example.com | 00000010 8f 10 65 de 19 a1 ed 42 2b d0 af c4 24 39 cb ef |..e....B+...$9..| +peer0.org2.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer0.org1.example.com | [292d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 gate 1602702117320268500 evaluation starts +peer1.org1.example.com | [2903 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b40 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 22 08 68 7f 7b 2d 80 52 b8 19 05 |0D. .".h.{-.R...| +peer0.org2.example.com | [2cca 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [292e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2904 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e1940 gate 1602702120248618600 evaluation succeeds +peer1.org2.example.com | 00000010 3e ff 87 c5 83 38 5e 60 cd 77 29 e1 c3 72 47 c8 |>....8^`.w)..rG.| +peer0.org2.example.com | [2ccb 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4a10 gate 1602702130205566400 evaluation succeeds +peer0.org1.example.com | [292f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2905 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 52 78 da 6c 02 20 7e e8 e8 6a c5 39 5d 2b 36 27 |Rx.l. ~..j.9]+6'| +peer0.org2.example.com | [2ccc 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2930 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 principal matched by identity 0 +peer1.org1.example.com | [2906 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 a2 90 c4 50 d3 0b 6c 52 0f 48 fb 12 30 00 aa 4d |...P..lR.H..0..M| +peer0.org2.example.com | [2ccd 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2931 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 60 23 8e 2f 2e 9c c3 53 dd 80 25 c3 de f5 72 |<`#./...S..%...r| +peer1.org1.example.com | [2907 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 16 f2 bb 7e 39 8d |...~9.| +peer0.org2.example.com | [2cce 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 0f ee 92 30 ff d1 2e ce ce 04 c9 a6 a3 2e 23 e6 |...0..........#.| +peer1.org1.example.com | [2908 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b41 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ccf 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2932 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 39 6a 65 ef 43 f6 6c 6b 65 a3 |0E.!..9je.C.lke.| +peer1.org1.example.com | [2909 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b42 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f54c60 gate 1602702120612501500 evaluation succeeds +peer0.org2.example.com | [2cd0 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 d6 ef e9 ce e7 05 37 d7 ba 32 82 33 e3 7e 20 81 |......7..2.3.~ .| +peer1.org1.example.com | [290a 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b43 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 f1 98 1d 9b bb 02 20 1a 27 ee dc ac 66 f6 83 a0 |...... .'...f...| +peer0.org2.example.com | [2cd1 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290b 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b44 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 24 f6 12 42 cb c8 ab a5 21 3c 83 09 6d 66 37 b4 |$..B....!<..mf7.| +peer0.org2.example.com | [2cd2 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [290c 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2b45 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 3f 20 a7 51 d8 52 08 |? .Q.R.| +peer0.org2.example.com | [2cd3 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org1.example.com | [290d 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b46 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2933 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org1.example.com | [290e 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b47 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2934 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 gate 1602702117320268500 evaluation succeeds +peer0.org2.example.com | [2cd4 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org1.example.com | [290f 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2b48 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2935 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org1.example.com | [2910 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b49 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2936 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org1.example.com | [2911 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b4a 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2937 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org1.example.com | [2912 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b4b 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2938 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org1.example.com | [2913 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b4c 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2939 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [2cd5 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2914 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b4d 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [293a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org2.example.com | [2cd6 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2915 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b4e 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [293b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd7 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2916 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b4f 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [293c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [2cd8 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2917 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b50 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [293d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org2.example.com | [2cd9 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org1.example.com | [2918 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b51 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [293e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org1.example.com | [2919 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b52 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [293f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org2.example.com | [2cda 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org1.example.com | [291a 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b53 10-14 19:02:00.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2940 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org1.example.com | [291b 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b54 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2941 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org1.example.com | [291c 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2b55 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2942 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Obtaining identity +peer1.org2.example.com | [2b56 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2943 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | 00000040 1d 3f 52 93 7d 0e |.?R.}.| +peer1.org1.example.com | [291e 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b57 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2944 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2cdb 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [291f 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2b58 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2945 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0036d9f00 env 0xc002a7bd60 txn 0 +peer0.org2.example.com | [2cdc 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2920 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b59 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2946 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002a7bd60 +peer0.org2.example.com | [2cdd 10-14 19:02:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2921 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b5a 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2947 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer0.org2.example.com | [2cde 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2922 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2948 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2b5b 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2cdf 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2923 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2949 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2b5c 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ce0 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2924 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [294a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2b5d 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2ce1 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2925 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b5e 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [294b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [2ce2 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 9f ac 79 45 4e 68 5c 24 72 a5 a8 2c 9c 4a c6 |...yENh\$r..,.J.| +peer1.org1.example.com | [2926 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b5f 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [294c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | 00000010 d0 20 86 ca 47 fa ea 7e 9c 43 0b e3 1f 46 a6 a3 |. ..G..~.C...F..| +peer1.org1.example.com | [2927 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b60 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [294d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +peer0.org2.example.com | [2ce3 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ec f8 74 d7 fc e8 83 63 55 9a c4 |0D. P..t....cU..| +peer1.org1.example.com | [2928 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b61 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA| +peer0.org2.example.com | 00000010 9a b8 39 29 d1 0b bf cb 15 65 d2 e0 b1 c7 4c bf |..9).....e....L.| +peer1.org1.example.com | [2929 10-14 19:02:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b62 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [294e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +peer0.org2.example.com | 00000020 a1 71 58 b0 02 20 42 b3 6d 3b 29 3a 64 5b 24 cf |.qX.. B.m;):d[$.| +peer1.org1.example.com | [292a 10-14 19:02:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102C +peer1.org2.example.com | [2b63 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +peer0.org2.example.com | 00000030 94 e9 37 32 c6 33 c0 72 e0 55 87 25 b9 0c cd 71 |..72.3.r.U.%...q| +peer1.org1.example.com | [292b 10-14 19:02:00.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6E3852E99FF82BD87AB81F4D59E1F432D855E845A480B01835750D0B4B24ADA5 +peer1.org2.example.com | [2b64 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +peer0.org2.example.com | 00000040 7d 19 0a 64 f7 c9 |}..d..| +peer1.org1.example.com | [292c 10-14 19:02:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b65 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +peer0.org2.example.com | [2ce4 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [292d 10-14 19:02:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2b66 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 2a 75 63 d1 1c 2e ca |*uc....| +peer0.org2.example.com | [2ce5 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [292e 10-14 19:02:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [2b67 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [294f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [2ce6 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [292f 10-14 19:02:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2b68 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2950 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002709800, header channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +peer0.org2.example.com | [2ce7 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2930 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b69 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2951 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2ce8 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2931 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b6a 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2952 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2ce9 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2932 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2b6b 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2953 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2cea 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2933 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b6c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2954 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2ceb 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2934 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2b6d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2955 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +peer0.org2.example.com | [2cec 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2935 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2b6e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2956 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2ced 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2936 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b6f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2957 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002bbc400 +peer1.org1.example.com | [2937 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cee 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b70 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2958 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8f78ea8b-b0af-49f0-9adb-0fc74834e8ee] +peer1.org1.example.com | [2938 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cef 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b71 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2959 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2939 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cf0 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b72 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [295a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8f78ea8b-b0af-49f0-9adb-0fc74834e8ee] +peer1.org1.example.com | [293a 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2cf1 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b73 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [295b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [293b 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2cf2 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [295c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7794e5b5-1dc4-4ef0-8c3a-186ed9775e0b] +peer1.org2.example.com | [2b74 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 gate 1602702121902776500 evaluation starts +peer1.org1.example.com | [293c 10-14 19:02:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [293d 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cf3 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [295d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7794e5b5-1dc4-4ef0-8c3a-186ed9775e0b] +peer1.org2.example.com | [2b75 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [293e 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cf4 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [295e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 gate 1602702117328419700 evaluation starts +peer1.org2.example.com | [2b76 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [293f 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cf5 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [295f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b77 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2940 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2cf6 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2960 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2b78 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 principal evaluation fails +peer1.org1.example.com | [2941 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 0b d0 83 d9 74 00 30 5d a2 da 77 13 c2 0d fb |M....t.0]..w....| +peer0.org2.example.com | [2cf7 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2961 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal matched by identity 0 +peer1.org2.example.com | [2b79 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8790 gate 1602702121902776500 evaluation fails +peer1.org1.example.com | 00000010 8f 10 65 de 19 a1 ed 42 2b d0 af c4 24 39 cb ef |..e....B+...$9..| +peer0.org2.example.com | [2cf8 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2962 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 53 be 02 89 f0 4b 37 15 13 6b 2a a5 16 4a 08 |.S....K7..k*..J.| +peer1.org2.example.com | [2b7a 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2942 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 22 08 68 7f 7b 2d 80 52 b8 19 05 |0D. .".h.{-.R...| +peer0.org2.example.com | [2cf9 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 04 f8 95 37 b7 bf f1 ab 1e 1a 22 93 92 07 32 29 |...7......"...2)| +peer1.org2.example.com | [2b7b 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 3e ff 87 c5 83 38 5e 60 cd 77 29 e1 c3 72 47 c8 |>....8^`.w)..rG.| +peer0.org2.example.com | [2cfa 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2963 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 d5 0c 55 55 c3 fd 5a a5 f2 b3 |0E.!....UU..Z...| +peer1.org2.example.com | [2b7c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 52 78 da 6c 02 20 7e e8 e8 6a c5 39 5d 2b 36 27 |Rx.l. ~..j.9]+6'| +peer0.org2.example.com | [2cfb 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 99 8e a5 12 7d ef c0 95 f3 db f0 7a 60 f5 58 ff |....}......z`.X.| +peer1.org2.example.com | [2b7d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 gate 1602702121903094900 evaluation starts +peer1.org1.example.com | 00000030 a2 90 c4 50 d3 0b 6c 52 0f 48 fb 12 30 00 aa 4d |...P..lR.H..0..M| +peer0.org2.example.com | [2cfc 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 cb d1 69 c7 e5 02 20 1c 97 e9 43 81 3b b8 eb ca |..i... ...C.;...| +peer1.org2.example.com | [2b7e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2cfd 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 16 f2 bb 7e 39 8d |...~9.| +peer0.org1.example.com | 00000030 32 54 3c c1 64 76 39 8f 8a ed 8a 1b f5 45 b2 d0 |2T<.dv9......E..| +peer1.org2.example.com | [2b7f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2cfe 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2943 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 e7 4e 10 38 be 67 4d |.N.8.gM| +peer1.org2.example.com | [2b80 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 principal matched by identity 0 +peer0.org2.example.com | [2cff 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2944 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2964 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b81 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | [2d00 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2945 10-14 19:02:00.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2965 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2d01 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2946 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2966 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 skipping identity 0 because it has already been used +peer1.org2.example.com | [2b82 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | [2d02 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2947 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2967 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal evaluation fails +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | [2d03 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2948 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2968 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 gate 1602702117328419700 evaluation succeeds +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | [2d04 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2949 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2969 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7a6cb042-e2a2-41af-ac7b-8d5d9e4b9478] +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | [2d05 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [294a 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [296a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7a6cb042-e2a2-41af-ac7b-8d5d9e4b9478] +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2d06 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [294b 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [296b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [2b83 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d07 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [294c 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [296c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 appears to be valid +peer1.org2.example.com | [2b84 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef8d00 gate 1602702121903094900 evaluation succeeds +peer0.org2.example.com | [2d08 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [294d 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [296d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002bbc400 +peer1.org2.example.com | [2b85 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d09 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [294e 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [296e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0036d9f00 env 0xc002a7bd60 txn 0 +peer1.org2.example.com | [2b86 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d0a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org1.example.com | [294f 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [296f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [2b87 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer1.org1.example.com | [2950 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2970 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 9ms +peer1.org2.example.com | [2b88 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d0b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org1.example.com | [2951 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2971 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [2b89 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org1.example.com | [2952 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2972 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [2b8a 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org1.example.com | [2953 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2973 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [2b8b 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer0.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer0.org1.example.com | [2974 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2b8c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d0c 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [2954 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b8d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2975 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [2955 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b8e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2976 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [2d0d 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed c0 6f 8f 91 b3 ff f9 77 0f 7a |0E.!...o.....w.z| +peer1.org1.example.com | [2956 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b8f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2977 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org2.example.com | 00000010 53 01 bb bc 8e 57 ca c6 49 57 8d b4 8a 7f 71 e4 |S....W..IW....q.| +peer1.org1.example.com | [2957 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b90 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 gate 1602702121907342700 evaluation starts +peer0.org1.example.com | [2978 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | 00000020 a7 58 c9 29 11 02 20 29 82 ab f1 69 61 01 45 2b |.X.).. )...ia.E+| +peer1.org1.example.com | [2958 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b91 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2979 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 c9 4e 90 e7 ee c0 cf 57 68 68 dd da 73 64 00 f4 |.N.....Whh..sd..| +peer1.org1.example.com | [2959 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b92 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [297a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 f8 5c 24 1a ab 0e f4 |.\$....| +peer1.org1.example.com | [295a 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b93 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [297b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d0e 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [295b 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b94 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [297c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d0f 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [295c 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b95 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 principal evaluation fails +peer0.org1.example.com | [297d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d10 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [295d 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b96 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9930 gate 1602702121907342700 evaluation fails +peer0.org1.example.com | [297e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d11 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [295e 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b97 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [297f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [2d12 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [295f 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b98 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2980 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [2d13 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2960 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b99 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2981 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2d14 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2961 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b9a 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 gate 1602702121907730800 evaluation starts +peer0.org1.example.com | [2982 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [2d15 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2962 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b9b 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2983 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2d16 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2963 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b9c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2984 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2d17 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b9d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 principal matched by identity 0 +peer1.org1.example.com | [2964 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2985 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2d18 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b9e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | [2965 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2986 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] marked as valid by state validator +peer0.org2.example.com | [2d19 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2966 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | [2987 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00347aec0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00347af00)} +peer0.org2.example.com | [2d1a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2b9f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [2988 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [2d1b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | [2967 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | [2989 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [2d1c 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | [298a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [2d1d 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | [298b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [2d1f 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | [298c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [2d20 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ba0 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [298d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [2d21 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ba1 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ef9ea0 gate 1602702121907730800 evaluation succeeds +peer1.org1.example.com | [2968 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [298e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org2.example.com | [2d1e 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ba2 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2969 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [298f 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +peer0.org2.example.com | [2d22 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [296a 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ba3 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +peer0.org2.example.com | [2d23 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [296b 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ba4 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | ] +peer0.org2.example.com | [2d24 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [296c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ba5 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2990 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to txid-index +peer0.org2.example.com | [2d25 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [296d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 gate 1602702121901252500 evaluation starts +peer1.org2.example.com | [2ba6 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2991 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to blockNumTranNum index +peer0.org2.example.com | [2d26 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [296e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ba7 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2992 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org2.example.com | [2d27 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [296f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2ba8 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2993 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org2.example.com | [2d28 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 gate 1602702130414309200 evaluation starts +peer1.org1.example.com | [2970 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ba9 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2994 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org2.example.com | [2d29 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2971 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 principal evaluation fails +peer1.org2.example.com | [2baa 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2995 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org2.example.com | [2d2a 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2972 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bc0 gate 1602702121901252500 evaluation fails +peer1.org2.example.com | [2bab 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2996 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [2d2b 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 principal matched by identity 0 +peer1.org1.example.com | [2973 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bac 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2997 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [2d2c 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 e0 96 01 24 0a 44 d8 43 d6 45 e4 d8 bc 00 1f |....$.D.C.E.....| +peer1.org1.example.com | [2974 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bad 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2998 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | 00000010 97 d8 77 cb 20 dc 01 ee 7d 9b bd 67 df 19 cd dd |..w. ...}..g....| +peer1.org1.example.com | [2975 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2bae 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2999 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [2d2d 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 d9 34 ad ac c8 1b 6c 67 ab 1a |0E.!...4....lg..| +peer1.org1.example.com | [2976 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 gate 1602702121901515000 evaluation starts +peer1.org2.example.com | [2baf 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 gate 1602702121909498100 evaluation starts +peer0.org1.example.com | [299a 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | 00000010 98 48 8b 7a 08 f8 8c 25 50 ce d2 14 3b 0b 3a b0 |.H.z...%P...;.:.| +peer1.org1.example.com | [2977 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bb0 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [299b 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2978 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2bb1 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [299c 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | 00000020 03 a3 0d 12 dc 02 20 48 e7 23 f3 5d e0 ea 88 03 |...... H.#.]....| +peer1.org1.example.com | [2979 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 principal matched by identity 0 +peer1.org2.example.com | [2bb2 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [299d 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org2.example.com | 00000030 f3 be 38 9e ab 2c ef 54 33 0f d3 f2 54 60 04 60 |..8..,.T3...T`.`| +peer1.org1.example.com | [297a 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | [2bb3 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 principal evaluation fails +peer0.org1.example.com | [299e 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | 00000040 7a 74 2c cc 42 42 79 |zt,.BBy| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2bb4 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee91a0 gate 1602702121909498100 evaluation fails +peer0.org1.example.com | [299f 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org2.example.com | [2d2e 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [297b 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | [2bb5 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29a0 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org2.example.com | [2d2f 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ac4780 gate 1602702130414309200 evaluation succeeds +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2bb6 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29a1 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org2.example.com | [2d30 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | [2bb7 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [29a2 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org2.example.com | [2d31 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | [2bb8 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 gate 1602702121909837200 evaluation starts +peer0.org1.example.com | [29a3 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org2.example.com | [2d32 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [2bb9 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29a4 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 19ms (state_validation=3ms block_and_pvtdata_commit=10ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org2.example.com | [2d33 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2bba 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [29a5 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org2.example.com | [2d34 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [297c 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2bbb 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 principal matched by identity 0 +peer0.org2.example.com | [2d35 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [297d 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579130 gate 1602702121901515000 evaluation succeeds +peer1.org2.example.com | [2bbc 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | [29a6 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41782 +peer0.org2.example.com | [2d36 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [29a7 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002946320 +peer0.org2.example.com | [2d37 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [297e 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2bbd 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | [29a8 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2d38 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [297f 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | [29a9 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2d39 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2980 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | [29aa 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [2d3a 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2981 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | [29ab 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [2d3b 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2982 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [29ac 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2d3c 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2983 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bbe 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29ad 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b5 0e 85 56 04 98 19 a1 34 b3 a9 d1 50 28 b9 |....V....4...P(.| +peer0.org2.example.com | [2d3d 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2984 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bbf 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee9710 gate 1602702121909837200 evaluation succeeds +peer0.org1.example.com | 00000010 61 f5 e4 28 86 94 d6 55 cf 8f 00 51 a6 30 cb 76 |a..(...U...Q.0.v| +peer0.org2.example.com | [2d3e 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2985 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | [2bc0 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [29ae 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 92 98 cb ca 7a 26 a4 3c 84 86 d3 |0D. .....z&.<...| +peer0.org2.example.com | [2d3f 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2bc1 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 2b df a9 c5 a9 82 4b bb 24 dc 55 96 24 63 35 0c |+.....K.$.U.$c5.| +peer0.org2.example.com | [2d40 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2986 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | [2bc2 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 45 a2 f0 e5 02 20 12 2b f8 46 f7 de d2 3b cc e1 |E.... .+.F...;..| +peer0.org2.example.com | [2d41 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2bc3 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 01 50 2d b8 34 ab 41 77 be 77 59 db bc a2 96 de |.P-.4.Aw.wY.....| +peer0.org2.example.com | [2d42 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | [2bc4 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 d6 3c 2e 93 9c 7a |.<...z| +peer0.org2.example.com | [2d43 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | [29af 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2bc5 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d44 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [29b0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003ce540, header 0xc002946870 +peer1.org2.example.com | [2bc6 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d45 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2987 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29b1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer1.org2.example.com | [2bc7 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2d46 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2988 10-14 19:02:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29b2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] processing txid: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f +peer1.org2.example.com | [2bc8 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d47 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2989 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29b3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +peer1.org2.example.com | [2bc9 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d48 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [298a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29b4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer1.org2.example.com | [2bca 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d49 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d4a 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d4b 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29b5 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org2.example.com | [2d4c 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bcb 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29b6 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer1.org1.example.com | [298b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2d4d 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bcc 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [29b7 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [298c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d4e 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bcd 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29b8 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer1.org1.example.com | [298d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d4f 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bce 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [29b9 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 gate 1602702117712708500 evaluation starts +peer1.org1.example.com | [298e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d50 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bcf 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [29ba 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [298f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d51 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd0 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29bb 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2990 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d52 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd1 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [29bc 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [2991 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d53 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd2 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29bd 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 principal evaluation fails +peer1.org1.example.com | [2992 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d54 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd3 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29be 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 gate 1602702117712708500 evaluation fails +peer1.org1.example.com | [2993 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | [2d55 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd4 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [29bf 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2d56 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2bd5 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29c0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [2994 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | [2d57 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bd6 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [29c1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | [2d58 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bd7 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 gate 1602702121923531200 evaluation starts +peer0.org1.example.com | [29c2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 gate 1602702117714861300 evaluation starts +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | [2d59 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bd8 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29c3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | [2d5a 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bd9 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [29c4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2d5b 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2bda 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [29c5 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 principal matched by identity 0 +peer1.org1.example.com | [2995 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bdb 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 principal evaluation fails +peer0.org1.example.com | [29c6 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b5 0e 85 56 04 98 19 a1 34 b3 a9 d1 50 28 b9 |....V....4...P(.| +peer1.org1.example.com | [2996 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d5c 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bdc 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f0bf20 gate 1602702121923531200 evaluation fails +peer1.org1.example.com | [2997 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d5d 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2bdd 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 61 f5 e4 28 86 94 d6 55 cf 8f 00 51 a6 30 cb 76 |a..(...U...Q.0.v| +peer1.org1.example.com | [2998 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d5e 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bde 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [29c7 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 92 98 cb ca 7a 26 a4 3c 84 86 d3 |0D. .....z&.<...| +peer1.org1.example.com | [2999 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d5f 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bdf 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 2b df a9 c5 a9 82 4b bb 24 dc 55 96 24 63 35 0c |+.....K.$.U.$c5.| +peer1.org1.example.com | [299a 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2d60 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2be0 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 gate 1602702121923832100 evaluation starts +peer0.org1.example.com | 00000020 45 a2 f0 e5 02 20 12 2b f8 46 f7 de d2 3b cc e1 |E.... .+.F...;..| +peer1.org1.example.com | [299b 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d61 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2be1 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 01 50 2d b8 34 ab 41 77 be 77 59 db bc a2 96 de |.P-.4.Aw.wY.....| +peer1.org1.example.com | [299c 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2be2 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2d62 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 d6 3c 2e 93 9c 7a |.<...z| +peer1.org1.example.com | [299d 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2be3 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 principal matched by identity 0 +peer0.org2.example.com | [2d63 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 gate 1602702130516117400 evaluation starts +peer0.org1.example.com | [29c8 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [299e 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2be4 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | [2d64 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29c9 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 gate 1602702117714861300 evaluation succeeds +peer1.org1.example.com | [299f 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2d65 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [29ca 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [29a0 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2be5 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | [2d66 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 principal matched by identity 0 +peer0.org1.example.com | [29cb 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [29a1 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | [2d67 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Signature set satisfies policy /Channel/Application/Writers +peer1.org1.example.com | [29a2 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000010 0f 5f 09 80 8e 33 de d9 f3 96 76 ea c5 6e f9 1f |._...3....v..n..| +peer0.org1.example.com | [29cd 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer1.org1.example.com | [29a3 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | [2d68 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org1.example.com | [29ce 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [29a4 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer0.org1.example.com | [29cf 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +peer1.org1.example.com | [29a5 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2be6 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer0.org1.example.com | [29d0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Entry chaincode: name:"exp02" +peer1.org1.example.com | [29a6 10-14 19:02:02.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2be7 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e324d0 gate 1602702121923832100 evaluation succeeds +peer0.org2.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer0.org1.example.com | [29d1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [29a7 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2be8 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer0.org1.example.com | [29d2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer1.org1.example.com | [29a8 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2be9 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d69 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29d3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8a364454] Entry chaincode: name:"exp02" +peer1.org1.example.com | [29a9 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bea 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d6a 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12a50 gate 1602702130516117400 evaluation succeeds +peer0.org1.example.com | [29d4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [2beb 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29aa 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d6b 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [29d5 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | [2bec 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29ab 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2d6c 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [29d6 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] handling GET_STATE from chaincode +peer1.org2.example.com | [2bed 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29ac 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d6d 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [29d7 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] getting state for chaincode exp02, key a, channel businesschannel +peer1.org2.example.com | [2bee 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [29ad 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d6e 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [29d8 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [2bef 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [29ae 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d6f 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [29d9 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Completed GET_STATE. Sending RESPONSE +peer1.org2.example.com | [2bf0 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [29af 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d70 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [29da 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [2bf1 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [29b0 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d71 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2bf2 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29db 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] notifying Txid:8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, channelID:businesschannel +peer1.org1.example.com | [29b1 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d72 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2bf3 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [29dc 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [29b2 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d73 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2bf4 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [29dd 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8a364454] Exit chaincode: name:"exp02" (6ms) +peer1.org1.example.com | [29b3 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 gate 1602702122174427300 evaluation starts +peer0.org2.example.com | [2d74 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf5 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29de 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [29b4 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d75 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf6 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [29df 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +peer1.org1.example.com | [29b5 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2d76 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bf7 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [29e0 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Exit +peer1.org1.example.com | [29b6 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 principal matched by identity 0 +peer0.org2.example.com | [2d77 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2bf8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org1.example.com | [29e1 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Entry chaincode: name:"exp02" +peer1.org1.example.com | [29b7 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org2.example.com | [2d78 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org1.example.com | [29e2 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] escc for chaincode name:"exp02" is escc +peer1.org1.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org2.example.com | [2d79 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bf9 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org1.example.com | [29e3 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, chaincode: exp02} +peer1.org1.example.com | [29b8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org2.example.com | [2d7a 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org1.example.com | [29e4 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2049B1969BEAD8CC3A86C47C89C5DA...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org2.example.com | [2d7b 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org1.example.com | [29e5 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC2E7E90C2B27FFB45DCAC79B451C8AAC5C1947422EB886AF2D4599EB045A218 +peer1.org1.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org2.example.com | [2d7c 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive: +peer1.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org1.example.com | [29e6 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, chaincode: exp02} +peer0.org2.example.com | [2d7d 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org1.example.com | [29e7 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Exit +peer1.org1.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org2.example.com | [2d7e 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bfa 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [29e8 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +peer1.org1.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org2.example.com | [2d7f 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [29e9 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41782 +peer1.org1.example.com | [29b9 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d80 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bfb 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 43 b4 b5 36 65 d3 da 65 e6 bb |0E.!..C..6e..e..| +peer0.org1.example.com | [29ea 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41782 grpc.code=OK grpc.call_duration=19.2705ms +peer1.org1.example.com | [29ba 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003591060 gate 1602702122174427300 evaluation succeeds +peer0.org2.example.com | [2d81 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 3b 61 a3 c8 03 b7 c4 9e 65 98 e7 d9 72 8f 9d 51 |;a......e...r..Q| +peer0.org1.example.com | [29eb 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41782: read: connection reset by peer +peer1.org1.example.com | [29bb 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d82 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 fc ec 9e 22 0c 02 20 56 df 26 91 1d bf 5f f1 3b |...".. V.&..._.;| +peer0.org1.example.com | [29ec 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [29bc 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d83 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29ed 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | 00000030 18 ff 19 bb 59 d5 5a a5 e5 22 b7 1e 1c 19 19 d6 |....Y.Z.."......| +peer1.org1.example.com | [29bd 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d84 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29ee 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 c6 66 b9 32 08 a5 6c |.f.2..l| +peer1.org1.example.com | [29be 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [29ef 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d85 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bfc 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [29bf 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [29f0 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2d86 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bfd 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [29c0 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [29f1 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d87 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2bfe 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [29c1 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [29f3 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d88 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bff 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [29c2 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [29f2 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d89 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c00 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [29c3 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [29f4 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8a 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c01 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c4 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29f5 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d8b 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c02 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c5 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29f7 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08051A0C0A0565787030321203312E30 +peer0.org2.example.com | [2d8c 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2c03 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c6 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29f8 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9ADD2CEEA28135628AFF5739C8B492BE67CCDD688CE1AB9BE208E1FD958E4B27 +peer0.org2.example.com | [2d8d 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c04 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [29c7 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [29f6 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d8e 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c05 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c8 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29f9 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8f 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c06 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c9 10-14 19:02:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29fa 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d90 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c07 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29ca 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29fc 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d91 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c08 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [29cb 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [29fd 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d92 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c09 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [29cc 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [29fb 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d93 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c0a 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29cd 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29fe 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | [2d94 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 gate 1602702130587088100 evaluation starts +peer1.org2.example.com | [2c0b 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [29ce 10-14 19:02:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > alive: alive: alive: +peer0.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer0.org2.example.com | [2d95 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c0c 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29cf 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [29ff 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer0.org2.example.com | [2d96 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2c0d 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [29d1 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0D0DF898CA1FC9E16...08061A0C0A0565787030321203312E30 +peer0.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer0.org2.example.com | [2d97 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 principal matched by identity 0 +peer1.org2.example.com | [2c0e 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29d0 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer0.org2.example.com | [2d98 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c ab 21 da c8 d8 1f 4e 72 9a 2e dc 15 c7 00 92 |..!....Nr.......| +peer1.org2.example.com | [2c0f 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [29d2 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer0.org2.example.com | 00000010 a2 c0 2b 81 f2 ab fb 3c cb 03 d6 ba ce 45 8b 77 |..+....<.....E.w| +peer1.org2.example.com | [2c10 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [29d4 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer0.org2.example.com | [2d99 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 00 4f 74 45 5d c1 d7 a8 7e 53 |0E.!...OtE]...~S| +peer1.org2.example.com | [2c11 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d5 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a00 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer0.org2.example.com | 00000010 23 8e d4 39 88 35 b5 bf bc d3 ea a3 7a bd 2b 60 |#..9.5......z.+`| +peer1.org2.example.com | [2c13 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d7 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer0.org2.example.com | 00000020 81 0a d8 b3 31 02 20 0d 91 f4 94 02 61 14 eb 32 |....1. .....a..2| +peer1.org2.example.com | [2c14 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d6 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a01 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer0.org2.example.com | 00000030 92 92 0d 3b 35 ea be 7c 92 55 1b d4 b9 f5 bf de |...;5..|.U......| +peer1.org2.example.com | [2c15 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d9 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer0.org2.example.com | 00000040 19 bf d6 15 e7 c6 f7 |.......| +peer1.org2.example.com | [2c12 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d8 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer0.org2.example.com | [2d9a 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c16 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29da 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer0.org2.example.com | [2d9b 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c94b60 gate 1602702130587088100 evaluation succeeds +peer1.org2.example.com | [2c17 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [29d3 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CF4888418D1CE84750B76FC4E97EA943D564999BFA67F5C53CC43D8267ADADD +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer0.org2.example.com | [2d9c 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c18 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [29db 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a02 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d9d 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [29dc 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c19 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a03 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d9e 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [29dd 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1a 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a04 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2d9f 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29de 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1b 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a05 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2da0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29df 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c1c 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a06 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29e0 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2c1d 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a07 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [29e1 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2c1e 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a08 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [29e2 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da3 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2c1f 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a09 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [29e3 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2da4 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2c20 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a0a 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 gate 1602702117897859100 evaluation starts +peer1.org1.example.com | [29e4 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2da5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c21 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a0b 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [29e5 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c22 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a0c 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [29e6 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c23 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a0d 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 principal matched by identity 0 +peer1.org1.example.com | [29e7 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [2da7 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a0e 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | [29e8 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da8 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c24 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer1.org1.example.com | [29e9 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da9 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c25 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a0f 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer1.org1.example.com | [29ea 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2daa 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2c26 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer1.org1.example.com | [29eb 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dab 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c27 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer1.org1.example.com | [29ec 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dac 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c28 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer1.org1.example.com | [29ee 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2dad 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c29 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer1.org1.example.com | [29ef 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dae 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2a 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a10 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [29ed 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2daf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c2b 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a11 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 gate 1602702117897859100 evaluation succeeds +peer1.org1.example.com | [29f0 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2db0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2c 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a12 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29f1 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | [2db1 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2c2d 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a13 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org2.example.com | [2db2 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c2e 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a14 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [29f2 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org2.example.com | [2db3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c2f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a15 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org2.example.com | [2db4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c30 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2a16 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org2.example.com | [2db5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c31 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 gate 1602702122281490100 evaluation starts +peer0.org1.example.com | [2a17 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org2.example.com | [2db6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c32 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a18 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org2.example.com | [2db7 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c33 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2a19 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29f3 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2db8 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c34 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2a1a 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29f4 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2db9 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c35 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 principal evaluation fails +peer0.org1.example.com | [2a1b 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [29f5 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dba 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c36 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee130 gate 1602702122281490100 evaluation fails +peer0.org1.example.com | [2a1c 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [29f6 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dbb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c37 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a1d 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [29f7 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dbc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 gate 1602702130594800500 evaluation starts +peer1.org2.example.com | [2c38 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c39 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2a1e 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 gate 1602702117899869700 evaluation starts +peer1.org1.example.com | [29f8 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2dbd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c3a 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 gate 1602702122281872200 evaluation starts +peer0.org1.example.com | [2a1f 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2dbe 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [29f9 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c3b 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a20 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2dbf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 principal matched by identity 0 +peer1.org1.example.com | [29fa 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c3c 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2a21 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 principal matched by identity 0 +peer1.org1.example.com | [29fb 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2dc0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | [2c3d 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 principal matched by identity 0 +peer0.org1.example.com | [2a22 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer1.org1.example.com | [29fc 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2c3e 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | [29fd 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2dc1 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [2a23 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | [29fe 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 gate 1602702122278202300 evaluation starts +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2c3f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org1.example.com | [29ff 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer1.org1.example.com | [2a00 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer1.org1.example.com | [2a01 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 principal matched by identity 0 +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer1.org1.example.com | [2a02 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org2.example.com | [2dc2 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [2a24 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org2.example.com | [2dc3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6caa0 gate 1602702130594800500 evaluation succeeds +peer1.org2.example.com | [2c40 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a25 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 gate 1602702117899869700 evaluation succeeds +peer1.org1.example.com | [2a03 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org2.example.com | [2dc4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c41 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ee720 gate 1602702122281872200 evaluation succeeds +peer0.org1.example.com | [2a26 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org2.example.com | [2dc5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c42 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a27 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org2.example.com | [2dc6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c43 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a28 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | [2dc7 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c44 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a29 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2dc8 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c45 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a2a 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a04 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2dc9 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c46 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a2b 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a05 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612220 gate 1602702122278202300 evaluation succeeds +peer0.org2.example.com | [2dca 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c47 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a2c 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a06 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dcb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c48 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a2d 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer1.org1.example.com | [2a07 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dcc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c49 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org1.example.com | [2a08 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2dcd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c4a 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a2e 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a2f 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | [2a09 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c4b 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | [2a0a 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dce 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c4c 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | [2a0b 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dcf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c4e 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org1.example.com | [2a0c 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2dd0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 gate 1602702130596077700 evaluation starts +peer1.org2.example.com | [2c4f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161026 +peer0.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org1.example.com | [2a0d 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dd1 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c50 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EEBCC85D8FBFAE89DD157C27F18CDF50F153891A023F4520CDE5292054C30F09 +peer0.org1.example.com | [2a30 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a0e 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2dd2 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2c51 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2a31 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org1.example.com | [2a0f 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2dd3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 principal matched by identity 0 +peer1.org2.example.com | [2c52 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2a32 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a10 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2dd4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | [2c53 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [2a33 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a11 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [2c54 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a34 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2a12 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 gate 1602702122289164400 evaluation starts +peer0.org2.example.com | [2dd5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | [2c55 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a35 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org1.example.com | [2a13 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | [2c56 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org1.example.com | [2a14 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | [2a36 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c57 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a15 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 principal matched by identity 0 +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | [2a37 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org2.example.com | [2c4d 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 gate 1602702122282672700 evaluation starts +peer1.org1.example.com | [2a16 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org2.example.com | [2c59 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [2dd6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org2.example.com | [2c5a 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2a17 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | [2dd7 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6dca0 gate 1602702130596077700 evaluation succeeds +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org2.example.com | [2c5b 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | [2dd8 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org2.example.com | [2c5c 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 principal evaluation fails +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org2.example.com | [2dd9 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a38 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c5d 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org2.example.com | [2dda 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a39 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c5e 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [2ddb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a3a 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c60 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a18 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ddc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a3b 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c5f 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ef430 gate 1602702122282672700 evaluation fails +peer1.org1.example.com | [2a19 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613420 gate 1602702122289164400 evaluation succeeds +peer0.org2.example.com | [2ddd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a3c 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c62 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dde 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | [2a1a 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a3d 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c58 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2a1c 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c61 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a3e 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ddf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | [2a1d 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c63 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a3f 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | [2a1b 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org2.example.com | [2c64 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a40 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | [2a1e 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org2.example.com | [2c65 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a41 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | [2a1f 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org2.example.com | [2c66 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2a42 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2a20 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c67 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 gate 1602702122308463500 evaluation starts +peer0.org1.example.com | [2a43 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2de0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a21 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | [2c68 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a44 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 gate 1602702117904160700 evaluation starts +peer0.org2.example.com | [2de1 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2c69 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2a45 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2a22 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | [2c6a 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 principal matched by identity 0 +peer0.org1.example.com | [2a46 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2de2 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2c6b 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | [2a47 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 principal matched by identity 0 +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [2a48 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | [2c6c 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | [2a49 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2a23 10-14 19:02:02.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org2.example.com | [2de3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a24 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org2.example.com | [2de4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a25 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | [2de5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a26 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | [2c6d 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org2.example.com | [2de6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [2c6e 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029efac0 gate 1602702122308463500 evaluation succeeds +peer0.org1.example.com | [2a4a 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2de7 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a27 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | [2c6f 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a4b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 gate 1602702117904160700 evaluation succeeds +peer0.org2.example.com | [2de8 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | [2c70 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a4c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2de9 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | [2c71 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a4d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2dea 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | [2c72 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a4e 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2deb 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [2c73 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a4f 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2dec 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a28 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c74 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a50 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ded 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a29 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c75 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a51 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dee 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a2a 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c76 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a52 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2def 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2a2b 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a2c 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a54 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a53 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df0 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c77 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a55 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df1 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2a2d 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c78 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [2a56 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2df2 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a2e 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c79 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a57 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2df3 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a2f 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c7a 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a58 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2df4 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a30 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 gate 1602702122310886500 evaluation starts +peer1.org2.example.com | [2c7b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a59 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2df5 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a31 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c7c 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5a 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2df6 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2a32 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2c7d 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a5b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2df7 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a33 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 principal matched by identity 0 +peer1.org2.example.com | [2c7e 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a5c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 gate 1602702117939656900 evaluation starts +peer0.org2.example.com | [2df8 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a34 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | [2c7f 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a5d 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2df9 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [2c80 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a5e 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2dfa 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2a35 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | [2c81 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a5f 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 principal matched by identity 0 +peer0.org2.example.com | [2dfb 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 gate 1602702130600533000 evaluation starts +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | [2c82 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a60 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | [2dfc 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | [2c83 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org2.example.com | [2dfd 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2c84 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2a61 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org2.example.com | [2dfe 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 principal matched by identity 0 +peer1.org2.example.com | [2c85 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer0.org2.example.com | [2dff 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | [2a36 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c86 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 gate 1602702122331556000 evaluation starts +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2a37 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003635650 gate 1602702122310886500 evaluation succeeds +peer1.org2.example.com | [2c87 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org2.example.com | [2e00 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | [2a38 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c88 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | [2a39 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c89 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2a62 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | [2a3a 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c8a 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 principal evaluation fails +peer0.org1.example.com | [2a63 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 gate 1602702117939656900 evaluation succeeds +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | [2a3b 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c8b 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c2cc0 gate 1602702122331556000 evaluation fails +peer0.org1.example.com | [2a64 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2a3c 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c8c 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a65 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e01 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a3d 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c8d 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a66 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e02 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadf20 gate 1602702130600533000 evaluation succeeds +peer1.org1.example.com | [2a3e 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c8e 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2a67 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e03 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a3f 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c8f 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 gate 1602702122340771800 evaluation starts +peer0.org1.example.com | [2a68 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e04 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a40 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c90 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a69 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e05 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a41 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c91 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2a6a 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +peer0.org2.example.com | [2e06 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +peer1.org2.example.com | [2c92 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 principal matched by identity 0 +peer0.org2.example.com | [2e07 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6b 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +peer1.org1.example.com | [2a42 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c93 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | [2e08 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +peer1.org1.example.com | [2a43 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2e09 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +peer1.org1.example.com | [2a44 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 gate 1602702122319502300 evaluation starts +peer1.org2.example.com | [2c94 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e0a 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +peer1.org2.example.com | [2c95 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | [2e0b 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 b1 d2 01 a9 db 7f |......| +peer1.org1.example.com | [2a45 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | [2e0c 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2a6c 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +peer1.org1.example.com | [2a46 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | [2e0d 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +peer1.org1.example.com | [2a47 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 principal matched by identity 0 +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | [2e0e 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2a6e 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +peer1.org1.example.com | [2a48 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2e0f 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 gate 1602702130604476200 evaluation starts +peer0.org1.example.com | 00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | [2c96 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e10 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +peer1.org1.example.com | [2a49 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | [2c97 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c3230 gate 1602702122340771800 evaluation succeeds +peer0.org2.example.com | [2e11 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | 00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | [2c98 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e12 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 principal matched by identity 0 +peer0.org1.example.com | 00000040 21 21 53 21 4c 86 |!!S!L.| +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | [2c99 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e13 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | [2a6f 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | [2c9a 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [2a70 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2c9b 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e14 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | [2a71 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a4a 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c9c 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | [2a72 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a4b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003656850 gate 1602702122319502300 evaluation succeeds +peer1.org2.example.com | [2c9d 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | [2a73 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a4c 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c9e 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | [2a74 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a4d 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c9f 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [2a6d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a4e 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ca0 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e15 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a75 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a4f 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ca1 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e16 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de3130 gate 1602702130604476200 evaluation succeeds +peer0.org1.example.com | [2a76 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2a50 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | [2ca2 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e17 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a77 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2ca3 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e18 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a78 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a51 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | [2ca4 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e19 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a79 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2ca5 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e1a 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a7a 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 gate 1602702117977343600 evaluation starts +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | [2ca6 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 gate 1602702122357077900 evaluation starts +peer0.org2.example.com | [2e1b 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | [2a7b 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | [2ca7 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [2a7c 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [2ca8 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2e1c 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | [2a7d 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 principal matched by identity 0 +peer1.org1.example.com | [2a52 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca9 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | [2a7e 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +peer1.org1.example.com | [2a53 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2caa 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 principal evaluation fails +peer0.org1.example.com | 00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | [2a54 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer1.org2.example.com | [2cab 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c88a0 gate 1602702122357077900 evaluation fails +peer0.org1.example.com | [2a7f 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [2cac 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2a55 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | [2cad 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +peer0.org2.example.com | [2e1d 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | [2cae 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [2caf 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 gate 1602702122362011900 evaluation starts +peer1.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000040 bb 28 82 9b 2c b5 |.(..,.| +peer0.org2.example.com | [2e1e 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | [2cb0 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | [2a80 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | [2cb1 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [2a81 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 gate 1602702117977343600 evaluation succeeds +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | [2cb2 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 principal matched by identity 0 +peer1.org1.example.com | [2a56 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a82 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | [2a57 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cb3 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | [2a83 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2a58 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [2a84 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e1f 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a59 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cb4 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | [2a85 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e20 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a5a 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | [2a86 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e21 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a5b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | [2a87 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e22 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a5c 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | [2a88 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e23 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a5d 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [2a89 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e24 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a5e 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 gate 1602702122323926800 evaluation starts +peer1.org2.example.com | [2cb5 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a8a 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e25 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a5f 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cb6 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028c8e10 gate 1602702122362011900 evaluation succeeds +peer0.org1.example.com | [2a8b 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e26 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a60 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2cb8 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a8c 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e27 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a61 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 principal matched by identity 0 +peer1.org2.example.com | [2cb9 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2a8d 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e28 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a62 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer1.org2.example.com | [2cb7 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a8e 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 gate 1602702117991375900 evaluation starts +peer0.org2.example.com | [2e29 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer1.org2.example.com | [2cba 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a8f 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e2a 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 gate 1602702130614637900 evaluation starts +peer1.org1.example.com | [2a63 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer1.org2.example.com | [2cbb 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a90 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2e2b 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer1.org2.example.com | [2cbc 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a91 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 principal matched by identity 0 +peer0.org2.example.com | [2e2c 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer1.org2.example.com | [2cbd 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a92 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +peer0.org2.example.com | [2e2d 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 principal matched by identity 0 +peer1.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer1.org2.example.com | [2cbe 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +peer0.org2.example.com | [2e2e 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org1.example.com | [2a64 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a65 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366a9d0 gate 1602702122323926800 evaluation succeeds +peer1.org1.example.com | [2a66 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a67 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a68 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a69 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a6a 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a6b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a93 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +peer1.org2.example.com | [2cbf 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a6c 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | 00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +peer1.org2.example.com | [2cc0 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2a6d 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e2f 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | [2cc1 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | [2a6e 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a6f 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a70 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a71 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a72 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 gate 1602702122347899700 evaluation starts +peer1.org1.example.com | [2a73 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a74 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2cc2 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer1.org2.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer1.org2.example.com | [2cc3 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer1.org2.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer1.org2.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer1.org2.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer1.org2.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer1.org2.example.com | [2cc4 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cc5 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2cc6 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cc7 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2cc8 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer1.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer1.org2.example.com | [2cc9 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer1.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer1.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer1.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer1.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer1.org2.example.com | [2cca 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ccb 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ccc 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ccd 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ccf 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2cce 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd0 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd1 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer1.org2.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer1.org2.example.com | [2cd2 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer1.org2.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer1.org2.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer1.org2.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer1.org2.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer1.org2.example.com | [2cd3 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2cd4 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 20 f3 ec ef bd d6 ed 20 8e 4a |0E.!.. ...... .J| +peer1.org2.example.com | 00000010 f7 28 0e 30 43 c3 7a 13 ac ad 9f 68 f3 d5 6c 7b |.(.0C.z....h..l{| +peer1.org2.example.com | 00000020 e0 73 6c d5 81 02 20 11 3a ab 6a bc 46 93 d4 30 |.sl... .:.j.F..0| +peer1.org2.example.com | 00000030 ed 7d 82 c0 7c c7 62 de a4 1f 2f 72 9f c2 19 cf |.}..|.b.../r....| +peer1.org2.example.com | 00000040 be 22 93 5e 44 5e 97 |.".^D^.| +peer1.org2.example.com | [2cd5 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2cd6 10-14 19:02:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2cd7 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd8 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd9 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cda 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cdb 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2cdc 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer1.org2.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer1.org2.example.com | [2cdd 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer1.org2.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer1.org2.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer1.org2.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer1.org2.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer1.org2.example.com | [2cde 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2cdf 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce0 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2ce1 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer1.org2.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer1.org2.example.com | [2ce2 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer1.org2.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer1.org2.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer1.org2.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer1.org2.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer1.org2.example.com | [2ce3 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce4 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ce5 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce6 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ce7 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce8 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ce9 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cea 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ceb 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cec 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ced 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cee 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cef 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf0 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2cf1 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf2 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +peer0.org1.example.com | 00000040 ec 77 cf 10 c3 fb 06 |.w.....| +peer0.org1.example.com | [2a94 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a95 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 gate 1602702117991375900 evaluation succeeds +peer0.org1.example.com | [2a96 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a97 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2a98 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2a99 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2a9a 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a9b 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a9c 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a9d 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a9e 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41786 +peer0.org1.example.com | [2a9f 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00278c8c0 +peer0.org1.example.com | [2aa0 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2aa1 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2aa2 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2aa3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2aa4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2aa5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 8c 37 b9 69 af 3c 00 2a 82 e5 74 fd 77 a7 7d |..7.i.<.*..t.w.}| +peer0.org1.example.com | 00000010 31 9b c0 36 67 ba a5 7a 82 c2 b5 72 06 d7 1e 22 |1..6g..z...r..."| +peer0.org1.example.com | [2aa6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 be f8 41 6b 01 79 19 01 a7 8b |0E.!....Ak.y....| +peer0.org1.example.com | 00000010 28 b8 b2 12 d7 bc 2d 93 d6 55 42 ae 9b 9c ea f0 |(.....-..UB.....| +peer0.org1.example.com | 00000020 c8 ec 62 63 1c 02 20 63 b8 7d be e4 fa 83 49 49 |..bc.. c.}....II| +peer0.org1.example.com | 00000030 a0 c3 06 1a 9b 6d 0e db 9a 33 51 f9 42 97 fd 93 |.....m...3Q.B...| +peer0.org1.example.com | 00000040 5e b4 c7 29 c9 7a 26 |^..).z&| +peer0.org1.example.com | [2aa7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2aa8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cef50, header 0xc00278ccd0 +peer0.org1.example.com | [2aa9 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2aaa 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] processing txid: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd +peer0.org1.example.com | [2aab 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org1.example.com | [2aac 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2aad 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2aae 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2aaf 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ab0 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2ab1 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 gate 1602702118025143800 evaluation starts +peer0.org1.example.com | [2ab2 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ab3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ab4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [2ab5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 principal evaluation fails +peer0.org1.example.com | [2ab6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 gate 1602702118025143800 evaluation fails +peer0.org1.example.com | [2ab7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2ab8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2ab9 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2aba 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 gate 1602702118026864500 evaluation starts +peer0.org1.example.com | [2abb 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2abc 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2abd 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 principal matched by identity 0 +peer0.org1.example.com | [2abe 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 8c 37 b9 69 af 3c 00 2a 82 e5 74 fd 77 a7 7d |..7.i.<.*..t.w.}| +peer0.org1.example.com | 00000010 31 9b c0 36 67 ba a5 7a 82 c2 b5 72 06 d7 1e 22 |1..6g..z...r..."| +peer0.org1.example.com | [2abf 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 be f8 41 6b 01 79 19 01 a7 8b |0E.!....Ak.y....| +peer0.org1.example.com | 00000010 28 b8 b2 12 d7 bc 2d 93 d6 55 42 ae 9b 9c ea f0 |(.....-..UB.....| +peer0.org1.example.com | 00000020 c8 ec 62 63 1c 02 20 63 b8 7d be e4 fa 83 49 49 |..bc.. c.}....II| +peer0.org1.example.com | 00000030 a0 c3 06 1a 9b 6d 0e db 9a 33 51 f9 42 97 fd 93 |.....m...3Q.B...| +peer0.org1.example.com | 00000040 5e b4 c7 29 c9 7a 26 |^..).z&| +peer0.org1.example.com | [2ac0 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ac1 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 gate 1602702118026864500 evaluation succeeds +peer0.org1.example.com | [2ac2 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2ac3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2ac4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2ac5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2ac6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2ac7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org1.example.com | [2ac8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2ac9 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2aca 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2acb 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ae925824] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2acc 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2acd 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2ace 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling GET_STATE from chaincode +peer0.org1.example.com | [2acf 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2ad0 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2ad1 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2ad2 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2ad3 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling GET_STATE from chaincode +peer0.org1.example.com | [2ad4 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] getting state for chaincode exp02, key b, channel businesschannel +peer0.org1.example.com | [2ad5 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2ad6 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2ad7 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [2ad8 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling PUT_STATE from chaincode +peer0.org1.example.com | [2ad9 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [2ada 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [2adb 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling PUT_STATE from chaincode +peer0.org1.example.com | [2adc 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [2add 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2ade 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] notifying Txid:ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, channelID:businesschannel +peer0.org1.example.com | [2adf 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2ae0 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ae925824] Exit chaincode: name:"exp02" (10ms) +peer0.org1.example.com | [2ae1 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2ae2 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org1.example.com | [2ae3 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Exit +peer0.org1.example.com | [2ae4 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2ae5 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2ae6 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, chaincode: exp02} +peer0.org1.example.com | [2ae7 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20617110B2C32FEB28F85E5353FE28...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2ae8 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D01B98BD780345588DF8DC7722FFB6D5B5CCE7B3B3E7842FB1624016E54AC9A1 +peer0.org1.example.com | [2ae9 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, chaincode: exp02} +peer0.org1.example.com | [2aea 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Exit +peer0.org1.example.com | [2aeb 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org1.example.com | [2aec 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41786 +peer0.org1.example.com | [2aed 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41786 grpc.code=OK grpc.call_duration=29.5355ms +peer0.org1.example.com | [2aee 10-14 19:01:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2aef 10-14 19:01:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2af0 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2af1 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2af2 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2af3 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af4 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af5 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af6 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af7 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af8 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af9 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2afa 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2afb 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2afc 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2afd 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2afe 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2aff 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2a75 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 principal matched by identity 0 +peer1.org1.example.com | [2a76 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org1.example.com | [2a77 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org1.example.com | [2a78 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a79 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00366bbd0 gate 1602702122347899700 evaluation succeeds +peer1.org1.example.com | [2a7a 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a7b 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a7c 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a7d 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a7e 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2a7f 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2a80 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a81 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a82 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2a83 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2a84 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a85 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a86 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a87 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a88 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a89 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a8a 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a8b 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 gate 1602702122360546300 evaluation starts +peer1.org1.example.com | [2a8c 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a8d 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2a8e 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 principal matched by identity 0 +peer1.org1.example.com | [2a8f 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer1.org1.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer1.org1.example.com | [2a90 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer1.org1.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer1.org1.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer1.org1.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer1.org1.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer1.org1.example.com | [2a91 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a92 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ebac0 gate 1602702122360546300 evaluation succeeds +peer1.org1.example.com | [2a93 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a94 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a95 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a96 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a97 10-14 19:02:02.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a98 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2a99 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2a9a 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2a9b 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2a9c 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2a9d 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a9e 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf3 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cf4 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cf5 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cf6 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2cf7 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cf8 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2cf9 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cfa 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cfb 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cfc 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cfd 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cfe 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 gate 1602702122494296700 evaluation starts +peer1.org2.example.com | [2cff 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d00 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2d01 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d02 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 principal evaluation fails +peer1.org2.example.com | [2d03 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f3ea0 gate 1602702122494296700 evaluation fails +peer1.org2.example.com | [2d04 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d05 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d06 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d07 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 gate 1602702122495499100 evaluation starts +peer1.org2.example.com | [2d08 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d09 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2d0a 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 principal matched by identity 0 +peer1.org2.example.com | [2d0b 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer1.org2.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer1.org2.example.com | [2d0c 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer1.org2.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer1.org2.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer1.org2.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer1.org2.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer1.org2.example.com | [2d0d 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d0e 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027425c0 gate 1602702122495499100 evaluation succeeds +peer1.org2.example.com | [2d0f 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d10 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2e30 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e31 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ded380 gate 1602702130614637900 evaluation succeeds +peer0.org2.example.com | [2e32 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e33 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e34 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e35 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e36 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e37 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e38 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e39 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e3a 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e3b 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e3c 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e3d 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e3e 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 gate 1602702130620311800 evaluation starts +peer0.org2.example.com | [2e3f 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e40 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2e41 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 principal matched by identity 0 +peer0.org2.example.com | [2e42 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2e43 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2e44 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e45 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e0c580 gate 1602702130620311800 evaluation succeeds +peer0.org2.example.com | [2e46 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e47 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e48 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e49 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e4a 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [2e4b 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [2e4c 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [2e4d 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [2e4e 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e4f 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e50 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e51 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e52 10-14 19:02:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e53 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e54 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e55 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e56 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2e57 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e58 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2e59 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e5a 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e5b 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e5c 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e5d 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e5e 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 gate 1602702130638413700 evaluation starts +peer0.org2.example.com | [2e5f 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e60 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2e61 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 principal matched by identity 0 +peer0.org2.example.com | [2e62 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer0.org2.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer0.org2.example.com | [2e63 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer0.org2.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer0.org2.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer0.org2.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer0.org2.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer0.org2.example.com | [2e64 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e65 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e70af0 gate 1602702130638413700 evaluation succeeds +peer0.org2.example.com | [2e66 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e67 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e68 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e69 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d11 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d12 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d13 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2d14 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2d15 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2d16 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2d17 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2d18 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d19 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d1a 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d1b 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2d1c 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d1d 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d1e 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d1f 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d20 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > alive: +peer1.org2.example.com | [2d21 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d22 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d23 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d24 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d25 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d26 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d27 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d28 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d29 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2a 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2b 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2d2c 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d2d 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d2e 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d2f 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d30 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d31 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a9f 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa0 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2aa1 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa2 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa3 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa4 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2aa5 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2aa6 10-14 19:02:02.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aa7 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > alive: alive: alive: +peer1.org1.example.com | [2aa8 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aa9 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aaa 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2aab 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aac 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aad 10-14 19:02:02.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2aae 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2aaf 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab0 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab1 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab2 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ab3 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab4 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2ab5 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ab6 10-14 19:02:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2ab7 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ab9 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2aba 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2abc 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2abb 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2abd 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2abe 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab8 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2abf 10-14 19:02:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ac0 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ac1 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ac2 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b00 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b01 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b02 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b03 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b04 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b05 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b06 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b07 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 gate 1602702118184463900 evaluation starts +peer0.org1.example.com | [2b08 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b09 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2b0a 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 principal matched by identity 0 +peer0.org1.example.com | [2b0b 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer0.org1.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer0.org1.example.com | [2b0c 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer0.org1.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer0.org1.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer0.org1.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer0.org1.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer0.org1.example.com | [2b0d 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b0e 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 gate 1602702118184463900 evaluation succeeds +peer0.org1.example.com | [2b0f 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b10 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b11 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b12 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b13 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b14 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2b15 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2b16 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2b17 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2b18 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b19 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b1a 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b1b 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2b1c 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b1d 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b1e 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b1f 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b20 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +peer0.org1.example.com | [2b21 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b22 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b23 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b24 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b25 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b26 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b27 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b28 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b29 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2a 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2b 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b2c 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2b2d 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2e 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b2f 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b30 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b31 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b32 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b33 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org1.example.com | [2b34 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [2b35 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b36 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b37 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b38 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b39 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b3a 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 gate 1602702118272424800 evaluation starts +peer0.org1.example.com | [2b3b 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b3c 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2b3d 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2b3e 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 principal evaluation fails +peer1.org2.example.com | [2d32 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e6a 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ac3 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b3f 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 gate 1602702118272424800 evaluation fails +peer1.org2.example.com | [2d33 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e6b 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2ac4 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b40 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d34 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | [2e6c 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2ac5 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b41 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [2e6d 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2e6e 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2d35 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | [2e6f 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ac6 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b42 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | [2e70 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e71 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ac7 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | [2e72 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2ac8 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b43 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 gate 1602702118272849600 evaluation starts +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | [2e73 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ac9 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b44 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [2e74 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aca 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b45 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2d36 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e75 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2acb 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b46 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 principal matched by identity 0 +peer1.org2.example.com | [2d37 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e76 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2acc 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102D +peer0.org1.example.com | [2b47 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org2.example.com | [2e77 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2acd 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BD80F4EFDF2EC14ED01F7E9743B970EBFD1C8BD7306E9DEF5706A08882E5AC40 +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer1.org2.example.com | [2d38 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e78 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ace 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2b48 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer1.org2.example.com | [2d39 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e79 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e7a 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer1.org2.example.com | [2d3a 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e7b 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2acf 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer1.org2.example.com | [2d3b 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 gate 1602702122622893100 evaluation starts +peer0.org2.example.com | [2e7c 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2ad0 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer1.org2.example.com | [2d3c 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e7d 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad1 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer1.org2.example.com | [2d3d 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2e7e 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad2 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b49 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d3e 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 principal matched by identity 0 +peer0.org2.example.com | [2e7f 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ad3 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d3f 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | [2e80 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ad4 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b4a 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 gate 1602702118272849600 evaluation succeeds +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [2e81 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ad5 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b4b 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d40 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | [2e82 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ad6 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b4c 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | [2e83 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ad7 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b4d 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | [2e84 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | [2ad8 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ad9 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ada 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2adb 10-14 19:02:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2adc 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2add 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ade 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2adf 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ae0 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2ae1 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ae2 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ae4 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ae5 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ae6 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ae7 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ae8 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ae9 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 gate 1602702122504423300 evaluation starts +peer1.org1.example.com | [2ae3 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2aea 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2aeb 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2aec 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 principal matched by identity 0 +peer1.org1.example.com | [2aed 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer1.org1.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer1.org1.example.com | [2aee 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer1.org1.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer1.org1.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer1.org1.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer1.org1.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer1.org1.example.com | [2aef 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2af0 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036fe720 gate 1602702122504423300 evaluation succeeds +peer1.org1.example.com | [2af1 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2af2 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2af3 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2af4 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2af5 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2af6 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2af7 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2af8 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer1.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer1.org1.example.com | [2af9 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer1.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer1.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer1.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer1.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer1.org1.example.com | [2afa 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2afb 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2afc 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2afd 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2afe 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2aff 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b00 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2b01 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b02 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b03 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b04 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b06 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b05 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b08 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b09 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b07 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b0a 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 gate 1602702122528819600 evaluation starts +peer1.org1.example.com | [2b0b 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b0c 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2b0d 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 principal matched by identity 0 +peer1.org1.example.com | [2b0e 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer1.org1.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer1.org1.example.com | [2b0f 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer1.org1.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer1.org1.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer1.org1.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer1.org1.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer1.org1.example.com | [2b10 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b11 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371c580 gate 1602702122528819600 evaluation succeeds +peer1.org1.example.com | [2b12 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b13 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b14 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b15 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b16 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b17 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b18 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2b19 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer1.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer1.org1.example.com | [2b1a 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer1.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer1.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer1.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer1.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer1.org1.example.com | [2b1b 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b1c 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b1d 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b1e 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b1f 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b20 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2b21 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b22 10-14 19:02:02.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer1.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer1.org1.example.com | [2b23 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer1.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer1.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer1.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer1.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer1.org1.example.com | [2b24 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2b25 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 4c 76 58 e8 66 d7 19 1b c5 c0 07 |0D. YLvX.f......| +peer1.org1.example.com | 00000010 f2 0a e9 4a e1 b7 a2 c7 fd 4d 7d 64 0d 46 11 0a |...J.....M}d.F..| +peer1.org1.example.com | 00000020 20 7f 62 ed 02 20 1c b1 bf b9 b9 33 49 88 f9 c7 | .b.. .....3I...| +peer1.org1.example.com | 00000030 f2 f8 f9 0e 18 2c bb a4 f5 e9 6f 3a c3 ce 6a 37 |.....,....o:..j7| +peer1.org1.example.com | 00000040 77 27 c8 d4 61 69 |w'..ai| +peer1.org1.example.com | [2b26 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2b27 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2b28 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b29 10-14 19:02:02.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b2a 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2b 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2c 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2d 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2b2e 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b2f 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e85 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e86 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e87 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e88 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e89 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e8a 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e8b 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2e8c 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e8d 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [2e8e 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2e8f 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [2e90 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e91 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 a0 9b df 3f b1 ca 51 44 1f 9c c7 8c 0c c1 aa |v...?..QD.......| +peer0.org2.example.com | 00000010 9a 7f 6d 88 3d 20 b8 d4 36 54 7e e3 d1 4c 7b bf |..m.= ..6T~..L{.| +peer0.org2.example.com | [2e92 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 df 0e c9 ef 19 97 f2 df 9a 08 |0E.!............| +peer0.org2.example.com | 00000010 77 67 e8 01 35 28 a5 cb e5 43 f4 68 a6 30 1d 34 |wg..5(...C.h.0.4| +peer0.org2.example.com | 00000020 46 10 5e 82 f9 02 20 14 6d 75 94 fc a9 44 16 da |F.^... .mu...D..| +peer0.org2.example.com | 00000030 a5 9c 88 07 ed 8c 24 8d 01 4e 36 d3 67 71 8f a4 |......$..N6.gq..| +peer0.org2.example.com | 00000040 16 8b b5 7c fc d6 1f |...|...| +peer0.org2.example.com | [2e93 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e94 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e95 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e96 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2e97 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2e98 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e99 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e9a 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e9b 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e9c 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e9d 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2e9e 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e9f 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2ea0 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ea1 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2ea2 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ea3 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ea4 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ea5 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ea6 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ea7 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ea8 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ea9 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eaa 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eab 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eac 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ead 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eae 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eaf 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb0 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eb1 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eb2 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2eb3 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16102B +peer0.org2.example.com | [2eb4 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1A82B701BB26CF46F10850F508C540ED48A376A631E13971172587E534B021 +peer0.org1.example.com | [2b4e 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b4f 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b50 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b51 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b52 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [2b53 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b54 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b55 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b56 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b57 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b58 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b59 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b5a 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b5b 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b5c 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b5d 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2b5e 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b5f 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b60 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b61 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b62 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b63 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b64 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b65 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 gate 1602702118305576100 evaluation starts +peer0.org1.example.com | [2b66 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b67 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2b68 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 principal matched by identity 0 +peer0.org1.example.com | [2b69 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer0.org1.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer0.org1.example.com | [2b6a 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer0.org1.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer0.org1.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer0.org1.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer0.org1.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer0.org1.example.com | [2b6b 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b6c 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 gate 1602702118305576100 evaluation succeeds +peer0.org1.example.com | [2b6d 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b6e 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b6f 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b70 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2b71 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b72 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2d41 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d42 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268e620 gate 1602702122622893100 evaluation succeeds +peer1.org2.example.com | [2d43 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d44 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d45 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d46 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d47 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d48 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d49 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d4a 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2d4b 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b30 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b31 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b32 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b33 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b34 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b35 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b36 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b37 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b38 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b39 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b3a 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b3b 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b3c 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b3d 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b3e 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 gate 1602702122614361500 evaluation starts +peer1.org1.example.com | [2b3f 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b40 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2b41 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 principal matched by identity 0 +peer1.org1.example.com | [2b42 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2b43 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2b44 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b45 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d1b70 gate 1602702122614361500 evaluation succeeds +peer1.org1.example.com | [2b46 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b47 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b48 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b49 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b4a 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b4b 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b4c 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b4d 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b4f 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2eb5 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2eb6 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2eb7 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2eb8 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2eb9 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2eba 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ebb 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ebc 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ebd 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ebe 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ebf 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ec0 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec1 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ec2 10-14 19:02:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec3 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ec4 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ec5 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b73 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2b74 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2b75 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2b76 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b77 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b79 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b7a 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2b7b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b7c 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b78 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [2b7d 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [2b7e 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2b7f 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b80 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b82 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2b81 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 13 a6 71 bf 6a 3e d4 d0 9e 7d 36 1c c2 57 0d |...q.j>...}6..W.| +peer0.org1.example.com | 00000010 f8 6d 24 c1 bf 34 46 e7 50 6a 47 93 58 10 35 8d |.m$..4F.PjG.X.5.| +peer0.org1.example.com | [2b83 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 59 7c 75 f6 8d f7 8a 78 7c 6c |0E.!..Y|u....x|l| +peer0.org1.example.com | 00000010 d0 4c 11 22 d5 dc 9d 7d 90 55 d0 4d 8a c8 f1 79 |.L."...}.U.M...y| +peer0.org1.example.com | 00000020 16 19 6d 3f db 02 20 7a fe f5 17 71 77 37 0a 43 |..m?.. z...qw7.C| +peer0.org1.example.com | 00000030 1b 7f 98 33 9f 3a 56 aa 43 7a 4c 39 c3 f9 17 36 |...3.:V.CzL9...6| +peer0.org1.example.com | 00000040 92 e5 55 2e bc f4 3b |..U...;| +peer0.org1.example.com | [2b84 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b85 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b86 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b87 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [2b88 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [2b89 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\221\004c\343`Nhc\360\205" > alive: alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +peer0.org1.example.com | [2b8a 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b8b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b8c 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b8d 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b8e 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2b8f 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b90 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2d4c 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d4d 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d4e 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d4f 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d50 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d51 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d52 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 gate 1602702122647895500 evaluation starts +peer1.org2.example.com | [2d53 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d54 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2d55 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2d56 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 principal evaluation fails +peer1.org2.example.com | [2d57 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026809f0 gate 1602702122647895500 evaluation fails +peer1.org2.example.com | [2d58 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d59 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d5a 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2d5b 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 gate 1602702122651593900 evaluation starts +peer1.org2.example.com | [2d5c 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d5d 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2d5e 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 principal matched by identity 0 +peer1.org2.example.com | [2d5f 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer1.org2.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer1.org2.example.com | [2d60 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer1.org2.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer1.org2.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer1.org2.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer1.org2.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer1.org2.example.com | [2d61 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d62 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002680f60 gate 1602702122651593900 evaluation succeeds +peer1.org2.example.com | [2d63 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d64 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2d65 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d66 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d67 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2d68 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2d69 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2d6a 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2d6b 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2d6c 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d6d 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d6e 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d6f 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2d70 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d71 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d72 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d73 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d74 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" > alive: +peer1.org2.example.com | [2d75 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d76 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d77 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d78 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d79 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [2d7a 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d7b 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d7c 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d7d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d7e 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d7f 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d80 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d81 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d82 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2d83 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2d84 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d85 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d86 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d87 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d88 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d89 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2d8a 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d8b 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d8c 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d8d 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2d8e 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2d8f 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d90 10-14 19:02:02.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d91 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2d92 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d93 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4F3E4C58EA1FC9E16...08061A0C0A0565787030321203312E30 +peer1.org2.example.com | [2d94 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 315525260FEB2774C7B134EE90BB101F5FC1091F067EE6C4DD7443C92A30A78E +peer1.org2.example.com | [2d95 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d96 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2d97 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d98 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d99 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d9a 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d9b 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d9c 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d9d 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d9e 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d9f 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | [2da0 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2da1 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2da2 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2da3 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2da4 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2da5 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2da6 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2da7 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2da8 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2da9 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 gate 1602702122916355600 evaluation starts +peer1.org2.example.com | [2daa 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dab 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2dac 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2dad 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 principal evaluation fails +peer1.org2.example.com | [2dae 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264c4b0 gate 1602702122916355600 evaluation fails +peer1.org2.example.com | [2daf 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2db0 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2db1 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2db2 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 gate 1602702122916693700 evaluation starts +peer1.org2.example.com | [2db3 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2db4 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2db5 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 principal matched by identity 0 +peer1.org2.example.com | [2db6 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2db7 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [2db8 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2db9 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264cb90 gate 1602702122916693700 evaluation succeeds +peer1.org2.example.com | [2dba 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dbb 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dbc 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2dbd 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2dbe 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dbf 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc0 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2dc1 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ec6 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2ec7 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec8 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ec9 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eca 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ecb 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ecc 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ecd 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ece 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 gate 1602702134192984300 evaluation starts +peer0.org2.example.com | [2ecf 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ed0 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2ed1 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 principal matched by identity 0 +peer0.org2.example.com | [2ed2 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org2.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer0.org2.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer0.org2.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer0.org2.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer0.org2.example.com | [2ed4 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ed5 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f207e0 gate 1602702134192984300 evaluation succeeds +peer0.org2.example.com | [2ed6 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ed7 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ed8 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ed9 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2eda 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2edb 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2edc 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2edd 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer0.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer0.org2.example.com | [2ede 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer0.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer0.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer0.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer0.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer0.org2.example.com | [2edf 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ee0 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ee1 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ee2 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2ee3 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer0.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer0.org2.example.com | [2ee4 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer0.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer0.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer0.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer0.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer0.org2.example.com | [2ee5 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2ee6 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ee7 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ee8 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ee9 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2eea 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2eeb 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2eec 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer0.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer0.org2.example.com | [2eed 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer0.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer0.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer0.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer0.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer0.org2.example.com | [2eee 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2eef 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 cd c7 b2 7e dc 5a 48 e9 ba 3b ad |0D. ....~.ZH..;.| +peer0.org2.example.com | 00000010 cb 5f 82 50 46 50 2e 82 cb ba d9 aa 65 cf 64 5e |._.PFP......e.d^| +peer0.org2.example.com | 00000020 bc e1 24 e7 02 20 69 34 32 6e 65 0d a1 e0 b8 33 |..$.. i42ne....3| +peer0.org2.example.com | 00000030 32 e5 1e b4 cd 0e 78 eb 87 a0 6b ab 55 be 12 5b |2.....x...k.U..[| +peer0.org2.example.com | 00000040 3f ad 38 04 13 98 |?.8...| +peer0.org2.example.com | [2ef0 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2ef1 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2ef2 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ef3 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ef4 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ef5 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ef6 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ef7 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2ef8 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b4e 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b50 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b51 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b52 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 gate 1602702122627829200 evaluation starts +peer1.org1.example.com | [2b53 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b54 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2b55 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 principal matched by identity 0 +peer1.org1.example.com | [2b56 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2b57 10-14 19:02:02.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2b58 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b59 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037350a0 gate 1602702122627829200 evaluation succeeds +peer1.org1.example.com | [2b5a 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b5b 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b5c 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b5d 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b5e 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b5f 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b60 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b61 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b62 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b63 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2b64 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b65 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer1.org1.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer1.org1.example.com | [2b66 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer1.org1.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer1.org1.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer1.org1.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer1.org1.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer1.org1.example.com | [2b67 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b68 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2b69 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 ac 69 ad 00 62 65 42 55 a5 5c |0E.!...i..beBU.\| +peer1.org1.example.com | 00000010 ab d9 20 6b bd f2 ea 49 27 5b 28 98 c6 ad f1 bc |.. k...I'[(.....| +peer1.org1.example.com | 00000020 86 7b c9 99 88 02 20 3b 16 57 20 2f 90 37 db 96 |.{.... ;.W /.7..| +peer1.org1.example.com | 00000030 fb 7a 69 78 8f 03 da 48 5e 8b 25 d4 dd b6 db ec |.zix...H^.%.....| +peer1.org1.example.com | 00000040 14 5d d2 5a c0 f6 39 |.].Z..9| +peer1.org1.example.com | [2b6a 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2b6b 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2b6c 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b6d 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b6e 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2b6f 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b70 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b71 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b72 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2b73 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b74 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b75 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b76 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b78 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b77 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b79 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b7a 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b7b 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b7c 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 gate 1602702122656846100 evaluation starts +peer1.org1.example.com | [2b7d 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b7e 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2b7f 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 principal matched by identity 0 +peer0.org2.example.com | [2ef9 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2efa 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2efb 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2efc 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2efd 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2efe 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2eff 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 gate 1602702134202684500 evaluation starts +peer0.org2.example.com | [2f00 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f01 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2f02 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 principal matched by identity 0 +peer0.org2.example.com | [2f03 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer0.org2.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer0.org2.example.com | [2f04 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer0.org2.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer0.org2.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer0.org2.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer0.org2.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer0.org2.example.com | [2f05 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f06 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00334e2c0 gate 1602702134202684500 evaluation succeeds +peer0.org2.example.com | [2f07 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f08 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f09 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f0a 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f0b 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f0c 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f0d 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2f0e 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer0.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer0.org2.example.com | [2f0f 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer0.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer0.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer0.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer0.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer0.org2.example.com | [2f10 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f11 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f12 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f13 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2f14 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer0.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer0.org2.example.com | [2f15 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer0.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer0.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer0.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer0.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer0.org2.example.com | [2f16 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2dc2 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dc3 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2dc4 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2dc5 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2dc6 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 gate 1602702122919361600 evaluation starts +peer1.org2.example.com | [2dc7 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dc8 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2dc9 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2dca 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 principal evaluation fails +peer1.org2.example.com | [2dcb 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264dda0 gate 1602702122919361600 evaluation fails +peer1.org2.example.com | [2dcc 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dcd 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2dce 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2b91 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b92 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org1.example.com | [2b93 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [2b94 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b95 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b96 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b97 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2b98 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2b99 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b9a 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41792 +peer0.org1.example.com | [2b9b 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002669f90 +peer0.org1.example.com | [2b9c 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2b9d 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2b9e 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2b9f 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2ba0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ba1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 d7 1d 5e be 7a 23 fe 1d 6f 66 20 22 9f 7d 06 |...^.z#..of ".}.| +peer0.org1.example.com | 00000010 85 29 01 65 b0 fd 8f c4 38 41 63 da 22 f1 9f 2c |.).e....8Ac."..,| +peer0.org1.example.com | [2ba2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb dd 4b 42 92 9c 9c 43 31 ae |0E.!....KB...C1.| +peer0.org1.example.com | 00000010 a3 5f 3c 6f 6f c5 43 da 24 ee f9 66 87 3a a6 04 |._ DEBU exits successfully +peer0.org1.example.com | [2ba4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cfce0, header 0xc0025985a0 +peer0.org1.example.com | [2ba5 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2ba6 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] processing txid: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37 +peer0.org1.example.com | [2ba7 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +peer0.org1.example.com | [2ba8 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2ba9 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2baa 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2bab 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2bac 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2bad 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 gate 1602702118425886400 evaluation starts +peer0.org1.example.com | [2bae 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2baf 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2bb0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 principal matched by identity 0 +peer0.org1.example.com | [2bb1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 d7 1d 5e be 7a 23 fe 1d 6f 66 20 22 9f 7d 06 |...^.z#..of ".}.| +peer0.org1.example.com | 00000010 85 29 01 65 b0 fd 8f c4 38 41 63 da 22 f1 9f 2c |.).e....8Ac."..,| +peer0.org1.example.com | [2bb2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb dd 4b 42 92 9c 9c 43 31 ae |0E.!....KB...C1.| +peer0.org1.example.com | 00000010 a3 5f 3c 6f 6f c5 43 da 24 ee f9 66 87 3a a6 04 |._ DEBU 0xc0032e5ad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bb4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 gate 1602702118425886400 evaluation succeeds +peer0.org1.example.com | [2bb5 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2bb6 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2bb7 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2bb8 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2bb9 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2bba 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +peer0.org1.example.com | [2bbb 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2bbc 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2bbd 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2bbe 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][00749d6f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2bbf 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2bc0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2bc1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] handling GET_STATE from chaincode +peer0.org1.example.com | [2bc2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2bc3 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2bc4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2bc5 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2bc6 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] notifying Txid:00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, channelID:businesschannel +peer0.org1.example.com | [2bc7 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2bc8 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][00749d6f] Exit chaincode: name:"exp02" (8ms) +peer0.org1.example.com | [2bc9 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2bca 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +peer0.org1.example.com | [2bcb 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Exit +peer0.org1.example.com | [2bcc 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2bcd 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2bce 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, chaincode: exp02} +peer0.org1.example.com | [2bcf 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2025D58FB0016627EF4050B096597C...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2bd0 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 069C1206B38B745054235CED20E9135AD67AD82C2B00F4207093045FE7754F06 +peer0.org1.example.com | [2bd1 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, chaincode: exp02} +peer0.org1.example.com | [2bd2 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Exit +peer0.org1.example.com | [2bd3 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +peer0.org1.example.com | [2bd4 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41792 +peer0.org1.example.com | [2bd5 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41792 grpc.code=OK grpc.call_duration=16.234ms +peer0.org1.example.com | [2bd6 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2bd7 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2bd8 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bd9 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bda 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bdb 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2bdc 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer0.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer0.org1.example.com | [2bdd 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer0.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer0.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer0.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer0.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer0.org1.example.com | [2bde 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2bdf 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 af 68 bb 4d bb e7 05 16 df 68 |0E.!...h.M.....h| +peer0.org1.example.com | 00000010 ec 0e 5e 7c 0f 81 9a 16 e0 77 8f e1 c0 44 50 fc |..^|.....w...DP.| +peer0.org1.example.com | 00000020 0c f7 c5 0e 49 02 20 07 84 69 9a a2 d2 06 4c 29 |....I. ..i....L)| +peer0.org1.example.com | 00000030 10 63 2a 57 64 aa a4 2a f2 3c 63 7d 3a bd bc 99 |.c*Wd..*. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2be1 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2be2 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2be3 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2be4 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2be5 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2be6 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2be7 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2be8 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2be9 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bea 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2beb 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bec 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\016\025FG]L\260\032\350{\313\275" secret_envelope: > alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +peer0.org1.example.com | [2bed 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bee 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bef 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2bf0 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bf1 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2bf2 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bf3 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bf4 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bf5 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2bf6 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2bf7 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bf8 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bf9 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bfb 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bfc 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b80 10-14 19:02:02.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2b83 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2b84 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b85 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a24c0 gate 1602702122656846100 evaluation succeeds +peer1.org1.example.com | [2b82 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b86 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b81 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2b87 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b88 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b89 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8a 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b8b 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b8c 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b8d 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8f 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b90 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b91 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b92 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b93 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b94 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b95 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b96 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b97 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 gate 1602702122688784300 evaluation starts +peer1.org1.example.com | [2b98 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b99 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2b9a 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 principal matched by identity 0 +peer1.org1.example.com | [2b9b 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2b9c 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2b9d 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2b9e 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a3780 gate 1602702122688784300 evaluation succeeds +peer1.org1.example.com | [2b9f 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ba0 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ba1 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ba2 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ba3 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ba4 10-14 19:02:02.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8e 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [2ba5 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ba6 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ba7 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ba8 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ba9 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2baa 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bab 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bac 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bad 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bae 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2baf 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bb1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bb2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bb3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bb4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dcf 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 gate 1602702122920000200 evaluation starts +peer1.org2.example.com | [2dd0 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dd1 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2dd2 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 principal matched by identity 0 +peer1.org2.example.com | [2dd3 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [2dd4 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [2dd5 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2dd6 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262c360 gate 1602702122920000200 evaluation succeeds +peer1.org2.example.com | [2dd7 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dd8 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dd9 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2dda 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ddb 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2ddc 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2ddd 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dde 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ddf 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2de0 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2de1 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | [2de2 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2de3 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2de4 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2de5 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2de6 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2de7 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2de8 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2de9 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2dea 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2deb 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 gate 1602702122925918400 evaluation starts +peer0.org2.example.com | [2f17 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f18 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f19 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1a 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1b 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2f1c 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f1d 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f1e 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f1f 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f20 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f21 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f22 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" secret_envelope:\031\310\240\207FY\3544\345`\321\207vW#\333," > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f23 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f24 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" secret_envelope:\031\310\240\207FY\3544\345`\321\207vW#\333," > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f25 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2f26 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer0.org2.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer0.org2.example.com | [2f27 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer0.org2.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer0.org2.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer0.org2.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer0.org2.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer0.org2.example.com | [2f28 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2f29 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 3c 22 c3 a2 60 72 b8 db fa ae b2 |0D. !<"..`r.....| +peer0.org2.example.com | 00000010 b2 65 7a 88 cf 04 6b fc ea c7 9d f0 85 b7 e4 3f |.ez...k........?| +peer0.org2.example.com | 00000020 77 dc 83 70 02 20 6d 22 c8 2e 65 4e fc 59 3c 0b |w..p. m"..eN.Y<.| +peer0.org2.example.com | 00000030 76 a7 0b 67 3e 19 c8 a0 87 46 59 ec 34 e5 60 d1 |v..g>....FY.4.`.| +peer0.org2.example.com | 00000040 87 76 57 23 db 2c |.vW#.,| +peer0.org2.example.com | [2f2a 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2f2b 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2f2c 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f2d 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2f2e 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2f2f 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f30 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f31 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f32 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2f33 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f34 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f35 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2bb5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bb6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2bb7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bb8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 gate 1602702122939250000 evaluation starts +peer1.org1.example.com | [2bb9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2bba 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2bbb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 principal matched by identity 0 +peer1.org1.example.com | [2bbc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2bbd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2bbe 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2bbf 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b7470 gate 1602702122939250000 evaluation succeeds +peer1.org1.example.com | [2bc0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bc1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bc2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2bc3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2bc4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bc5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bc6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bc7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bc8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bc9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2bca 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bcb 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 gate 1602702122939986800 evaluation starts +peer1.org1.example.com | [2bcc 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2bcd 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2bce 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 principal matched by identity 0 +peer1.org1.example.com | [2bcf 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2bd0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2bd1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2bd2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6060 gate 1602702122939986800 evaluation succeeds +peer1.org1.example.com | [2bd3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bd4 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bd5 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2bd6 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2bd7 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bd8 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dec 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ded 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2dee 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2def 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 principal evaluation fails +peer1.org2.example.com | [2df0 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002671c40 gate 1602702122925918400 evaluation fails +peer1.org2.example.com | [2df1 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2df2 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2df3 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2df4 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 gate 1602702122926460300 evaluation starts +peer1.org2.example.com | [2df5 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2df6 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2df7 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 principal matched by identity 0 +peer1.org2.example.com | [2df8 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2df9 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [2dfa 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2dfb 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ea1c0 gate 1602702122926460300 evaluation succeeds +peer1.org2.example.com | [2dfc 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dfd 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2dfe 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2dff 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e00 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e01 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e02 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e03 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e04 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e05 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e06 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e07 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e08 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 gate 1602702122928307900 evaluation starts +peer1.org2.example.com | [2e09 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e0a 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e0b 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e0c 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 principal evaluation fails +peer1.org2.example.com | [2e0d 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c50c0 gate 1602702122928307900 evaluation fails +peer0.org1.example.com | [2bfd 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bfa 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bfe 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2bff 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c00 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c01 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c02 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c03 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c04 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c05 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c06 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c07 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c08 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c09 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c0a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c0b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c0c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c0d 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c0e 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bd9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bda 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [2bdb 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bdc 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bdd 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bde 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bdf 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2be0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2be1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2be2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2be3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2be4 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2be5 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2be6 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2be7 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2be8 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2be9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2bea 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 gate 1602702122947068000 evaluation starts +peer1.org1.example.com | [2beb 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2bec 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2bed 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 principal matched by identity 0 +peer1.org1.example.com | [2bee 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2bef 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2bf0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2bf1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d0d30 gate 1602702122947068000 evaluation succeeds +peer1.org1.example.com | [2bf2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f36 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" secret_envelope:\031\310\240\207FY\3544\345`\321\207vW#\333," > > alive: +peer0.org2.example.com | [2f37 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f38 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f39 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f3a 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f3b 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f3c 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f3d 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f3e 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f3f 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f40 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f41 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2f42 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f43 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f44 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f45 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f46 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2f47 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f48 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f49 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f4a 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e0e 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e0f 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c0f 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c10 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c11 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c12 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c13 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c14 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c15 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 gate 1602702118604696700 evaluation starts +peer0.org1.example.com | [2c16 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c17 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2c18 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 principal matched by identity 0 +peer0.org1.example.com | [2c19 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [2c1a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2c1c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c1d 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 gate 1602702118604696700 evaluation succeeds +peer0.org1.example.com | [2c1e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c1b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2c1f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c21 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c22 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c23 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c24 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c25 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c26 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c27 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c20 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161027 +peer0.org1.example.com | [2c28 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c2a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c2b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 gate 1602702118612772600 evaluation starts +peer0.org1.example.com | [2c2c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c2d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2c2e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 principal matched by identity 0 +peer0.org1.example.com | [2c2f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [2c30 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2c31 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c32 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 gate 1602702118612772600 evaluation succeeds +peer0.org1.example.com | [2c33 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c34 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c35 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c36 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c37 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c29 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A6E3BA087CAB241427625DC8E7DBCFA65B011B579389722F0EDC862A540FE5E +peer0.org1.example.com | [2c38 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2c39 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2c3a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [2f4b 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f4c 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f4d 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f4e 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 gate 1602702134524170400 evaluation starts +peer0.org2.example.com | [2f4f 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f50 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2f51 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 principal matched by identity 0 +peer0.org2.example.com | [2f52 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer0.org2.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer0.org2.example.com | [2f53 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer0.org2.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer0.org2.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer0.org2.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer0.org2.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer0.org2.example.com | [2f54 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f55 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a69a0 gate 1602702134524170400 evaluation succeeds +peer0.org2.example.com | [2f56 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f57 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f58 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f59 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f5a 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2f5b 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2f5c 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f5d 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2f5e 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2f5f 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f60 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f61 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f62 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2f63 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f64 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f65 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f66 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2f67 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f68 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f69 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > alive: alive: +peer0.org2.example.com | [2f6a 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f6b 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bf3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bf4 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2bf5 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2bf6 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bf7 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bf8 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2bf9 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2c3b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c3c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c3d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c3e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c3f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c40 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c41 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c42 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c43 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c44 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c45 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c46 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c47 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c48 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c49 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e10 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e11 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 gate 1602702122928735700 evaluation starts +peer1.org2.example.com | [2e12 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e13 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e14 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 principal matched by identity 0 +peer1.org2.example.com | [2e15 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [2e16 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [2e17 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e18 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025c5650 gate 1602702122928735700 evaluation succeeds +peer1.org2.example.com | [2e19 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e1a 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e1b 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e1c 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e1d 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e1e 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org2.example.com | [2e1f 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e20 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e21 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e22 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e23 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e24 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e25 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e26 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e27 10-14 19:02:02.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e28 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2e29 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2e2a 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e2b 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e2c 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2d 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer1.org2.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer1.org2.example.com | [2e2e 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer1.org2.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer1.org2.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org2.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer1.org2.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer1.org2.example.com | [2e2f 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e30 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e31 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e32 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e33 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e34 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e35 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e36 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e37 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 gate 1602702122939671000 evaluation starts +peer1.org2.example.com | [2e38 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e39 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e3a 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e3b 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 principal evaluation fails +peer1.org2.example.com | [2e3c 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b79d0 gate 1602702122939671000 evaluation fails +peer1.org2.example.com | [2e3d 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e3e 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e3f 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e40 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 gate 1602702122940156100 evaluation starts +peer1.org2.example.com | [2e41 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e42 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e43 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 principal matched by identity 0 +peer1.org2.example.com | [2e44 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [2e45 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [2e46 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e47 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b7f50 gate 1602702122940156100 evaluation succeeds +peer1.org2.example.com | [2e48 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e49 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e4a 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e4b 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e4c 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e4d 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e4e 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2e4f 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e50 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e51 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e52 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e53 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e54 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 gate 1602702122942363900 evaluation starts +peer1.org2.example.com | [2e55 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e56 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e57 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e58 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 principal evaluation fails +peer1.org2.example.com | [2e59 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025972a0 gate 1602702122942363900 evaluation fails +peer1.org2.example.com | [2e5a 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e5b 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e5c 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e5d 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 gate 1602702122942962400 evaluation starts +peer1.org2.example.com | [2e5e 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e5f 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2e60 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 principal matched by identity 0 +peer1.org2.example.com | [2e61 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [2e62 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | [2f6c 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6d 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6e 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f6f 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f70 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f71 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f72 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2f73 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f74 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f75 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f76 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2f77 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f78 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f79 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f7a 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f7b 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f7c 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f7d 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f7e 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f7f 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f80 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f81 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f82 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f83 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f84 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f85 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f86 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f87 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 gate 1602702134600459000 evaluation starts +peer0.org2.example.com | [2f88 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f89 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2f8a 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 principal matched by identity 0 +peer0.org2.example.com | [2f8b 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2f8c 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | [2bfa 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bfb 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bfc 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bfd 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bfe 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2bff 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c00 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c01 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 gate 1602702122970040200 evaluation starts +peer1.org1.example.com | [2c02 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c03 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2c04 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 principal matched by identity 0 +peer1.org1.example.com | [2c05 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2c06 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2c07 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c08 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003826130 gate 1602702122970040200 evaluation succeeds +peer1.org1.example.com | [2c09 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c0a 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c0b 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c0c 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c0d 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c0e 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [2c0f 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [2c10 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c11 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100D1801 +peer1.org1.example.com | [2c12 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA99E516C0B6A730BAE07B03FA77FFB6D46D1AA09792D4A5A8E1DF87F9361F65 +peer1.org1.example.com | [2c13 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [2c14 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c15 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c16 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c17 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c18 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c19 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c1a 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c4a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c4b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c4c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c4d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 gate 1602702118615799100 evaluation starts +peer0.org1.example.com | [2c4e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c4f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2c50 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 principal matched by identity 0 +peer0.org1.example.com | [2c51 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [2c52 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2c53 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c54 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 gate 1602702118615799100 evaluation succeeds +peer0.org1.example.com | [2c55 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c56 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c57 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c58 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c59 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c5c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [2c60 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c61 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c62 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c63 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c64 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c65 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c66 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c67 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c68 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c69 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c6a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2c6b 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer0.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer0.org1.example.com | [2c6c 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer0.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer0.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer0.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer0.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer0.org1.example.com | [2c6d 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c6e 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c1b 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c1c 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c1d 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c1e 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c1f 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c20 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c21 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2c22 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c23 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c24 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c25 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c26 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c27 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c28 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c29 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 gate 1602702125135623700 evaluation starts +peer1.org1.example.com | [2c2a 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c2b 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2c2c 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 principal matched by identity 0 +peer1.org1.example.com | [2c2d 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 6b 36 9b 71 2f 1b 65 7a 2b f4 d6 38 6b 23 dc |nk6.q/.ez+..8k#.| +peer1.org1.example.com | 00000010 46 a8 8a 9e a4 86 45 19 f4 31 ff 20 67 93 1f b5 |F.....E..1. g...| +peer1.org1.example.com | [2c2e 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e ae 66 be f3 57 67 41 9f dc |0E.!..n.f..WgA..| +peer1.org1.example.com | 00000010 db 1e 45 ea 52 e6 03 4c 95 81 b9 f4 9c b5 e5 78 |..E.R..L.......x| +peer1.org1.example.com | 00000020 b1 c8 8c a5 82 02 20 7c 38 52 21 70 4b 1b aa 76 |...... |8R!pK..v| +peer1.org1.example.com | 00000030 70 98 64 6b e6 4a 2b e5 1b 35 6d bc 68 ab 50 e0 |p.dk.J+..5m.h.P.| +peer1.org1.example.com | 00000040 63 8c 10 5b 2e ac aa |c..[...| +peer1.org1.example.com | [2c2f 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c30 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003827ce0 gate 1602702125135623700 evaluation succeeds +peer1.org1.example.com | [2c31 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c32 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c33 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c34 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c35 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [2e63 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e64 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002597810 gate 1602702122942962400 evaluation succeeds +peer1.org2.example.com | [2e65 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e66 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e67 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e68 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e69 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [2e6a 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [2e6b 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e6c 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org2.example.com | [2e6d 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org2.example.com | [2e6e 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org2.example.com | [2e6f 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e70 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e71 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2e72 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e73 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e74 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e75 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e76 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e77 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e78 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e79 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e7a 10-14 19:02:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e7b 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2e7c 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2e7d 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e7e 10-14 19:02:03.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100D1801 +peer1.org2.example.com | [2e7f 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 38653D0EA812DEAB984E4C7FA37C5EC460AF1D96A1F7FCB87052D63C1825EF93 +peer1.org2.example.com | [2e80 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2e81 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e82 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e83 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e84 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e85 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e86 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e87 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e88 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e89 10-14 19:02:03.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8a 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e8b 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e8c 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8d 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e8e 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2e8f 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 6b 36 9b 71 2f 1b 65 7a 2b f4 d6 38 6b 23 dc |nk6.q/.ez+..8k#.| +peer1.org2.example.com | 00000010 46 a8 8a 9e a4 86 45 19 f4 31 ff 20 67 93 1f b5 |F.....E..1. g...| +peer1.org2.example.com | [2e90 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e ae 66 be f3 57 67 41 9f dc |0E.!..n.f..WgA..| +peer1.org2.example.com | 00000010 db 1e 45 ea 52 e6 03 4c 95 81 b9 f4 9c b5 e5 78 |..E.R..L.......x| +peer1.org2.example.com | 00000020 b1 c8 8c a5 82 02 20 7c 38 52 21 70 4b 1b aa 76 |...... |8R!pK..v| +peer1.org2.example.com | 00000030 70 98 64 6b e6 4a 2b e5 1b 35 6d bc 68 ab 50 e0 |p.dk.J+..5m.h.P.| +peer1.org2.example.com | 00000040 63 8c 10 5b 2e ac aa |c..[...| +peer1.org2.example.com | [2e91 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e92 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2e93 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e94 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e95 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e96 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e97 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e98 10-14 19:02:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e99 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e9a 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e9b 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6f 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2c70 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c71 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c72 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c73 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c74 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c75 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c76 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c77 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 gate 1602702118658565800 evaluation starts +peer0.org1.example.com | [2c78 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c79 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2c7a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 principal matched by identity 0 +peer0.org1.example.com | [2c7b 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +peer0.org1.example.com | 00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +peer0.org1.example.com | [2c7c 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +peer0.org1.example.com | 00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +peer0.org1.example.com | 00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +peer0.org1.example.com | 00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +peer0.org1.example.com | 00000040 d4 6b 8e 16 3c bb |.k..<.| +peer0.org1.example.com | [2c7d 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c7e 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 gate 1602702118658565800 evaluation succeeds +peer0.org1.example.com | [2c7f 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c80 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c81 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c82 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c83 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c84 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c85 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2c86 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer0.org1.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer0.org1.example.com | [2c87 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer0.org1.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer0.org1.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer0.org1.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer0.org1.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer1.org1.example.com | [2c36 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2c37 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2c38 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2c39 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2c3a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c3b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c3c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c3d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c3e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c3f 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c40 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c41 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c42 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c43 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c44 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c45 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c46 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c47 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c48 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c49 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c4b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c4d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c4e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c4f 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c50 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c51 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c52 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c53 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c54 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c55 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c56 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c57 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2c58 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2f8d 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f8e 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d5220 gate 1602702134600459000 evaluation succeeds +peer0.org2.example.com | [2f8f 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f90 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f91 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f92 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f93 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f94 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f95 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f96 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f97 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f98 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f99 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f9a 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f9b 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 gate 1602702134601391300 evaluation starts +peer0.org2.example.com | [2f9c 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f9d 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2f9e 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 principal matched by identity 0 +peer0.org2.example.com | [2f9f 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2fa0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2fa1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fa2 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404420 gate 1602702134601391300 evaluation succeeds +peer0.org2.example.com | [2fa3 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fa4 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fa5 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fa6 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fa7 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [2fa8 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [2fa9 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [2faa 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | [2c88 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c89 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c8a 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8b 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8c 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c8d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c8f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2c90 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer0.org1.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer0.org1.example.com | [2c91 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer0.org1.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer0.org1.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer0.org1.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer0.org1.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer0.org1.example.com | [2c92 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2c93 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 db 9c 47 d8 ff b2 0b f2 51 0d |0E.!....G.....Q.| +peer0.org1.example.com | 00000010 00 26 42 3d 45 2f f1 70 98 fc b5 4b c7 88 1f e0 |.&B=E/.p...K....| +peer0.org1.example.com | 00000020 fd 04 29 0c a8 02 20 5e b5 34 40 aa b5 8e 5e 71 |..)... ^.4@...^q| +peer0.org1.example.com | 00000030 c4 8d 9c 6f 89 59 4a e4 4d 56 3f a8 0a 41 0a 57 |...o.YJ.MV?..A.W| +peer0.org1.example.com | 00000040 be 69 af c1 73 1c cc |.i..s..| +peer0.org1.example.com | [2c94 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2c95 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2c96 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c97 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c98 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c99 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c9a 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9b 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c9c 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c9d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c59 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c5a 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c5b 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c5c 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2c5d 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c5e 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c5f 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 gate 1602702125239042200 evaluation starts +peer1.org1.example.com | [2c60 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c61 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2c62 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 principal matched by identity 0 +peer1.org1.example.com | [2c63 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 1d 94 e2 48 42 c2 93 2c df 23 85 5e d7 83 03 |....HB..,.#.^...| +peer1.org1.example.com | 00000010 ac b7 05 c8 b6 46 0d d2 75 70 31 72 2d a8 2e 4e |.....F..up1r-..N| +peer1.org1.example.com | [2c64 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 42 f8 aa e1 63 7f d3 62 e1 a2 |0E.!..B...c..b..| +peer1.org1.example.com | 00000010 6d 3b 0c 6d 74 33 cc 8d a9 6a dd 8d f3 cf be 39 |m;.mt3...j.....9| +peer1.org1.example.com | 00000020 29 ea 13 6a cb 02 20 7b 32 eb 95 30 bc 09 72 d1 |)..j.. {2..0..r.| +peer1.org1.example.com | 00000030 2e e5 0d 3c fa 39 33 12 b2 8c 41 47 13 8f 52 c3 |...<.93...AG..R.| +peer1.org1.example.com | 00000040 72 f5 d9 a6 fa f4 d5 |r......| +peer1.org1.example.com | [2c65 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c66 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003874ec0 gate 1602702125239042200 evaluation succeeds +peer1.org1.example.com | [2c67 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c68 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c69 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c6a 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c6b 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c6c 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c6d 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2c6e 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2c6f 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c70 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2c71 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e9c 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e9d 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e9e 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e9f 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ea0 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea1 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ea2 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea3 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ea4 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ea5 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea6 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ea7 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea8 10-14 19:02:05.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [2ea9 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2eaa 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161027 +peer1.org2.example.com | [2eab 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F51D94E24842C2932CDF23855ED78303ACB705C8B6460DD2757031722DA82E4E +peer1.org2.example.com | [2eac 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2ead 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2eae 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2eaf 10-14 19:02:05.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2eb0 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb1 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb2 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2eb3 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb4 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2eb5 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb6 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2eb7 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eb9 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2eb8 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2eba 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ebb 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ebc 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ebd 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2c9e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c9f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ca0 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ca1 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ca2 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ca3 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ca4 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 gate 1602702118669492100 evaluation starts +peer0.org1.example.com | [2ca5 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ca6 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ca7 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 principal matched by identity 0 +peer0.org1.example.com | [2ca8 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [2ca9 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2caa 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2cab 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 gate 1602702118669492100 evaluation succeeds +peer0.org1.example.com | [2cac 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cad 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cae 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2caf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2cb0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2cb1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cb2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +peer0.org1.example.com | 00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +peer0.org1.example.com | [2cb3 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +peer0.org1.example.com | 00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +peer0.org1.example.com | 00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +peer0.org1.example.com | 00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +peer0.org1.example.com | 00000040 2d c3 a9 7e 8e 17 |-..~..| +peer0.org1.example.com | [2cb4 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cb5 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cb6 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cb7 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2cb8 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb9 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2cba 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cbb 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cbc 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2cbd 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2cbe 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2cbf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 gate 1602702118671239100 evaluation starts +peer0.org1.example.com | [2cc0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cc1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2cc2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 principal matched by identity 0 +peer0.org1.example.com | [2cc3 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +peer0.org1.example.com | 00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +peer0.org1.example.com | [2cc4 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +peer0.org1.example.com | 00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +peer0.org1.example.com | 00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +peer0.org1.example.com | 00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +peer1.org1.example.com | [2c72 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c73 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c74 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c75 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c77 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c76 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c78 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c79 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7a 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7b 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7c 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7d 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7e 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c7f 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c80 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c81 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2c83 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c84 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c82 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c85 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c86 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c87 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c88 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c89 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c8a 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c8b 10-14 19:02:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [2c8c 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c8d 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102E +peer1.org1.example.com | [2c8e 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC64A2B3BCD21351A9FCFBA5D7D2309DB66C21976D753AFA54AC4787CFC642E1 +peer1.org1.example.com | [2c8f 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c90 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2c91 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2c92 10-14 19:02:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2c93 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c94 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c95 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c96 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2c97 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c98 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2c99 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2c9a 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c9b 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ebe 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ebf 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec0 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ec1 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ec2 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ec3 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2ec4 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ec5 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ec6 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ec7 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ec8 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ec9 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 gate 1602702125416635800 evaluation starts +peer1.org2.example.com | [2eca 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ecb 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2ecc 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ecd 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 principal evaluation fails +peer1.org2.example.com | [2ece 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c50d0 gate 1602702125416635800 evaluation fails +peer1.org2.example.com | [2ecf 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ed0 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ed1 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2ed2 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 gate 1602702125417144400 evaluation starts +peer1.org2.example.com | [2ed3 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ed4 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2ed5 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 principal matched by identity 0 +peer1.org2.example.com | [2ed6 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 64 a2 b3 bc d2 13 51 a9 fc fb a5 d7 d2 30 9d |.d.....Q......0.| +peer1.org2.example.com | 00000010 b6 6c 21 97 6d 75 3a fa 54 ac 47 87 cf c6 42 e1 |.l!.mu:.T.G...B.| +peer1.org2.example.com | [2ed7 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 17 37 fb 44 6e 58 59 96 f5 fb e2 |0D. 0.7.DnXY....| +peer1.org2.example.com | 00000010 8a ed 02 27 14 24 b9 29 41 14 36 8f 79 48 7a 48 |...'.$.)A.6.yHzH| +peer1.org2.example.com | 00000020 a4 a7 eb 25 02 20 49 51 26 17 90 4a 3d 68 e1 70 |...%. IQ&..J=h.p| +peer1.org2.example.com | 00000030 ad cb 9a 47 03 f8 56 cd 9c 8f 5e 39 44 4b 78 b5 |...G..V...^9DKx.| +peer1.org2.example.com | 00000040 1b 00 74 8b 03 87 |..t...| +peer1.org2.example.com | [2ed8 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ed9 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c58a0 gate 1602702125417144400 evaluation succeeds +peer1.org2.example.com | [2eda 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2edb 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2edc 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2edd 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ede 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [2fab 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fac 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fad 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fae 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2faf 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fb0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fb1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fb2 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fb3 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fb4 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fb5 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 gate 1602702134603888300 evaluation starts +peer0.org2.example.com | [2fb6 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fb7 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2fb8 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 principal matched by identity 0 +peer0.org2.example.com | [2fb9 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2fba 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2fbb 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fbc 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034205a0 gate 1602702134603888300 evaluation succeeds +peer0.org2.example.com | [2fbd 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fbe 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fbf 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fc0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fc1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fc2 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c9c 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c9d 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c9e 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c9f 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ca0 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ca1 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ca2 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ca3 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ca4 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2ca5 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 a2 03 ab c2 7f 0b 33 ba 43 25 4d 7e e7 7a |\.......3.C%M~.z| +peer1.org1.example.com | 00000010 e4 a3 83 57 0b 6b c4 dd 04 22 f5 80 b0 2d 4f bc |...W.k..."...-O.| +peer1.org1.example.com | [2ca6 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 45 4e 56 91 0e 21 36 3c 3b 89 7c |0D. BENV..!6<;.|| +peer1.org1.example.com | 00000010 ed 7a 1c 09 c5 d2 8b 2b 86 38 22 2a 69 87 29 e5 |.z.....+.8"*i.).| +peer1.org1.example.com | 00000020 7c b4 c2 46 02 20 58 b9 ff 90 f7 79 c4 66 69 c0 ||..F. X....y.fi.| +peer1.org1.example.com | 00000030 54 5c 35 47 ab 91 59 e9 27 93 88 1c 56 f4 3b 21 |T\5G..Y.'...V.;!| +peer1.org1.example.com | 00000040 87 e5 70 ef 9d 45 |..p..E| +peer1.org1.example.com | [2ca7 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ca8 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2ca9 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2caa 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2cab 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2cac 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cad 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cae 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2caf 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb0 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb1 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb2 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2cb3 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb4 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2cb5 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb6 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb7 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cb8 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cb9 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cba 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cbb 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cbc 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cbd 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cbe 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cbf 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc0 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cc1 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc2 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cc3 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cc4 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc5 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cc6 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cc7 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cc8 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cc9 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cca 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2ccb 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ccc 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ccd 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cce 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ccf 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd0 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd1 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd2 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd3 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd4 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd5 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2cd6 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd7 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd8 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd9 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cda 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cdb 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2cdc 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fc3 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fc4 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fc5 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fc6 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fc7 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fc8 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fc9 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 gate 1602702134604642700 evaluation starts +peer0.org2.example.com | [2fca 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fcb 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2fcc 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 principal matched by identity 0 +peer0.org2.example.com | [2fcd 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2fce 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2fcf 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fd0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034217a0 gate 1602702134604642700 evaluation succeeds +peer0.org2.example.com | [2fd1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fd2 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fd3 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fd4 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fd5 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [2fd6 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [2fd7 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [2fd8 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [2fd9 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fda 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fdb 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fdc 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fdd 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 60 4e 68 63 f0 85 |`Nhc..| +peer0.org1.example.com | [2cc5 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2cc6 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 gate 1602702118671239100 evaluation succeeds +peer0.org1.example.com | [2cc7 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cc8 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cc9 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2cca 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ccb 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ccc 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ccd 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2cce 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +peer0.org1.example.com | 00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +peer0.org1.example.com | [2ccf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +peer0.org1.example.com | 00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +peer0.org1.example.com | 00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +peer0.org1.example.com | 00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +peer0.org1.example.com | 00000040 b0 1a e8 7b cb bd |...{..| +peer0.org1.example.com | [2cd0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cd1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cd2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cd3 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cd4 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cd5 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cd6 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cd7 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cd8 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cd9 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cda 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2cdb 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cdd 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cde 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cdf 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ce0 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ce1 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ce2 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ce3 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 gate 1602702126178880100 evaluation starts +peer1.org1.example.com | [2ce4 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ce5 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2ce6 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 principal matched by identity 0 +peer1.org1.example.com | [2ce7 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer1.org1.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer1.org1.example.com | [2ce8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer1.org1.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer1.org1.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer1.org1.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer1.org1.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer1.org1.example.com | [2ce9 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cea 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00391bf30 gate 1602702126178880100 evaluation succeeds +peer1.org1.example.com | [2ceb 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cec 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ced 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cee 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cef 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2cf0 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2cf1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2cf2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2cf3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2cf4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cf7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2cf8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cf9 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cfa 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cfb 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2cfc 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cfd 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cfe 10-14 19:02:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2cff 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d00 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d01 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d02 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d03 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d04 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d05 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d06 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d07 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2d08 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d09 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d0a 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d0b 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2d0c 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d0d 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d0e 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d0f 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fde 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fdf 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fe0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fe1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fe2 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fe3 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fe4 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 gate 1602702134609362700 evaluation starts +peer0.org2.example.com | [2fe5 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fe6 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2fe7 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 principal matched by identity 0 +peer0.org2.example.com | [2fe8 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [2fe9 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [2fea 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2feb 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00343f9d0 gate 1602702134609362700 evaluation succeeds +peer0.org2.example.com | [2fec 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fed 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fee 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fef 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ff0 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff1 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ff2 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ff3 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ff4 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ff5 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2ff6 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ff7 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ff8 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 gate 1602702134610296000 evaluation starts +peer0.org2.example.com | [2ff9 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ffa 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [2ffb 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 principal matched by identity 0 +peer0.org2.example.com | [2ffc 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [2ffd 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | [2edf 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2ee0 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2ee1 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2ee2 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2ee3 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee4 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee5 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee6 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ee7 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee8 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ee9 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eea 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eeb 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eec 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eed 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eee 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2eef 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ef0 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2ef1 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ef2 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ef3 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef4 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ef5 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2ef6 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ef7 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef8 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ef9 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2efa 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2efb 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2efc 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2efd 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2efe 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eff 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f00 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2f01 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f02 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2f03 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f04 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f05 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f06 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f07 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f08 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 gate 1602702125588816300 evaluation starts +peer1.org2.example.com | [2f09 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f0a 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2f0b 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2f0c 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 principal evaluation fails +peer1.org2.example.com | [2f0d 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a9ad0 gate 1602702125588816300 evaluation fails +peer1.org2.example.com | [2f0e 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f0f 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f10 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2f11 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 gate 1602702125589623300 evaluation starts +peer1.org2.example.com | [2f12 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f13 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2f14 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 principal matched by identity 0 +peer1.org2.example.com | [2f15 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 a2 03 ab c2 7f 0b 33 ba 43 25 4d 7e e7 7a |\.......3.C%M~.z| +peer1.org2.example.com | 00000010 e4 a3 83 57 0b 6b c4 dd 04 22 f5 80 b0 2d 4f bc |...W.k..."...-O.| +peer1.org2.example.com | [2f16 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 45 4e 56 91 0e 21 36 3c 3b 89 7c |0D. BENV..!6<;.|| +peer1.org2.example.com | 00000010 ed 7a 1c 09 c5 d2 8b 2b 86 38 22 2a 69 87 29 e5 |.z.....+.8"*i.).| +peer1.org2.example.com | 00000020 7c b4 c2 46 02 20 58 b9 ff 90 f7 79 c4 66 69 c0 ||..F. X....y.fi.| +peer1.org2.example.com | 00000030 54 5c 35 47 ab 91 59 e9 27 93 88 1c 56 f4 3b 21 |T\5G..Y.'...V.;!| +peer1.org2.example.com | 00000040 87 e5 70 ef 9d 45 |..p..E| +peer1.org2.example.com | [2f17 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f18 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000382120 gate 1602702125589623300 evaluation succeeds +peer1.org2.example.com | [2f19 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f1a 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f1b 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f1c 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f1d 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f1e 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2f1f 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2cdc 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2cdd 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cde 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cdf 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ce0 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ce1 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ce2 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 gate 1602702118932130300 evaluation starts +peer0.org1.example.com | [2ce3 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ce4 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ce5 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 principal matched by identity 0 +peer0.org1.example.com | [2ce6 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [2ce7 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [2ce8 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ce9 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 gate 1602702118932130300 evaluation succeeds +peer0.org1.example.com | [2cea 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ceb 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cec 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ced 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2cee 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cef 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf0 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cf1 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cf2 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2cf3 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2cf4 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2cf5 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 gate 1602702118935672700 evaluation starts +peer0.org1.example.com | [2cf6 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cf7 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2cf8 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 principal matched by identity 0 +peer0.org1.example.com | [2cf9 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [2cfa 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [2cfb 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2cfc 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 gate 1602702118935672700 evaluation succeeds +peer0.org1.example.com | [2cfd 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cfe 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2cff 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d00 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d10 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d11 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d12 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d13 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d14 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2d15 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2d16 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [2d17 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [2d18 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d19 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d1a 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d1b 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d1c 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d1d 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d1e 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d1f 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d20 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 gate 1602702126270871000 evaluation starts +peer1.org1.example.com | [2d21 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d22 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d23 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 principal matched by identity 0 +peer1.org1.example.com | [2d24 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2d25 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2d26 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d27 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a29f0 gate 1602702126270871000 evaluation succeeds +peer0.org1.example.com | [2d01 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d28 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d29 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d2a 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d2b 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d2c 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2e 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2f 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d30 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d31 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d32 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d33 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d34 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d35 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 gate 1602702126277609400 evaluation starts +peer1.org1.example.com | [2d36 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d2d 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d37 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d38 10-14 19:02:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 principal matched by identity 0 +peer1.org1.example.com | [2d39 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2d3a 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2d3b 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d3c 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3cf0 gate 1602702126277609400 evaluation succeeds +peer1.org1.example.com | [2d3d 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d3e 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d3f 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d40 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d41 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d42 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d43 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d44 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2d45 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2d46 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [2ffe 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fff 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003450bd0 gate 1602702134610296000 evaluation succeeds +peer0.org2.example.com | [3000 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3001 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3002 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3003 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3004 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [3005 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [3006 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [3007 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [3008 10-14 19:02:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3009 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [300a 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [300b 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [300c 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [300d 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [300e 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [300f 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3010 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3011 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3012 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3013 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3014 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 gate 1602702134639503500 evaluation starts +peer0.org2.example.com | [3015 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3016 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d02 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d03 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d04 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d05 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d06 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d07 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d08 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d09 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d0a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d0b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 gate 1602702118947573900 evaluation starts +peer0.org1.example.com | [2d0c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d0d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d0e 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d0f 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d10 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [2d11 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d12 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d13 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d14 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d15 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d16 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d17 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 principal matched by identity 0 +peer0.org1.example.com | [2d18 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [2d19 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [2d1a 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d1b 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 gate 1602702118947573900 evaluation succeeds +peer1.org2.example.com | [2f20 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f21 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2f22 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f23 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f24 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f25 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f26 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f27 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f28 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f29 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2a 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2b 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2c 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2f2d 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f2e 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2f2f 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f30 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f31 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f32 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f33 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f34 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f35 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f36 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f37 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f38 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f39 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f3a 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f3b 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f3c 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f3d 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f3e 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f3f 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f40 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2f41 10-14 19:02:06.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f42 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3017 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 principal matched by identity 0 +peer0.org2.example.com | [3018 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer0.org2.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer0.org2.example.com | [3019 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer0.org2.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer0.org2.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer0.org2.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer0.org2.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer0.org2.example.com | [301a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [301b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468e70 gate 1602702134639503500 evaluation succeeds +peer0.org2.example.com | [301c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [301d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [301e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [301f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3020 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3021 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3022 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3023 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3024 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3025 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3026 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3027 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3028 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3029 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [302a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [302b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [302c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [302d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [302e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [302f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > alive: alive: +peer0.org2.example.com | [3030 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3031 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3032 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3033 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3034 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3035 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3036 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3037 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d47 10-14 19:02:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [2d48 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d49 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f43 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f44 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f45 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f46 10-14 19:02:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2f47 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer1.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer1.org2.example.com | [2f48 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer1.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer1.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer1.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer1.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer1.org2.example.com | [2f49 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2f4a 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 b2 08 2c ee fd e8 db 0d e0 b9 cf |0D. D..,........| +peer1.org2.example.com | 00000010 74 9d 6d cf 50 25 4a b6 5c b8 4c 10 10 52 34 0a |t.m.P%J.\.L..R4.| +peer1.org2.example.com | 00000020 72 81 2e b8 02 20 1c 7b 90 9e ce e5 b5 2d 48 a3 |r.... .{.....-H.| +peer1.org2.example.com | 00000030 24 d9 1b b7 e1 47 84 25 ae 1d 67 a4 00 47 33 d3 |$....G.%..g..G3.| +peer1.org2.example.com | 00000040 94 9c 5e 8f ab 67 |..^..g| +peer1.org2.example.com | [2f4b 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2f4c 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [2f4d 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2f4e 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f4f 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2f50 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f51 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f52 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f53 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2f54 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f55 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f56 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f57 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2f58 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f59 10-14 19:02:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f5a 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2f5b 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f5c 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2f5d 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f5e 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2f5f 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f60 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f61 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f63 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f64 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f65 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f62 10-14 19:02:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f66 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f67 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f68 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f69 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f6a 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f6b 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f6c 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f6d 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f6f 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f70 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f6e 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f71 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f72 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f73 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f74 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f75 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f76 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f77 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2f78 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161028 +peer1.org2.example.com | [2f79 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ECFCAF05E961B51481BB0A85007BEDBACE49F83505E21B614C453B6BB6602258 +peer1.org2.example.com | [2f7a 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2f7b 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2f7c 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2f7d 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f7e 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f7f 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f80 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f81 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f82 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f83 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f84 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f85 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f86 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f87 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f88 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f89 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f8a 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f8b 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f8c 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2f8d 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org2.example.com | [2f8e 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d1d 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d1e 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d1f 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d20 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d21 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d22 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d23 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d24 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d25 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d26 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d27 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d28 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d29 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d2a 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 gate 1602702118965962100 evaluation starts +peer0.org1.example.com | [2d2b 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d2c 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d2d 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 principal matched by identity 0 +peer0.org1.example.com | [2d2e 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [2d2f 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [2d30 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d31 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 gate 1602702118965962100 evaluation succeeds +peer0.org1.example.com | [2d32 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d33 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d34 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d35 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d36 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d37 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d38 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d39 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d3a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2d3b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f8f 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f90 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2f91 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 fd 41 25 22 f1 b3 8b 53 03 51 |0E.!...A%"...S.Q| +peer1.org2.example.com | 00000010 8c 33 93 6a 9e 59 98 d9 38 b0 57 f5 c1 59 9e 64 |.3.j.Y..8.W..Y.d| +peer1.org2.example.com | 00000020 a8 ea 7c 14 62 02 20 46 01 d3 a2 6d 43 78 fd a4 |..|.b. F...mCx..| +peer1.org2.example.com | 00000030 95 68 79 56 64 68 2c b2 ff 58 2c cf bd e8 32 fc |.hyVdh,..X,...2.| +peer1.org2.example.com | 00000040 b3 96 1a a3 6c 6e 60 |....ln`| +peer1.org2.example.com | [2f92 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2f93 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2f94 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f95 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f96 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f97 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f98 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2f99 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer1.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer1.org2.example.com | [2f9a 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer1.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer1.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer1.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer1.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer1.org2.example.com | [2f9b 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f9c 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f9d 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2f9e 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org2.example.com | [2f9f 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fa1 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fa2 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fa3 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fa4 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fa5 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fa6 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fa7 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fa8 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2fa9 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer1.org2.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer1.org2.example.com | [2faa 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer1.org2.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer1.org2.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer1.org2.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer1.org2.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer1.org2.example.com | [2fab 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fac 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fad 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2fae 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org2.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org2.example.com | [2faf 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org2.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org2.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org2.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fb1 10-14 19:02:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fb2 10-14 19:02:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fb3 10-14 19:02:06.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fb4 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fb5 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fb6 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fb7 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fb8 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fb9 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fba 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fbb 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fbc 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fbd 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2fbe 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fbf 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fc0 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fc1 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc2 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fc3 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2fc4 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d3c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2d3d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 gate 1602702120141345300 evaluation starts +peer0.org1.example.com | [2d3e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d3f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d40 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 principal matched by identity 0 +peer0.org1.example.com | [2d41 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d6 14 1a 1d d6 a3 5b a8 f3 79 8f a1 18 f1 f8 |.......[..y.....| +peer0.org1.example.com | 00000010 fd e7 fb 1d 46 7d 26 5c 74 83 00 1d bc fe 31 a5 |....F}&\t.....1.| +peer0.org1.example.com | [2d42 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 42 c2 51 32 6b 05 18 86 df 65 2c |0D. .B.Q2k....e,| +peer0.org1.example.com | 00000010 06 82 de 32 c2 91 9c 08 bf ae ca 0c b5 84 82 bf |...2............| +peer0.org1.example.com | 00000020 bc 69 b1 65 02 20 70 35 60 60 26 37 76 b1 37 cf |.i.e. p5``&7v.7.| +peer0.org1.example.com | 00000030 73 f2 6f f3 fe 9a 5a 41 76 e6 30 ee b0 9a 90 41 |s.o...ZAv.0....A| +peer0.org1.example.com | 00000040 4b c3 34 b5 f4 ff |K.4...| +peer0.org1.example.com | [2d43 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d44 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 gate 1602702120141345300 evaluation succeeds +peer0.org1.example.com | [2d45 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2d46 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2d47 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2d48 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2d49 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2d4a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | [2d4b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d4c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [2d4d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [2d4e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2d4f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | [2d50 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2d51 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [2d52 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org1.example.com | [2d53 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org1.example.com | [2d54 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2d55 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0031b1400 env 0xc002492820 txn 0 +peer0.org1.example.com | [2d56 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002492820 +peer0.org1.example.com | [2d57 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org1.example.com | [2d58 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2d59 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2d5a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2d5b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2d5c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2d5d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +peer0.org1.example.com | 00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.| +peer0.org1.example.com | [2d5e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +peer0.org1.example.com | 00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +peer0.org1.example.com | 00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +peer0.org1.example.com | 00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +peer0.org1.example.com | 00000040 5c 21 63 9f f2 |\!c..| +peer0.org1.example.com | [2d5f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2d60 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002c11800, header channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +peer0.org1.example.com | [2d61 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [2d62 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [2d63 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2d64 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [2d65 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +peer0.org1.example.com | [2d66 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2d67 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0034f0000 +peer0.org1.example.com | [2d68 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2745739e-20f5-48af-85ed-b6a031dec2f1] +peer0.org1.example.com | [2d69 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2d6a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2745739e-20f5-48af-85ed-b6a031dec2f1] +peer0.org1.example.com | [2d6b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2d6c 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c2643954-01af-4dda-af1a-c17b9f307650] +peer0.org1.example.com | [2d6d 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2643954-01af-4dda-af1a-c17b9f307650] +peer0.org1.example.com | [2d6f 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 gate 1602702120150437800 evaluation starts +peer0.org1.example.com | [2d70 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d71 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d6e 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d72 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal matched by identity 0 +peer0.org1.example.com | [2d74 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d73 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 1b 98 bd 78 03 45 58 8d f8 dc 77 22 ff b6 d5 |....x.EX...w"...| +peer0.org1.example.com | 00000010 b5 cc e7 b3 b3 e7 84 2f b1 62 40 16 e5 4a c9 a1 |......./.b@..J..| +peer0.org1.example.com | [2d75 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d76 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d77 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 e6 f5 4a 44 f9 fd 23 6f 73 f2 db |0D. u..JD..#os..| +peer0.org1.example.com | 00000010 94 10 af 74 b7 7f 02 c5 28 78 73 aa 3b 4b 12 ab |...t....(xs.;K..| +peer0.org1.example.com | 00000020 8a 7a ed 79 02 20 6c 16 1d 7b 22 87 af a0 55 cd |.z.y. l..{"...U.| +peer0.org1.example.com | 00000030 a3 05 bf be 46 84 23 02 55 ec 84 b8 d3 8f d8 ab |....F.#.U.......| +peer0.org1.example.com | 00000040 a7 5a d0 a6 1e 51 |.Z...Q| +peer0.org1.example.com | [2d78 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d79 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d7a 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d7b 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2d7c 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 skipping identity 0 because it has already been used +peer0.org1.example.com | [2d7d 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal evaluation fails +peer0.org1.example.com | [2d7e 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 gate 1602702120150437800 evaluation succeeds +peer0.org1.example.com | [2d7f 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d557e6f9-1722-4eee-970c-8c6dc6e6270c] +peer0.org1.example.com | [2d80 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d81 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d82 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d84 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d85 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2d86 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d83 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d557e6f9-1722-4eee-970c-8c6dc6e6270c] +peer0.org1.example.com | [2d87 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d89 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d8a 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d8b 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d8c 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d8d 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d8e 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 gate 1602702120172473500 evaluation starts +peer0.org1.example.com | [2d8f 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d88 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [2d90 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd appears to be valid +peer0.org1.example.com | [2d91 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0034f0000 +peer0.org1.example.com | [2d92 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0031b1400 env 0xc002492820 txn 0 +peer0.org1.example.com | [2d93 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2d94 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 34ms +peer0.org1.example.com | [2d95 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [3038 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [3039 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [303a 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [303b 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [303c 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303d 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [303e 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [303f 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3040 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3041 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3042 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3043 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3044 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E16102C +peer0.org2.example.com | [3045 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 538254DDA345861D4FF3562EEB2887AA92CC18D7A41DF1A67CE51EC276423B86 +peer0.org2.example.com | [3046 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3047 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3048 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3049 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [304a 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304b 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304c 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [304d 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [304e 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [304f 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3050 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3051 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3053 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3052 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3054 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3055 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3056 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3057 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3058 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3059 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [305a 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [305b 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 2c ae 75 56 83 98 80 d0 bb d1 b4 0a 55 59 d7 |1,.uV........UY.| +peer0.org2.example.com | 00000010 bd b1 41 b1 d0 62 c7 69 a3 41 f9 a2 1e 9d 82 93 |..A..b.i.A......| +peer0.org2.example.com | [305c 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 98 ed b9 86 ae e1 66 89 52 03 |0E.!........f.R.| +peer0.org2.example.com | 00000010 de 32 8e 15 87 10 7c 65 c2 7c eb f0 a2 8c 50 6b |.2....|e.|....Pk| +peer0.org2.example.com | 00000020 d9 4c ad 94 3e 02 20 07 b7 a5 a9 93 25 1b c9 41 |.L..>. .....%..A| +peer0.org2.example.com | 00000030 b8 15 62 46 e8 44 12 a5 b0 f1 8f 59 3e f7 ad d6 |..bF.D.....Y>...| +peer0.org2.example.com | 00000040 4f 69 f0 8d 3b d0 aa |Oi..;..| +peer0.org2.example.com | [305d 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [305e 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [305f 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2fc5 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fc6 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fc7 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fc8 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fc9 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fca 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fcb 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 gate 1602702126510114200 evaluation starts +peer1.org2.example.com | [2fcc 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fcd 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2fce 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2fcf 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 principal evaluation fails +peer1.org2.example.com | [2fd0 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041eaf0 gate 1602702126510114200 evaluation fails +peer1.org2.example.com | [2fd1 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2fd2 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2fd3 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2fd4 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 gate 1602702126514398900 evaluation starts +peer1.org2.example.com | [2fd5 10-14 19:02:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fd6 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [2fd7 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 principal matched by identity 0 +peer1.org2.example.com | [2fd8 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org2.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org2.example.com | [2fd9 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org2.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org2.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org2.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org2.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org2.example.com | [2fda 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2fdb 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00041f2a0 gate 1602702126514398900 evaluation succeeds +peer1.org2.example.com | [2fdc 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fdd 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fde 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2fdf 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2fe0 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fe1 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2fe2 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2fe3 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2fe4 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2fe5 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe6 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe7 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe8 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2fe9 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fea 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2feb 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fec 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2fed 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fee 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d4a 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d4b 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d4c 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d4d 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d4e 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d4f 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d50 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 gate 1602702126292199700 evaluation starts +peer1.org1.example.com | [2d51 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d52 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d53 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 principal matched by identity 0 +peer1.org1.example.com | [2d54 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2d55 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2d56 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d57 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceca0 gate 1602702126292199700 evaluation succeeds +peer1.org1.example.com | [2d58 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d59 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d5a 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d5b 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d5c 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d5d 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d5e 10-14 19:02:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d5f 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3060 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3061 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3062 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3063 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3064 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3065 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3066 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3067 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3068 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3069 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [306d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [306e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [306f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3070 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3071 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3072 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3073 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3074 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3075 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3076 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3077 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3078 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3079 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [307a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [307b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fef 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2ff0 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ff1 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ff2 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff3 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff4 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff5 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff6 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff7 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ff8 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2ff9 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ffa 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ffb 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ffc 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ffd 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ffe 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fff 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3000 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3001 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3002 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3003 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3004 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3005 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3006 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3007 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3008 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3009 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [300a 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 gate 1602702126639895900 evaluation starts +peer1.org2.example.com | [300b 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [300c 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [300d 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [300e 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 principal evaluation fails +peer1.org2.example.com | [300f 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039f9a0 gate 1602702126639895900 evaluation fails +peer1.org2.example.com | [3010 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3011 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3012 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3013 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 gate 1602702126640417900 evaluation starts +peer1.org2.example.com | [3014 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3015 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3016 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 principal matched by identity 0 +peer1.org2.example.com | [3017 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org2.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org2.example.com | [3018 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org2.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org2.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org2.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org2.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org2.example.com | [3019 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [301a 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039ff10 gate 1602702126640417900 evaluation succeeds +peer1.org2.example.com | [301b 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [301c 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [301d 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [301e 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [301f 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3020 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3021 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3022 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3023 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3024 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3025 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3026 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3027 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3028 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3029 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [302a 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [302b 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2d96 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2d97 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | [2d98 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2d99 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2d9a 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2d9b 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [2d9c 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2d9d 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2d9f 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 principal matched by identity 0 +peer0.org1.example.com | [2da0 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 17 97 7e 5c 51 6f d3 98 4f 53 07 ec a7 b2 a5 |...~\Qo..OS.....| +peer0.org1.example.com | 00000010 e5 84 10 de 43 dc 6b 6b 10 0e c7 e4 e6 86 8e 61 |....C.kk.......a| +peer0.org1.example.com | [2da1 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2da3 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2da2 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 8a a3 fb 0b e8 b7 68 ea 89 bc |0E.!........h...| +peer0.org1.example.com | 00000010 ea 1e 92 78 10 bf d0 11 cb e0 af 5b 73 5b 5c 8e |...x.......[s[\.| +peer0.org1.example.com | 00000020 19 fd 40 49 65 02 20 3f 36 2f 8d 12 82 67 59 3c |..@Ie. ?6/...gY<| +peer0.org1.example.com | 00000030 e8 bc 1a e6 5c e2 b8 4e b3 56 db 6b 92 90 24 58 |....\..N.V.k..$X| +peer0.org1.example.com | 00000040 60 20 09 fe 17 e7 a3 |` .....| +peer0.org1.example.com | [2da4 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2da5 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 gate 1602702120172473500 evaluation succeeds +peer0.org1.example.com | [2da6 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2da7 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2da8 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2da9 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2daa 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dab 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2dac 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [302c 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive: +peer1.org2.example.com | [302d 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [302e 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [302f 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3030 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3031 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3032 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3033 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3034 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3035 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3036 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3037 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3038 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3039 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [303a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [303b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [303c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [303d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [303e 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [303f 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3040 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3041 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3042 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3043 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3044 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3045 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3046 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [307c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [307d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [307e 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [307f 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3080 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3081 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3082 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 gate 1602702135412132500 evaluation starts +peer0.org2.example.com | [3083 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3084 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3085 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 principal matched by identity 0 +peer0.org2.example.com | [3086 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 f7 53 cb 14 25 7b a3 a7 6b 37 e8 19 a1 a3 93 |G.S..%{..k7.....| +peer0.org2.example.com | 00000010 be fb 11 4b 98 78 f7 e6 fb 1b 9f b1 a6 1b 68 b2 |...K.x........h.| +peer0.org2.example.com | [3087 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 e6 ae b2 bb 9b ff db 19 46 8c |0E.!..........F.| +peer0.org2.example.com | 00000010 eb 5a ee de 03 6c 24 3f 8d 92 59 67 37 a6 d6 9e |.Z...l$?..Yg7...| +peer0.org2.example.com | 00000020 1a 97 ee c5 1c 02 20 20 4f c5 9d 88 70 dc 47 ca |...... O...p.G.| +peer0.org2.example.com | 00000030 c6 9b cf 6d 80 2d da f9 e0 29 f5 67 2a 43 fc ee |...m.-...).g*C..| +peer0.org2.example.com | 00000040 95 27 a7 29 f9 e3 a7 |.'.)...| +peer0.org2.example.com | [3088 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3089 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8890 gate 1602702135412132500 evaluation succeeds +peer0.org2.example.com | [308a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [308b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [308c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [308d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [308e 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [308f 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3090 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3091 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3092 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3093 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3094 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3095 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3096 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3097 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3098 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3099 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [309b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [309d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [309e 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [309f 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a0 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a1 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a2 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a3 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a4 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30a5 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a6 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30a7 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30a8 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30a9 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30aa 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ab 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ac 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59204 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30ad 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ae 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30af 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [30b0 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30b1 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [30b2 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30b3 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30b4 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30b5 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30b6 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30b7 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 gate 1602702135586292800 evaluation starts +peer0.org2.example.com | [30b8 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30b9 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [30ba 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 principal matched by identity 0 +peer0.org2.example.com | [30bb 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 aa e7 d4 8d fd e7 8a 71 30 8e 0c 0b 4f e7 ed |........q0...O..| +peer0.org2.example.com | 00000010 4e 79 75 e7 05 8d 85 20 8f 3b f5 cc c1 b2 aa fb |Nyu.... .;......| +peer0.org2.example.com | [30bc 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 12 12 8a 55 db f8 a3 d3 a6 08 c0 |0D. ...U.......| +peer0.org2.example.com | 00000010 52 54 05 bd ff a3 a0 44 da 0f f2 e6 1f 62 ca 15 |RT.....D.....b..| +peer0.org2.example.com | 00000020 e5 14 28 45 02 20 09 c3 78 d3 9e e8 f5 c5 0b 14 |..(E. ..x.......| +peer0.org2.example.com | 00000030 66 41 1a a9 b5 06 31 9d 93 27 f1 d3 2e 1a 12 30 |fA....1..'.....0| +peer0.org2.example.com | 00000040 1f a6 ab 66 96 d8 |...f..| +peer0.org2.example.com | [30bd 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [30be 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003519010 gate 1602702135586292800 evaluation succeeds +peer0.org2.example.com | [30bf 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30c0 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [30c1 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [30c3 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [30c4 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30c5 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [30c6 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [30c7 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [30c8 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [30c9 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ca 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30cb 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d60 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d61 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d62 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d63 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d64 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 gate 1602702126324610100 evaluation starts +peer1.org1.example.com | [2d65 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d66 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d67 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 principal matched by identity 0 +peer1.org1.example.com | [2d68 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2d69 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2d6a 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d6b 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cfea0 gate 1602702126324610100 evaluation succeeds +peer1.org1.example.com | [2d6c 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d6d 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d6e 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d6f 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d70 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d71 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d72 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d73 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2d74 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2d75 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [2d76 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [2d77 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d78 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d79 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d7a 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d7b 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d7c 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d7d 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30c2 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30cc 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30cd 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30ce 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30cf 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30d0 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30d1 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30d2 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30d3 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d4 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d5 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d6 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d7 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d8 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30d9 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30da 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [30db 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30dc 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2dad 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2dae 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2daf 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2db0 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2db1 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d9e 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [2db2 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2db5 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2db3 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2db4 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2db6 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [2db7 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2db8 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [2db9 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2dba 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2dbb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] marked as valid by state validator +peer0.org1.example.com | [2dbc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003249580), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0032495c0)} +peer0.org1.example.com | [2dbd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [2dbe 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2dbf 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2dc0 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org1.example.com | [2dc1 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org1.example.com | [2dc2 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org1.example.com | [2dc3 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc4 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc5 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc6 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [2dc7 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc8 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc9 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dca 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dcb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2dcc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dcd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2dce 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dcf 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dd0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +peer0.org1.example.com | txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +peer0.org1.example.com | ] +peer0.org1.example.com | [2dd1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to txid-index +peer0.org1.example.com | [2dd2 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx number:[0] ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to blockNumTranNum index +peer0.org1.example.com | [2dd3 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dd4 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dd5 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dd6 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dd7 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97566], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [2dd8 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [2dd9 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2dda 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ddb 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [2ddc 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [2ddd 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [2dde 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [2ddf 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [2de0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [2de1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [2de2 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2d7e 10-14 19:02:06.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d7f 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 gate 1602702126345662700 evaluation starts +peer1.org1.example.com | [2d80 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d81 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d82 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 principal matched by identity 0 +peer1.org1.example.com | [2d83 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2d84 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2d85 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d86 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a040d0 gate 1602702126345662700 evaluation succeeds +peer1.org1.example.com | [2d87 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d88 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d89 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d8a 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d8b 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d8c 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d8d 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d8e 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d8f 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d90 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d91 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d92 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d93 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 gate 1602702126354973900 evaluation starts +peer1.org1.example.com | [2d94 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d95 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2d96 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 principal matched by identity 0 +peer1.org1.example.com | [2d97 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2d98 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2d99 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d9a 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a052d0 gate 1602702126354973900 evaluation succeeds +peer1.org1.example.com | [2d9b 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d9c 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d9d 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d9e 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [30dd 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30de 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30df 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [30e0 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30e1 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:39148 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes +peer0.org2.example.com | [30e2 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30e3 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30e4 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [30e5 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30e6 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [30e7 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 gate 1602702136383865700 evaluation starts +peer0.org2.example.com | [30e8 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [30e9 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [30ea 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 principal matched by identity 0 +peer0.org2.example.com | [30eb 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 50 1f 2e e7 76 f5 a9 11 7a fe a4 7e f4 c7 a9 |.P...v...z..~...| +peer0.org2.example.com | 00000010 f1 58 d6 02 80 14 cd 2e 63 80 da f9 b5 af 7b 79 |.X......c.....{y| +peer0.org2.example.com | [30ec 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 46 c6 88 8d e7 a1 94 8b ef 79 |0E.!..F........y| +peer0.org2.example.com | 00000010 56 b0 df 5f af f1 64 26 2d 54 98 d1 74 bc 02 dd |V.._..d&-T..t...| +peer0.org2.example.com | 00000020 f2 01 49 9e f2 02 20 72 4e df 95 74 87 86 7e 1f |..I... rN..t..~.| +peer0.org2.example.com | 00000030 af e7 75 b3 66 23 d2 1c 9b 78 0b ac a8 25 74 d8 |..u.f#...x...%t.| +peer0.org2.example.com | 00000040 c4 e8 8f bf dc 56 9c |.....V.| +peer0.org2.example.com | [30ed 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [30ee 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c5390 gate 1602702136383865700 evaluation succeeds +peer0.org2.example.com | [30ef 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [30f0 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [30f1 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [30f2 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [30f3 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [30f4 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org2.example.com | [30f5 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f6 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [30f7 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org2.example.com | [30f8 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [30f9 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org2.example.com | [30fa 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org2.example.com | [30fb 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org2.example.com | [30fc 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org2.example.com | [30fd 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org2.example.com | [30fe 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [30ff 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0026731c0 env 0xc003927a40 txn 0 +peer0.org2.example.com | [3100 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003927a40 +peer0.org2.example.com | [3101 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer1.org1.example.com | [2d9f 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2da0 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2da1 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2da2 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2da3 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2da4 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2da5 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2da6 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da7 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da8 10-14 19:02:06.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2da9 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2daa 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2dab 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26770 gate 1602702126360081800 evaluation starts +peer1.org1.example.com | [2dac 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2dad 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26770 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2dae 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26770 principal matched by identity 0 +peer1.org1.example.com | [2daf 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org1.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org1.example.com | [2db0 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org1.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org1.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org1.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc003a26770 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2db2 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26770 gate 1602702126360081800 evaluation succeeds +peer1.org1.example.com | [2db3 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2db4 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2db5 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2db6 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2db7 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2db8 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2de3 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2de4 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [2de5 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [2de6 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | [2de7 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | [2de8 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [2de9 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [2dea 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [2deb 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 34ms (state_validation=13ms block_and_pvtdata_commit=13ms state_commit=4ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org1.example.com | [2dec 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | [2ded 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2dee 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2def 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2df0 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2df1 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2df2 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df3 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2df4 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2df5 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2df6 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2df7 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2df8 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2df9 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 gate 1602702120242831200 evaluation starts +peer0.org1.example.com | [2dfa 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dfb 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2dfc 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 principal matched by identity 0 +peer0.org1.example.com | [2dfd 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 ab f1 a0 52 a6 78 1e bf 8e ee 3b fa 45 6f c6 |3...R.x....;.Eo.| +peer0.org1.example.com | 00000010 18 b4 da 0e 58 92 52 5a c7 72 e0 a6 0c c9 40 bc |....X.RZ.r....@.| +peer0.org1.example.com | [2dfe 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 72 25 4a 02 f1 6c 9b a9 f8 26 06 |0D. jr%J..l...&.| +peer0.org1.example.com | 00000010 00 31 c9 e4 63 cd ce 5d f2 ea 51 54 95 33 b6 77 |.1..c..]..QT.3.w| +peer0.org1.example.com | 00000020 03 7b 95 ca 02 20 59 75 75 f8 14 b0 3a 2f 67 47 |.{... Yuu...:/gG| +peer0.org1.example.com | 00000030 38 7b b5 ea eb 10 c8 4d b6 f1 a7 69 e7 e4 ba 73 |8{.....M...i...s| +peer0.org1.example.com | 00000040 0e 00 dc b7 8b 09 |......| +peer0.org1.example.com | [2dff 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e00 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 gate 1602702120242831200 evaluation succeeds +peer0.org1.example.com | [2e01 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e02 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e03 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e04 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e05 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e06 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2e07 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e08 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e09 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e0a 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e0b 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2e0c 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e0d 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e0e 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e0f 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e10 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e11 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e12 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e13 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e14 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e16 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e15 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e17 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e18 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e19 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e1a 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1b 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1c 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1d 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e1e 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e1f 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e20 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e21 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e22 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e23 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e24 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e25 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e26 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e27 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e28 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e29 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2e2a 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 38 52 e9 9f f8 2b d8 7a b8 1f 4d 59 e1 f4 32 |n8R...+.z..MY..2| +peer0.org1.example.com | 00000010 d8 55 e8 45 a4 80 b0 18 35 75 0d 0b 4b 24 ad a5 |.U.E....5u..K$..| +peer0.org1.example.com | [2e2b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 e2 81 c9 2f 58 7b af cd ac 34 |0E.!...../X{...4| +peer0.org1.example.com | 00000010 c0 5f 75 d6 82 0b a4 bb 58 50 7d 21 bf c4 52 98 |._u.....XP}!..R.| +peer0.org1.example.com | 00000020 a2 dc 72 09 f6 02 20 26 6f 2b 4f 92 e5 22 c0 73 |..r... &o+O..".s| +peer0.org1.example.com | 00000030 5e b4 71 4e ad 21 e4 a5 d9 8e 2f ba f4 50 4a a9 |^.qN.!..../..PJ.| +peer0.org1.example.com | 00000040 49 10 40 1e 0d 48 77 |I.@..Hw| +peer0.org1.example.com | [2e2c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e2d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2e2e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e2f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2e30 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2e31 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e32 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e33 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e34 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e35 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e36 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e37 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3047 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 gate 1602702126916170800 evaluation starts +peer1.org2.example.com | [3048 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3049 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [304a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [304b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 principal evaluation fails +peer1.org2.example.com | [304c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050a60 gate 1602702126916170800 evaluation fails +peer1.org2.example.com | [304d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [304e 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [304f 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3050 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 gate 1602702126916428200 evaluation starts +peer1.org2.example.com | [3051 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3052 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3053 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 principal matched by identity 0 +peer1.org2.example.com | [3054 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [3055 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [3056 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3057 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003050fd0 gate 1602702126916428200 evaluation succeeds +peer1.org2.example.com | [3058 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3059 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [305a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [305b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [305c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [305d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [305e 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [305f 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3060 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3061 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3062 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3063 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3064 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 gate 1602702126917245300 evaluation starts +peer1.org2.example.com | [3065 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3066 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3067 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3068 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 principal evaluation fails +peer1.org2.example.com | [3069 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031182f0 gate 1602702126917245300 evaluation fails +peer1.org2.example.com | [306a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2db9 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2dba 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2dbb 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2dbc 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dbd 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dbe 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dbf 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2dc0 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dc1 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dc2 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dc3 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dc4 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dc5 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dc6 10-14 19:02:06.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2dc7 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dc8 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dc9 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2dca 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dcb 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dcc 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dcd 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dce 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dcf 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd0 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd1 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd2 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd3 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2dd4 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dd5 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2dd6 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dd7 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2dd8 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2dd9 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dda 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ddb 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ddc 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e38 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e39 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e3a 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e3b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e3c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e3d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e3e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e3f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2e40 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e41 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e42 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e43 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2e44 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2e45 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e46 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2e47 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161028 +peer0.org1.example.com | [2e48 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4D0BD083D97400305DA2DA7713C20DFB8F1065DE19A1ED422BD0AFC42439CBEF +peer0.org1.example.com | [2e49 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2e4a 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2e4b 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2e4c 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2e4d 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4e 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4f 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e50 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e51 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e52 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e53 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2e54 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e55 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e56 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e57 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e58 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e59 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e5a 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41796 +peer0.org1.example.com | [2e5b 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c6460 +peer0.org1.example.com | [2e5c 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2e5d 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2e5e 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2e5f 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2e60 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2e61 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 7d 82 b6 54 29 a9 f6 a9 7c 6a f1 ba a7 59 9f |.}..T)...|j...Y.| +peer1.org2.example.com | [306b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [306c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [306d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 gate 1602702126917498200 evaluation starts +peer1.org2.example.com | [306e 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [306f 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3070 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 principal matched by identity 0 +peer1.org2.example.com | [3071 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [3072 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [3073 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3074 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003118860 gate 1602702126917498200 evaluation succeeds +peer1.org2.example.com | [3075 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3076 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3077 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3078 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3079 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [307a 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [307b 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [307c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [307d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [307e 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [307f 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3080 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3081 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3082 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3083 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3084 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3085 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3086 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3087 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3088 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3089 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 gate 1602702126945648100 evaluation starts +peer1.org2.example.com | [308a 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [308b 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [308c 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [308d 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 principal evaluation fails +peer1.org2.example.com | [308e 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004431e0 gate 1602702126945648100 evaluation fails +peer1.org2.example.com | [308f 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3090 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3091 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3092 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 gate 1602702126957274200 evaluation starts +peer1.org2.example.com | [3093 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3094 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3095 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 principal matched by identity 0 +peer1.org2.example.com | [3096 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [3097 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [3098 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3099 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443750 gate 1602702126957274200 evaluation succeeds +peer1.org2.example.com | [309a 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [309b 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [309c 10-14 19:02:06.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [309d 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [309e 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [309f 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30a0 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30a1 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30a2 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30a3 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30a4 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30a5 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30a6 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 gate 1602702126961143800 evaluation starts +peer1.org2.example.com | [30a7 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30a8 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [30a9 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30aa 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 principal evaluation fails +peer1.org2.example.com | [30ab 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146950 gate 1602702126961143800 evaluation fails +peer0.org1.example.com | 00000010 f6 86 78 38 6e 50 fc 42 68 15 48 3e cf c3 ee ab |..x8nP.Bh.H>....| +peer0.org1.example.com | [2e62 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e2 df 83 d7 b3 ec 00 8f 2b 51 |0E.!..........+Q| +peer0.org1.example.com | 00000010 67 47 43 d2 26 a6 ff 95 7a 7a c4 f0 7f 08 fc 95 |gGC.&...zz......| +peer0.org1.example.com | 00000020 82 71 aa 4a ee 02 20 22 dc aa a0 f1 a1 44 8d b9 |.q.J.. ".....D..| +peer0.org1.example.com | 00000030 d9 54 a0 c9 fa 88 db 4b 53 02 2f bf 23 64 7e 9f |.T.....KS./.#d~.| +peer0.org1.example.com | 00000040 44 e2 94 9a 2c 37 fc |D...,7.| +peer0.org1.example.com | [2e63 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2e64 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c8930, header 0xc0003c6af0 +peer0.org1.example.com | [2e65 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2e66 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] processing txid: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813 +peer0.org1.example.com | [2e67 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +peer0.org1.example.com | [2e68 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2e69 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2e6a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2e6b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e6c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2e6d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 gate 1602702120680593900 evaluation starts +peer0.org1.example.com | [2e6e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e6f 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2e70 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 principal matched by identity 0 +peer0.org1.example.com | [2e71 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 7d 82 b6 54 29 a9 f6 a9 7c 6a f1 ba a7 59 9f |.}..T)...|j...Y.| +peer0.org1.example.com | 00000010 f6 86 78 38 6e 50 fc 42 68 15 48 3e cf c3 ee ab |..x8nP.Bh.H>....| +peer0.org1.example.com | [2e72 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e2 df 83 d7 b3 ec 00 8f 2b 51 |0E.!..........+Q| +peer0.org1.example.com | 00000010 67 47 43 d2 26 a6 ff 95 7a 7a c4 f0 7f 08 fc 95 |gGC.&...zz......| +peer0.org1.example.com | 00000020 82 71 aa 4a ee 02 20 22 dc aa a0 f1 a1 44 8d b9 |.q.J.. ".....D..| +peer0.org1.example.com | 00000030 d9 54 a0 c9 fa 88 db 4b 53 02 2f bf 23 64 7e 9f |.T.....KS./.#d~.| +peer0.org1.example.com | 00000040 44 e2 94 9a 2c 37 fc |D...,7.| +peer0.org1.example.com | [2e73 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e74 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 gate 1602702120680593900 evaluation succeeds +peer0.org1.example.com | [2e75 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2e76 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2e77 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2e78 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2e79 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2e7a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +peer0.org1.example.com | [2e7b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2e7c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2e7d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2e7e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2e7f 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2e80 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2e81 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] handling GET_STATE from chaincode +peer0.org1.example.com | [2e82 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2e83 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2e84 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2e85 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2e86 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] notifying Txid:fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, channelID:businesschannel +peer0.org1.example.com | [2e87 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2e88 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][fa1b0f40] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [2e89 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2e8a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +peer0.org1.example.com | [2e8b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Exit +peer0.org1.example.com | [2e8c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2e8d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2e8e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, chaincode: exp02} +peer0.org1.example.com | [2e8f 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20107E5DEE7A02CA334AC25A05512B...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2e90 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1AA7175091398B0FFF97A8BE18B0ED2635A8137757CF130CB879FFCE89D4D6F +peer0.org1.example.com | [2e91 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, chaincode: exp02} +peer0.org1.example.com | [2e92 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Exit +peer0.org1.example.com | [2e93 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +peer0.org1.example.com | [2e94 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41796 +peer0.org1.example.com | [2e95 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41796 grpc.code=OK grpc.call_duration=16.0018ms +peer0.org1.example.com | [2e96 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2e97 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2e98 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41800 +peer0.org1.example.com | [2e99 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c7860 +peer0.org1.example.com | [2e9a 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2e9b 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2e9c 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2e9d 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2e9e 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2e9f 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b bd 67 c0 2c a3 88 c1 c8 43 bc 58 02 9c 2d 18 |..g.,....C.X..-.| +peer0.org1.example.com | 00000010 fb 4c ba 1c 6e 4e 98 9d 18 ef 3b 97 2f f5 84 2e |.L..nN....;./...| +peer0.org1.example.com | [2ea0 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 53 f8 89 6d a3 14 04 1c 0f f1 |0E.!..S..m......| +peer0.org1.example.com | 00000010 85 68 f7 07 23 43 e3 ca 3a 59 a2 cc 7b 45 dd 7a |.h..#C..:Y..{E.z| +peer0.org1.example.com | 00000020 e8 46 9b 74 76 02 20 48 bf 19 77 51 b2 c5 85 71 |.F.tv. H..wQ...q| +peer0.org1.example.com | 00000030 19 1b 9f fc e6 9f 1b 8a 94 28 4c 51 c4 4f 4f 1d |.........(LQ.OO.| +peer0.org1.example.com | 00000040 15 20 8b 0c a0 dc 45 |. ....E| +peer0.org1.example.com | [2ea1 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ea2 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c8d20, header 0xc0003c7cc0 +peer0.org1.example.com | [2ea3 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2ea4 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] processing txid: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f +peer0.org1.example.com | [2ea5 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +peer0.org1.example.com | [2ea6 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2ea7 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +peer0.org1.example.com | [2ea8 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2ea9 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2eaa 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2eab 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +peer0.org1.example.com | [2eac 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2ead 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2eae 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2eaf 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2eb0 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 gate 1602702121068810900 evaluation starts +peer0.org1.example.com | [2eb1 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2eb2 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2eb3 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2eb4 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 principal evaluation fails +peer0.org1.example.com | [2eb5 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 gate 1602702121068810900 evaluation fails +peer0.org1.example.com | [2eb6 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2eb7 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2eb8 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2eb9 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 gate 1602702121069432700 evaluation starts +peer0.org1.example.com | [2eba 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ebb 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ebc 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 principal matched by identity 0 +peer0.org1.example.com | [2ebd 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b bd 67 c0 2c a3 88 c1 c8 43 bc 58 02 9c 2d 18 |..g.,....C.X..-.| +peer0.org1.example.com | 00000010 fb 4c ba 1c 6e 4e 98 9d 18 ef 3b 97 2f f5 84 2e |.L..nN....;./...| +peer0.org1.example.com | [2ebe 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 53 f8 89 6d a3 14 04 1c 0f f1 |0E.!..S..m......| +peer0.org1.example.com | 00000010 85 68 f7 07 23 43 e3 ca 3a 59 a2 cc 7b 45 dd 7a |.h..#C..:Y..{E.z| +peer0.org1.example.com | 00000020 e8 46 9b 74 76 02 20 48 bf 19 77 51 b2 c5 85 71 |.F.tv. H..wQ...q| +peer0.org1.example.com | 00000030 19 1b 9f fc e6 9f 1b 8a 94 28 4c 51 c4 4f 4f 1d |.........(LQ.OO.| +peer0.org1.example.com | 00000040 15 20 8b 0c a0 dc 45 |. ....E| +peer0.org1.example.com | [2ebf 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ec0 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 gate 1602702121069432700 evaluation succeeds +peer0.org1.example.com | [2ec1 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ec2 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ec3 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ec4 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ddd 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dde 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ddf 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de0 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de1 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de2 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de3 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2de4 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de5 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de6 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2de7 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de8 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de9 10-14 19:02:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dea 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2deb 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16102F +peer1.org1.example.com | [2dec 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F765B7FE1008C51C52749CF023202B1FA4BB8AC4D74DC7DB200E617229AF98AD +peer1.org1.example.com | [2ded 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2dee 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2def 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2df0 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2df1 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3102 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [3103 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3104 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3105 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3106 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3107 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [3108 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [3109 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [310a 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [310b 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +peer0.org2.example.com | 00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.| +peer0.org2.example.com | [310c 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +peer0.org2.example.com | 00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +peer0.org2.example.com | 00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +peer0.org2.example.com | 00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +peer0.org2.example.com | 00000040 4d 58 92 4e a4 4a df |MX.N.J.| +peer0.org2.example.com | [310d 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [310e 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003604000, header channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer0.org2.example.com | [310f 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [3110 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3111 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3112 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3113 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [3114 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [3115 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3116 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [3117 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [3118 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [3119 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [311a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [311b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [311c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [311d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [311e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [311f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [3120 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [3121 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3122 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [3123 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [3124 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [3125 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [3126 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3127 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [3128 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [3129 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [312a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [312b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [312c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [2df2 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2df3 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2df4 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2df5 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2df6 10-14 19:02:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2df7 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2df8 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2df9 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dfa 10-14 19:02:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dfb 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dfc 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dfd 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dfe 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dff 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2e00 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e01 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e02 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e03 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e04 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e05 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e06 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e07 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7e8e0 gate 1602702126549909600 evaluation starts +peer1.org2.example.com | [30ac 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30ad 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30ae 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30af 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 gate 1602702126961420600 evaluation starts +peer1.org2.example.com | [30b0 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30b1 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [30b2 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 principal matched by identity 0 +peer1.org2.example.com | [30b3 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [30b4 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [30b5 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30b6 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003146ed0 gate 1602702126961420600 evaluation succeeds +peer1.org2.example.com | [30b7 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30b8 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30b9 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30ba 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30bb 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [30bc 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [30bd 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [30be 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [30bf 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c0 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [30c1 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c2 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c3 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c4 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30c5 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30c6 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30c7 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30c8 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ec5 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2ec6 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] handling GET_STATE from chaincode +peer0.org1.example.com | [2ec7 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [2ec8 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2ec9 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2eca 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2ecb 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] notifying Txid:3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, channelID:businesschannel +peer0.org1.example.com | [2ecc 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2ecd 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3f4b4c68] Exit chaincode: name:"lscc" (4ms) +peer0.org1.example.com | [2ece 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2ecf 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +peer0.org1.example.com | [2ed0 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Exit +peer0.org1.example.com | [2ed1 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2ed2 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2ed3 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, chaincode: lscc} +peer0.org1.example.com | [2ed4 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20933C9EA551AA952926777E4AAC9E...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2ed5 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 33C2D840709C1F1BBF006687BC02FC636BA4297F8EDC4327D4F98353234F5246 +peer0.org1.example.com | [2ed6 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, chaincode: lscc} +peer0.org1.example.com | [2ed7 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Exit +peer0.org1.example.com | [2ed8 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +peer0.org1.example.com | [2ed9 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41800 +peer0.org1.example.com | [2eda 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41800 grpc.code=OK grpc.call_duration=6.7501ms +peer0.org1.example.com | [2edb 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41800: read: connection reset by peer +peer0.org1.example.com | [2edc 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2edd 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2ede 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41804 +peer0.org1.example.com | [2edf 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000369770 +peer0.org1.example.com | [2ee0 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2ee1 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ee2 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ee3 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2ee4 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ee5 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 1f a7 c7 49 e3 82 5c fc c5 cb 3a 5b 7b 9c 07 |....I..\...:[{..| +peer0.org1.example.com | 00000010 05 b5 6a 48 64 0e ac f5 67 fe 5a cf 48 ef 71 fb |..jHd...g.Z.H.q.| +peer0.org1.example.com | [2ee6 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 26 48 2f bf b7 62 51 c5 36 51 |0E.!..&H/..bQ.6Q| +peer0.org1.example.com | 00000010 9b 94 e7 3e 88 62 8b cd d9 f0 e7 1b a1 1e da 89 |...>.b..........| +peer0.org1.example.com | 00000020 6c 49 8f c6 77 02 20 1e cc 0a 47 d6 54 9d 5f 78 |lI..w. ...G.T._x| +peer0.org1.example.com | 00000030 04 6e c1 20 34 5f b9 ea fa 9c 14 0a b0 ab a5 c0 |.n. 4_..........| +peer0.org1.example.com | 00000040 ed 2c 8f 83 7c 36 31 |.,..|61| +peer0.org1.example.com | [2ee7 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ee8 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035ba8c0, header 0xc000369c20 +peer0.org1.example.com | [2ee9 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2eea 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] processing txid: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0 +peer0.org1.example.com | [2eeb 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +peer0.org1.example.com | [2eec 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2eed 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +peer0.org1.example.com | [2eee 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2eef 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][201e0cba] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2ef0 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2ef1 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +peer0.org1.example.com | [2ef2 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2ef3 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ef4 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ef5 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ef6 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 gate 1602702121280984900 evaluation starts +peer0.org1.example.com | [2ef7 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ef8 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ef9 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2efa 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 principal evaluation fails +peer0.org1.example.com | [2efb 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 gate 1602702121280984900 evaluation fails +peer0.org1.example.com | [2efc 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efd 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2efe 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2eff 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 gate 1602702121282923200 evaluation starts +peer0.org1.example.com | [2f00 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f01 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2f02 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 principal matched by identity 0 +peer0.org1.example.com | [2f03 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 1f a7 c7 49 e3 82 5c fc c5 cb 3a 5b 7b 9c 07 |....I..\...:[{..| +peer0.org1.example.com | 00000010 05 b5 6a 48 64 0e ac f5 67 fe 5a cf 48 ef 71 fb |..jHd...g.Z.H.q.| +peer0.org1.example.com | [2f04 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 26 48 2f bf b7 62 51 c5 36 51 |0E.!..&H/..bQ.6Q| +peer0.org1.example.com | 00000010 9b 94 e7 3e 88 62 8b cd d9 f0 e7 1b a1 1e da 89 |...>.b..........| +peer0.org1.example.com | 00000020 6c 49 8f c6 77 02 20 1e cc 0a 47 d6 54 9d 5f 78 |lI..w. ...G.T._x| +peer0.org1.example.com | 00000030 04 6e c1 20 34 5f b9 ea fa 9c 14 0a b0 ab a5 c0 |.n. 4_..........| +peer0.org1.example.com | 00000040 ed 2c 8f 83 7c 36 31 |.,..|61| +peer0.org1.example.com | [2f05 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f06 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 gate 1602702121282923200 evaluation succeeds +peer0.org1.example.com | [2f07 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f08 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f09 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f0a 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f0b 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2f0c 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] handling GET_STATE from chaincode +peer0.org1.example.com | [2f0d 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [2f0e 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2f0f 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2f10 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f11 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] notifying Txid:201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, channelID:businesschannel +peer0.org1.example.com | [2f12 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f13 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][201e0cba] Exit chaincode: name:"lscc" (6ms) +peer0.org1.example.com | [2f14 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2f15 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +peer0.org1.example.com | [2f16 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Exit +peer0.org1.example.com | [2f17 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2f18 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2f19 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, chaincode: lscc} +peer0.org1.example.com | [2f1a 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2048BB8AFA84692E17C6AE6D5BD024...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f1b 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E5DC156D054B668787C71B8A7BFD48E630740C8364B4BEDE730C472F34066C2 +peer0.org1.example.com | [2f1c 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, chaincode: lscc} +peer0.org1.example.com | [2f1d 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Exit +peer0.org1.example.com | [2f1e 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +peer0.org1.example.com | [2f1f 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41804 +peer0.org1.example.com | [2f20 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41804 grpc.code=OK grpc.call_duration=11.3586ms +peer0.org1.example.com | [2f21 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f22 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f23 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41808 +peer0.org1.example.com | [2f24 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00425e050 +peer0.org1.example.com | [2f25 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f26 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f27 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f28 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2f29 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f2a 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 f0 cf 8d 53 a7 24 24 eb 62 35 9a e0 a0 63 77 |....S.$$.b5...cw| +peer0.org2.example.com | [312d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [312e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [312f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [3130 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [3131 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org2.example.com | [3132 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org2.example.com | [3133 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org2.example.com | [3134 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3135 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3136 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [3137 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3138 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3139 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [313a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [313b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [313c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org2.example.com | [313d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [313e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [313f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [3140 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 gate 1602702136392923500 evaluation starts +peer0.org2.example.com | [3141 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [3142 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3143 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 principal matched by identity 0 +peer0.org2.example.com | [3144 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +peer0.org2.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o| +peer0.org2.example.com | [3145 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +peer0.org2.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +peer0.org2.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +peer0.org2.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +peer0.org2.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.| +peer0.org2.example.com | [3146 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3147 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d98d20 gate 1602702136392923500 evaluation succeeds +peer0.org2.example.com | [3148 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3149 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [314a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [314b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [314c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 gate 1602702136393419600 evaluation starts +peer0.org2.example.com | [314d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [314e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [314f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3150 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 processing identity 1 with bytes of 115a6c0 +peer0.org2.example.com | [3151 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [3152 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [3154 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3155 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3156 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3157 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3158 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3153 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3159 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [315a 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [315b 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [315c 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [315d 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 principal matched by identity 1 +peer0.org2.example.com | [315e 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +peer0.org2.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.| +peer0.org2.example.com | [315f 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +peer0.org2.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +peer0.org2.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +peer0.org2.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +peer0.org2.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..| +peer0.org2.example.com | [3160 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 principal evaluation succeeds for identity 1 +peer0.org2.example.com | [3161 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d99290 gate 1602702136393419600 evaluation succeeds +peer1.org1.example.com | [2e08 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7e8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e09 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7e8e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2e0a 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7e8e0 principal matched by identity 0 +peer1.org1.example.com | [2e0b 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer1.org1.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer1.org1.example.com | [2e0c 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer1.org1.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer1.org1.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer1.org1.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc003a7e8e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e0e 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7e8e0 gate 1602702126549909600 evaluation succeeds +peer1.org1.example.com | [2e0f 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e10 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e11 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e12 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e13 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e14 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e15 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2e16 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org1.example.com | [2e17 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org1.example.com | [2e18 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e19 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e1b 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e1a 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e1c 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e1d 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e1e 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e20 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2e1f 10-14 19:02:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e21 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org1.example.com | [2e23 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org1.example.com | [2e22 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e24 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e25 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e26 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2e27 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d a5 3e 21 87 48 c2 48 9b 37 a1 9a |0D. ..>!.H.H.7..| +peer1.org1.example.com | 00000010 9c f9 1c 3f c5 cd 69 34 c2 2a ba ff b4 cd c7 fb |...?..i4.*......| +peer1.org1.example.com | 00000020 0a 93 a2 e7 02 20 0e f9 b1 89 f2 44 28 bd d4 8a |..... .....D(...| +peer1.org1.example.com | 00000030 22 09 29 cb 73 52 63 22 c6 89 15 93 d0 6b 39 1f |".).sRc".....k9.| +peer1.org1.example.com | 00000040 11 16 8c 23 b8 68 |...#.h| +peer1.org1.example.com | [2e28 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2e29 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2e2a 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e2b 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e2c 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e2d 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2e2e 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e2f 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e30 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e32 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e33 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e34 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e35 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e36 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 gate 1602702126617880300 evaluation starts +peer1.org1.example.com | [2e37 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e38 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2e39 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 principal matched by identity 0 +peer1.org1.example.com | [2e3a 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer1.org1.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer1.org1.example.com | [2e3b 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer1.org1.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer1.org1.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer1.org1.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer1.org1.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer1.org1.example.com | [2e31 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e3c 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e3d 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e3e 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa2b70 gate 1602702126617880300 evaluation succeeds +peer1.org1.example.com | [2e3f 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e40 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3162 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3163 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3164 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org2.example.com | [3165 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org2.example.com | [3166 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [3167 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3168 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3169 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [316a 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [316b 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [316c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [316d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [316e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [316f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3170 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3171 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3172 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3173 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3174 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3175 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [3176 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3177 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3178 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [3179 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org2.example.com | [317a 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org2.example.com | [317b 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [317c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [317d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [317e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [317f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3180 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [3181 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [3182 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [3183 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [3184 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [3185 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [3186 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [3187 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [3188 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [3189 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [318a 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [318b 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [318c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [318d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [318e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [318f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3190 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3191 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [3192 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [30c9 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30ca 10-14 19:02:06.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 gate 1602702126969193300 evaluation starts +peer1.org2.example.com | [30cb 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30cc 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [30cd 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30ce 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 principal evaluation fails +peer1.org2.example.com | [30cf 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9110 gate 1602702126969193300 evaluation fails +peer1.org2.example.com | [30d0 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30d1 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30d2 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30d3 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 gate 1602702126973065200 evaluation starts +peer1.org2.example.com | [30d4 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30d5 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [30d6 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 principal matched by identity 0 +peer1.org2.example.com | [30d7 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [30d8 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [30d9 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30da 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d9690 gate 1602702126973065200 evaluation succeeds +peer1.org2.example.com | [30db 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30dc 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30dd 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30de 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30df 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e0 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30e1 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30e2 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30e3 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30e4 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30e5 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30e6 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30e7 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 gate 1602702126974651000 evaluation starts +peer1.org2.example.com | [30e8 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30e9 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [30ea 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30eb 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 principal evaluation fails +peer1.org2.example.com | [30ec 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322c8b0 gate 1602702126974651000 evaluation fails +peer1.org2.example.com | [30ed 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e41 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e42 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e43 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e44 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e45 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e46 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2e47 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org1.example.com | [2e48 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org1.example.com | [2e49 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e4a 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2e4b 10-14 19:02:06.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e4c 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e4d 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e4e 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e4f 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e50 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e51 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e52 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e53 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e54 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e55 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e56 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e57 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2e58 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e59 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org1.example.com | [2e5a 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org1.example.com | [2e5b 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2e5c 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 57 e8 fc 01 ef e6 02 22 0c 81 7c |0D. 0W......"..|| +peer1.org1.example.com | 00000010 f5 1c 83 94 ac e5 b0 4c c0 0b e7 c2 dd 22 e7 09 |.......L....."..| +peer1.org1.example.com | 00000020 76 ea 9a a6 02 20 3c 23 52 78 cf ce b2 8f fb a2 |v.... <#Rx......| +peer1.org1.example.com | 00000030 8a 3a 5a 99 48 46 ca 76 52 18 7e 06 bd 79 93 25 |.:Z.HF.vR.~..y.%| +peer1.org1.example.com | 00000040 3d 20 2a 7c 68 06 |= *|h.| +peer1.org1.example.com | [2e5d 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2e5e 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [2e5f 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2e60 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3193 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [3194 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [3195 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3196 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3197 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [3198 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [3199 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [319a 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [319b 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [319c 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [319d 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [319e 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [319f 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [31a0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [31a1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org2.example.com | [31a2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org2.example.com | [31a3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [31a4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [31a5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org2.example.com | [31a6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [31a7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [31a8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [31a9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [31aa 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [31ab 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [31ac 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [31ad 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [31ae 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [31af 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [31b0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [31b1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [31b2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [30ee 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 92 9f 7b 2e 83 66 32 0e 63 97 ce b7 ab e6 b4 22 |..{..f2.c......"| +peer0.org2.example.com | [31b3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [31b4 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2e61 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [31b5 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [31b6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2f2b 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 2c 33 dc 0d 5f c3 f6 4f c8 ca |0E.!..,3.._..O..| +peer1.org2.example.com | [30ef 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2e62 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | 00000010 a3 d0 92 e5 df 62 d3 8f 05 6a ec a0 45 d9 8b cf |.....b...j..E...| +peer1.org2.example.com | [30f0 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 gate 1602702126974946100 evaluation starts +peer1.org1.example.com | [2e63 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | 00000020 6f 99 0e bc 9b 02 20 5b 04 c4 27 a1 68 92 63 95 |o..... [..'.h.c.| +peer1.org2.example.com | [30f1 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e64 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | [2e65 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e66 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | 00000030 8c f0 3c 6f 09 f8 80 36 62 6d 01 be 8c 29 d7 3b |.. DEBU exits successfully +peer1.org1.example.com | [2e67 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f2d 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c9180, header 0xc00425e460 +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [30f2 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2e68 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > alive: +peer1.org1.example.com | [2e69 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e6a 10-14 19:02:06.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e6b 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e6c 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e6d 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e6e 10-14 19:02:06.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f3 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 principal matched by identity 0 +peer1.org2.example.com | [30f4 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | [2e6f 10-14 19:02:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | [2e70 10-14 19:02:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e71 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer0.org1.example.com | [2f2e 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [2e72 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org2.example.com | [30f5 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [2f2f 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] processing txid: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504 +peer1.org1.example.com | [2e73 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | [2f30 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +peer1.org1.example.com | [2e74 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100E1801 +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | [2f31 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [2e75 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B84F71F594F7A0AD688E46DADF090A25C8606889DCAC4DF2917E48A5FF82DF2C +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | [2f32 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +peer1.org1.example.com | [2e76 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | nw== +peer0.org1.example.com | [2f33 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Entry chaincode: name:"lscc" +peer1.org1.example.com | [2e77 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f6 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2f34 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ad484cba] Entry chaincode: name:"lscc" +peer1.org1.example.com | [2e78 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f7 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00322ce20 gate 1602702126974946100 evaluation succeeds +peer0.org2.example.com | [31b7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org1.example.com | [2f35 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [2e79 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f8 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31b8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org1.example.com | [2f36 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +peer1.org1.example.com | [2e7a 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30f9 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31b9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [30fa 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f37 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [31ba 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [2f38 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e7b 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [30fb 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [31bb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [2f39 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f3a 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e7c 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e7d 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30fc 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | [31bc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [2e7e 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [30fd 10-14 19:02:06.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [31bd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [31be 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [31bf 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org2.example.com | [31c0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org1.example.com | [2f3b 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 gate 1602702121449347600 evaluation starts +peer0.org2.example.com | [31c1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org1.example.com | [2e7f 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31c2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org2.example.com | [30fe 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [30ff 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | [2f3c 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f3d 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2f3e 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2f3f 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 principal evaluation fails +peer0.org1.example.com | [2f40 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 gate 1602702121449347600 evaluation fails +peer0.org1.example.com | [2f41 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f42 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2f43 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2f44 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 gate 1602702121450331600 evaluation starts +peer0.org1.example.com | [2f45 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f46 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2f47 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 principal matched by identity 0 +peer0.org1.example.com | [2f48 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 f0 cf 8d 53 a7 24 24 eb 62 35 9a e0 a0 63 77 |....S.$$.b5...cw| +peer0.org1.example.com | 00000010 92 9f 7b 2e 83 66 32 0e 63 97 ce b7 ab e6 b4 22 |..{..f2.c......"| +peer0.org1.example.com | [2f49 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 2c 33 dc 0d 5f c3 f6 4f c8 ca |0E.!..,3.._..O..| +peer0.org1.example.com | 00000010 a3 d0 92 e5 df 62 d3 8f 05 6a ec a0 45 d9 8b cf |.....b...j..E...| +peer0.org1.example.com | 00000020 6f 99 0e bc 9b 02 20 5b 04 c4 27 a1 68 92 63 95 |o..... [..'.h.c.| +peer0.org1.example.com | 00000030 8c f0 3c 6f 09 f8 80 36 62 6d 01 be 8c 29 d7 3b |.. DEBU 0xc003878af0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f4b 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 gate 1602702121450331600 evaluation succeeds +peer0.org1.example.com | [2f4c 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f4d 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2f4e 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2f4f 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2f50 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2f51 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] handling GET_STATE from chaincode +peer0.org1.example.com | [2f52 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org1.example.com | [2f53 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2f54 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2f55 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f56 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] notifying Txid:ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, channelID:businesschannel +peer0.org1.example.com | [2f57 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f58 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ad484cba] Exit chaincode: name:"lscc" (4ms) +peer0.org1.example.com | [2f59 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2f5a 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +peer0.org1.example.com | [2f5b 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Exit +peer0.org1.example.com | [2f5c 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2f5d 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] escc for chaincode name:"lscc" is escc +peer1.org1.example.com | [2e80 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [31c3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [31c4 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [31c5 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [31c6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [31c7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [31c8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [31c9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [31ca 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [31cb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [31cc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [31cd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [31ce 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [31cf 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [31d0 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [31d1 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [31d2 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [31d3 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [31d4 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [31d5 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [31d6 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [31d7 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [31d8 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [31d9 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [31da 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [31db 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31dc 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [31dd 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [31de 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [31df 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [31e0 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [31e1 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31e2 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [31e3 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [31e4 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [31e5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [31e6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [31e7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [31e8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [31e9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [31ea 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [31eb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [31ec 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [31ed 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [31ee 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [31ef 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [31f0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [31f1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [31f2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [31f3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [3100 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3101 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3102 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3103 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3104 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3105 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3106 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3107 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3108 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3109 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [310a 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [310b 10-14 19:02:06.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [310c 10-14 19:02:06.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [310d 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [310e 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [310f 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3110 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100E1801 +peer1.org2.example.com | [3111 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BF7283B0519B32A51B045951D5CB7E7EEE03D3E8040F974AB1E8EE9096E8E8DB +peer1.org2.example.com | [3112 10-14 19:02:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3113 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3114 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3115 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3116 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3117 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3118 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3119 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [311a 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [311b 10-14 19:02:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [311c 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [311d 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [311e 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [311f 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3120 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3121 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3122 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3123 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3124 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3125 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3126 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3127 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3128 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3129 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [312a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [312b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 5d 3c c2 cc e2 10 84 6a ae 1f 66 b0 4f 61 38 |.]<.....j..f.Oa8| +peer1.org2.example.com | 00000010 0c 28 75 de f3 cc 5d 1a c4 b8 09 71 1c cf 80 7a |.(u...]....q...z| +peer1.org2.example.com | [312c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b3 01 ac b8 85 1e 71 e6 7a b2 |0E.!........q.z.| +peer1.org2.example.com | 00000010 50 e4 29 5c f1 cc 96 05 12 c0 11 82 f7 38 ee 08 |P.)\.........8..| +peer1.org2.example.com | 00000020 e1 b9 19 33 9f 02 20 43 94 8b 01 e7 df 5e 71 36 |...3.. C.....^q6| +peer1.org2.example.com | 00000030 8a 22 fd 4d 18 5f 45 e0 96 d2 7d b4 c6 d4 92 50 |.".M._E...}....P| +peer1.org2.example.com | 00000040 78 69 8c d9 43 3d d4 |xi..C=.| +peer1.org2.example.com | [312d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [312e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [312f 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3130 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3131 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3132 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3133 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3134 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3135 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3136 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3137 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3138 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3139 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31f4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [31f5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [31f6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [31f7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [31f8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [31f9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [31fa 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [31fb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [31fc 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [31fd 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [31fe 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [31ff 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [3200 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [3201 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [3202 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [3203 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [3204 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [3205 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [3206 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [3207 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [3208 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [3209 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [320a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [320b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [320c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [320d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [320e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [320f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3210 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org2.example.com | [3211 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [3212 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [3213 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [3214 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [3215 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3216 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3217 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [3218 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [3219 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [321a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [321b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [321c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [321d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [321e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [321f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [3220 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [3221 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [3222 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [3223 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org2.example.com | [3224 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [3225 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3226 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3227 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3228 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3229 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [322a 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [322b 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 gate 1602702136473244800 evaluation starts +peer0.org2.example.com | [322c 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [322d 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [322e 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 principal matched by identity 0 +peer1.org2.example.com | [313a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [313b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [313c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [313d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [313e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [313f 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3140 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3141 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3142 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3143 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3144 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3145 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3146 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3147 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3148 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3149 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [314a 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [314b 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [314c 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [314d 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org2.example.com | [314e 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org2.example.com | [314f 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3150 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 03 2a 5d 70 86 b3 23 69 8c 82 |0E.!...*]p..#i..| +peer1.org2.example.com | 00000010 a3 a1 58 8f 18 9a 01 3c a8 ad c4 48 cc 59 a4 6a |..X....<...H.Y.j| +peer1.org2.example.com | 00000020 ec 4d 33 28 9c 02 20 4b f4 ed 93 50 69 85 f0 02 |.M3(.. K...Pi...| +peer1.org2.example.com | 00000030 f7 0f 42 c0 0c 7e 2a 3b e7 9e 76 03 96 15 85 25 |..B..~*;..v....%| +peer1.org2.example.com | 00000040 13 61 22 f7 98 34 d4 |.a"..4.| +peer1.org2.example.com | [3151 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3152 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3153 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3154 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3155 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3156 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3157 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3158 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3159 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [315a 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [315b 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [315c 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [315d 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:xI\225\315Xl\232\233^\223\362E" secret_envelope: > alive: +peer1.org2.example.com | [315e 10-14 19:02:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [315f 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3160 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3161 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161029 +peer1.org2.example.com | [3162 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8E9FAC79454E685C2472A5A82C9C4AC6D02086CA47FAEA7E9C430BE31F46A6A3 +peer1.org2.example.com | [3163 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3164 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3165 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3166 10-14 19:02:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3167 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3168 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3169 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [316a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e81 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e82 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e83 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e84 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e85 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e86 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e87 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e88 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2e89 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e8a 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e8b 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e8c 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e8d 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e8e 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e8f 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e90 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e91 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e92 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e93 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e94 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2e95 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e96 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e97 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e98 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2e99 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2e9a 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e9b 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e9c 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e9d 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e9e 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e9f 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [322f 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org2.example.com | [3230 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org2.example.com | [3231 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3232 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372c6a0 gate 1602702136473244800 evaluation succeeds +peer0.org2.example.com | [3233 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3234 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3235 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3236 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3237 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3238 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3239 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [323a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [323b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [323c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [323d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 gate 1602702136480306900 evaluation starts +peer0.org2.example.com | [323e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [323f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3240 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 principal matched by identity 0 +peer0.org2.example.com | [3241 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org2.example.com | [3242 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org2.example.com | [3243 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3244 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372d1e0 gate 1602702136480306900 evaluation succeeds +peer0.org2.example.com | [3245 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3246 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3247 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3248 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3249 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [324a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [324b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [324c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [324d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [324e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 gate 1602702136481378100 evaluation starts +peer0.org2.example.com | [324f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3250 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3251 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [3252 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 principal evaluation fails +peer0.org2.example.com | [3253 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372dc70 gate 1602702136481378100 evaluation fails +peer0.org2.example.com | [3254 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3255 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3256 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3257 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 gate 1602702136485805700 evaluation starts +peer0.org2.example.com | [3258 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3259 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [325a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 principal matched by identity 0 +peer0.org2.example.com | [325b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [2f5e 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, chaincode: lscc} +peer0.org1.example.com | [2f5f 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D840E09DFC84359C28D5392500F0...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f60 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4F48D04D900F2C1F247D1164A7E1F6EE6B3C59D02314841DD6A90B2677A5970B +peer0.org1.example.com | [2f61 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, chaincode: lscc} +peer0.org1.example.com | [2f62 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Exit +peer0.org1.example.com | [2f63 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +peer0.org1.example.com | [2f64 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41808 +peer0.org1.example.com | [2f65 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41808 grpc.code=OK grpc.call_duration=7.6809ms +peer0.org1.example.com | [2f66 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41808: read: connection reset by peer +peer0.org1.example.com | [2f67 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f68 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f69 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41812 +peer0.org1.example.com | [2f6a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0041acdc0 +peer0.org1.example.com | [2f6b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f6c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f6d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f6e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2f6f 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f70 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 2d 93 2c 75 a5 45 0e 03 d1 93 1e d3 de 6e 38 |.-.,u.E.......n8| +peer0.org1.example.com | 00000010 69 ab 2d 9a 56 d5 10 99 32 25 ab 0f 2f 4b b4 79 |i.-.V...2%../K.y| +peer0.org1.example.com | [2f71 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 16 d0 85 93 6b 28 7b 0f 89 71 50 |0D. .....k({..qP| +peer0.org1.example.com | 00000010 38 6c a2 b9 56 d3 f9 97 3f 54 f0 c8 30 34 66 26 |8l..V...?T..04f&| +peer0.org1.example.com | 00000020 e0 18 4f 88 02 20 78 cf b1 2a 13 e2 25 13 f5 6f |..O.. x..*..%..o| +peer0.org1.example.com | 00000030 a5 d7 c8 c1 c1 f8 28 7a 33 59 d8 0d 07 41 da c5 |......(z3Y...A..| +peer0.org1.example.com | 00000040 c8 88 18 62 6a 39 |...bj9| +peer0.org1.example.com | [2f72 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2f73 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035bad90, header 0xc0041ad220 +peer0.org1.example.com | [2f74 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2f75 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] processing txid: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9 +peer0.org1.example.com | [2f76 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +peer0.org1.example.com | [2f77 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f78 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +peer0.org1.example.com | [2f79 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2f7a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4c12de32] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2f7b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f7c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 2d 93 2c 75 a5 45 0e 03 d1 93 1e d3 de 6e 38 |.-.,u.E.......n8| +peer0.org1.example.com | 00000010 69 ab 2d 9a 56 d5 10 99 32 25 ab 0f 2f 4b b4 79 |i.-.V...2%../K.y| +peer0.org1.example.com | [2f7d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 16 d0 85 93 6b 28 7b 0f 89 71 50 |0D. .....k({..qP| +peer0.org1.example.com | 00000010 38 6c a2 b9 56 d3 f9 97 3f 54 f0 c8 30 34 66 26 |8l..V...?T..04f&| +peer0.org1.example.com | 00000020 e0 18 4f 88 02 20 78 cf b1 2a 13 e2 25 13 f5 6f |..O.. x..*..%..o| +peer0.org1.example.com | 00000030 a5 d7 c8 c1 c1 f8 28 7a 33 59 d8 0d 07 41 da c5 |......(z3Y...A..| +peer0.org1.example.com | 00000040 c8 88 18 62 6a 39 |...bj9| +peer0.org1.example.com | [2f7e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [4c12de32] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f7f 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [4c12de32] notifying Txid:4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, channelID:businesschannel +peer0.org1.example.com | [2f80 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f81 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4c12de32] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [2f82 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2f83 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +peer0.org1.example.com | [2f84 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Exit +peer0.org1.example.com | [2f85 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2f86 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2f87 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, chaincode: lscc} +peer0.org1.example.com | [2f88 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A200A05D720D3F1481124B0526841B5...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f89 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1F67A3BC0AFC547E8EEFE8F8E9DE904CDE55FC599A58E1289C43F8D1864A9003 +peer0.org1.example.com | [2f8a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, chaincode: lscc} +peer0.org1.example.com | [2f8b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Exit +peer0.org1.example.com | [2f8c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +peer1.org1.example.com | [2ea0 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ea1 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 gate 1602702130134627400 evaluation starts +peer1.org1.example.com | [2ea2 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ea3 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2ea4 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 principal matched by identity 0 +peer1.org1.example.com | [2ea5 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 5d 3c c2 cc e2 10 84 6a ae 1f 66 b0 4f 61 38 |.]<.....j..f.Oa8| +peer1.org1.example.com | 00000010 0c 28 75 de f3 cc 5d 1a c4 b8 09 71 1c cf 80 7a |.(u...]....q...z| +peer1.org1.example.com | [2ea6 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b3 01 ac b8 85 1e 71 e6 7a b2 |0E.!........q.z.| +peer1.org1.example.com | 00000010 50 e4 29 5c f1 cc 96 05 12 c0 11 82 f7 38 ee 08 |P.)\.........8..| +peer1.org1.example.com | 00000020 e1 b9 19 33 9f 02 20 43 94 8b 01 e7 df 5e 71 36 |...3.. C.....^q6| +peer1.org1.example.com | 00000030 8a 22 fd 4d 18 5f 45 e0 96 d2 7d b4 c6 d4 92 50 |.".M._E...}....P| +peer1.org1.example.com | 00000040 78 69 8c d9 43 3d d4 |xi..C=.| +peer1.org1.example.com | [2ea7 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ea8 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003affaf0 gate 1602702130134627400 evaluation succeeds +peer1.org1.example.com | [2ea9 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eaa 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eab 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2eac 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ead 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2eae 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2eaf 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2eb0 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2eb1 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2eb2 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eb3 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eb4 10-14 19:02:10.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eb5 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb6 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb7 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb8 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb9 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eba 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ebb 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2ebc 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ebd 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ebe 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2ebf 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec0 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec1 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec2 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec3 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec4 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ec5 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec6 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [316b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [316c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [316d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [316e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [316f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3170 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3171 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3172 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3173 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3174 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3175 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3176 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3177 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3178 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3179 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [317a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [317b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [317d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [317e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [317f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3180 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3181 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3182 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3183 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3184 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3185 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3186 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f8d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41812 +peer0.org1.example.com | [2f8e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41812 grpc.code=OK grpc.call_duration=4.9326ms +peer0.org1.example.com | [2f8f 10-14 19:02:01.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f90 10-14 19:02:01.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f91 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41816 +peer0.org1.example.com | [2f92 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0043cc3c0 +peer0.org1.example.com | [2f93 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f94 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f95 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f96 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2f97 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f98 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 35 c9 9e 7a 73 b5 c5 ad 53 19 f1 38 3c 38 56 |.5..zs...S..8<8V| +peer0.org1.example.com | 00000010 eb 38 53 a7 32 b9 75 b5 e0 75 a1 0f 59 c3 c6 a5 |.8S.2.u..u..Y...| +peer0.org1.example.com | [2f99 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 c0 40 49 8e 8a ba d3 1f a6 2e 3c |0D. h.@I.......<| +peer0.org1.example.com | 00000010 4b de 35 e6 b8 e5 86 e8 18 5f 91 a5 04 5d dd 8f |K.5......_...]..| +peer0.org1.example.com | 00000020 f6 af e0 81 02 20 02 d5 29 dc a3 91 71 ad e4 9e |..... ..)...q...| +peer0.org1.example.com | 00000030 96 f0 c5 ad c2 d4 bc 26 5f 6b fe d3 0d 1b d0 f2 |.......&_k......| +peer0.org1.example.com | 00000040 29 de 38 80 37 f5 |).8.7.| +peer0.org1.example.com | [2f9a 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2f9b 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035bb2d0, header 0xc0043cc7d0 +peer0.org1.example.com | [2f9c 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org1.example.com | [2f9d 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] processing txid: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300 +peer0.org1.example.com | [2f9e 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +peer0.org1.example.com | [2f9f 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2fa0 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +peer0.org1.example.com | [2fa1 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2fa2 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2fa3 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2fa4 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +peer0.org1.example.com | [2fa5 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2fa6 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2fa7 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fa8 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2fa9 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 gate 1602702121838662800 evaluation starts +peer0.org1.example.com | [2faa 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fab 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2fac 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2fad 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 principal evaluation fails +peer0.org1.example.com | [2fae 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 gate 1602702121838662800 evaluation fails +peer0.org1.example.com | [2faf 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fb0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fb1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2fb2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 gate 1602702121840391500 evaluation starts +peer0.org1.example.com | [2fb3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fb4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2fb5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 principal matched by identity 0 +peer0.org1.example.com | [2fb6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 35 c9 9e 7a 73 b5 c5 ad 53 19 f1 38 3c 38 56 |.5..zs...S..8<8V| +peer0.org1.example.com | 00000010 eb 38 53 a7 32 b9 75 b5 e0 75 a1 0f 59 c3 c6 a5 |.8S.2.u..u..Y...| +peer0.org1.example.com | [2fb7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 c0 40 49 8e 8a ba d3 1f a6 2e 3c |0D. h.@I.......<| +peer0.org1.example.com | 00000010 4b de 35 e6 b8 e5 86 e8 18 5f 91 a5 04 5d dd 8f |K.5......_...]..| +peer0.org1.example.com | 00000020 f6 af e0 81 02 20 02 d5 29 dc a3 91 71 ad e4 9e |..... ..)...q...| +peer0.org1.example.com | 00000030 96 f0 c5 ad c2 d4 bc 26 5f 6b fe d3 0d 1b d0 f2 |.......&_k......| +peer0.org1.example.com | 00000040 29 de 38 80 37 f5 |).8.7.| +peer0.org1.example.com | [2fb8 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2fb9 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 gate 1602702121840391500 evaluation succeeds +peer0.org1.example.com | [2fba 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2fbb 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2fbc 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2fbd 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2fbe 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +peer0.org1.example.com | [2fbf 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] handling GET_STATE_BY_RANGE from chaincode +peer0.org1.example.com | [2fc0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +peer0.org1.example.com | [2fc1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +peer0.org1.example.com | [2fc2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +peer0.org1.example.com | [2fc3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Completed GET_STATE_BY_RANGE. Sending RESPONSE +peer0.org1.example.com | [2fc4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +peer0.org1.example.com | [2fc5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] handling QUERY_STATE_CLOSE from chaincode +peer0.org1.example.com | [2fc6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Completed QUERY_STATE_CLOSE. Sending RESPONSE +peer0.org1.example.com | [2fc7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2fc8 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] notifying Txid:4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, channelID:businesschannel +peer0.org1.example.com | [2fc9 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2fca 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4f0a7dcf] Exit chaincode: name:"lscc" (9ms) +peer0.org1.example.com | [2fcb 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2fcc 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +peer0.org1.example.com | [2fcd 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Exit +peer0.org1.example.com | [2fce 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +peer0.org1.example.com | [2fcf 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] escc for chaincode name:"lscc" is escc +peer0.org1.example.com | [2fd0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, chaincode: lscc} +peer0.org1.example.com | [2fd1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209357F0775E9188B79CEA43AFACD9...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2fd2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A5CF9E8907FE907D7AD5B93B790A6875F9B0E82A54661439F231C13E53EA100 +peer0.org1.example.com | [2fd3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, chaincode: lscc} +peer0.org2.example.com | [325c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [325d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [325e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037461e0 gate 1602702136485805700 evaluation succeeds +peer0.org2.example.com | [325f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3260 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3261 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3262 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3263 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org2.example.com | [3264 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [3265 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [3266 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3267 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3268 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3269 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [326a 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [326b 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037704c0, CONNECTING +peer0.org2.example.com | [326c 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [326d 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org2.example.com | [326e 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org2.example.com | [326f 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [3270 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org2.example.com | [3271 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3272 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3273 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3274 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3275 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [3276 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0037704c0, READY +peer0.org2.example.com | [3277 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3278 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3279 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [327a 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec8 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ec9 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eca 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ecb 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ecc 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ecd 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ece 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ecf 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ed0 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2ed1 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ed2 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ed3 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ed4 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ed5 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ed6 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ed7 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3187 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3188 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3189 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [318a 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [318b 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [318c 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [318d 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [318e 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [318f 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3190 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3191 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3192 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 9f ac 79 45 4e 68 5c 24 72 a5 a8 2c 9c 4a c6 |...yENh\$r..,.J.| +peer1.org2.example.com | 00000010 d0 20 86 ca 47 fa ea 7e 9c 43 0b e3 1f 46 a6 a3 |. ..G..~.C...F..| +peer1.org2.example.com | [3193 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ec f8 74 d7 fc e8 83 63 55 9a c4 |0D. P..t....cU..| +peer1.org2.example.com | 00000010 9a b8 39 29 d1 0b bf cb 15 65 d2 e0 b1 c7 4c bf |..9).....e....L.| +peer1.org2.example.com | 00000020 a1 71 58 b0 02 20 42 b3 6d 3b 29 3a 64 5b 24 cf |.qX.. B.m;):d[$.| +peer1.org2.example.com | 00000030 94 e9 37 32 c6 33 c0 72 e0 55 87 25 b9 0c cd 71 |..72.3.r.U.%...q| +peer1.org2.example.com | 00000040 7d 19 0a 64 f7 c9 |}..d..| +peer1.org2.example.com | [3194 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3195 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3196 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3197 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3198 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3199 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [319a 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [319b 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16102A +peer1.org2.example.com | [319c 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2D6356C3B8F6904245E96D789AE8634B6EB4C7649CAAC262C787C8F999BE1A01 +peer1.org2.example.com | [319d 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [319e 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [319f 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [31a0 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31a1 10-14 19:02:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a2 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31a3 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a4 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [31a5 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a6 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a7 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a8 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [31aa 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a9 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31ab 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ac 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ad 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ae 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [31af 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer0.org1.example.com | [2fd4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Exit +peer0.org1.example.com | [2fd5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +peer0.org1.example.com | [2fd6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41816 +peer0.org1.example.com | [2fd7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41816 grpc.code=OK grpc.call_duration=15.0171ms +peer0.org1.example.com | [2fd8 10-14 19:02:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2fd9 10-14 19:02:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2fda 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2fdb 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fdc 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08061A0C0A0565787030321203312E30 +peer0.org1.example.com | [2fdd 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CBE76F0D117D61D3FC96A66C22483C42BCBD0BE6D6B024A4DE1F289216F89D8 +peer0.org1.example.com | [2fde 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fdf 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2fe0 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe1 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe2 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fe3 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fe4 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe5 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fe6 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe7 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fe8 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fe9 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org1.example.com | [2fea 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer1.org1.example.com | [2ed8 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 gate 1602702130180978700 evaluation starts +peer1.org1.example.com | [2ed9 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2eda 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2edb 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 principal matched by identity 0 +peer1.org1.example.com | [2edc 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org1.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org1.example.com | [2edd 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org1.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org1.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org1.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org1.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org1.example.com | [2ede 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2edf 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3eed0 gate 1602702130180978700 evaluation succeeds +peer1.org1.example.com | [2ee0 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ee1 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ee2 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ee3 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ee4 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ee5 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2ee6 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2ee7 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2ee8 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2ee9 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eea 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eeb 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2eec 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2eed 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eee 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eef 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef0 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ef1 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +peer1.org1.example.com | [2ef2 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ef3 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef4 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ef5 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef6 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [31b0 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer1.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer1.org2.example.com | [31b1 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [31b2 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed c0 6f 8f 91 b3 ff f9 77 0f 7a |0E.!...o.....w.z| +peer1.org2.example.com | 00000010 53 01 bb bc 8e 57 ca c6 49 57 8d b4 8a 7f 71 e4 |S....W..IW....q.| +peer1.org2.example.com | 00000020 a7 58 c9 29 11 02 20 29 82 ab f1 69 61 01 45 2b |.X.).. )...ia.E+| +peer1.org2.example.com | 00000030 c9 4e 90 e7 ee c0 cf 57 68 68 dd da 73 64 00 f4 |.N.....Whh..sd..| +peer1.org2.example.com | 00000040 f8 5c 24 1a ab 0e f4 |.\$....| +peer1.org2.example.com | [31b3 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [31b4 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [31b5 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31b6 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31b7 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31b8 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [31b9 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ba 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [31bb 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31bc 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31bd 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31be 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31bf 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31c0 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31c1 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31c2 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 gate 1602702130332194600 evaluation starts +peer1.org2.example.com | [31c3 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31c4 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [31c5 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31c6 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 principal evaluation fails +peer1.org2.example.com | [31c7 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a6dfe0 gate 1602702130332194600 evaluation fails +peer1.org2.example.com | [31c8 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31c9 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31ca 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31cb 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 gate 1602702130333595400 evaluation starts +peer1.org2.example.com | [31cc 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31cd 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [31ce 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 principal matched by identity 0 +peer1.org2.example.com | [31cf 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer1.org2.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer1.org2.example.com | [31d0 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer1.org2.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer1.org2.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer1.org2.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer1.org2.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer1.org2.example.com | [31d1 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [31d2 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b12550 gate 1602702130333595400 evaluation succeeds +peer1.org2.example.com | [31d3 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31d4 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31d5 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [31d6 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [31d7 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [31d8 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31d9 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [31da 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org2.example.com | [31db 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer0.org1.example.com | [2feb 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org1.example.com | [2fec 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [2fed 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fee 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fef 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ff0 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ff1 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ff2 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ff3 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ff4 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ff5 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ff6 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 gate 1602702121893140800 evaluation starts +peer0.org1.example.com | [2ff7 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ff8 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [2ff9 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 principal matched by identity 0 +peer0.org1.example.com | [2ffa 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [2ffb 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [2ffc 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ffd 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 gate 1602702121893140800 evaluation succeeds +peer0.org1.example.com | [2ffe 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2fff 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3000 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3001 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3002 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3003 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3004 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3005 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3006 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3007 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3008 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3009 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [300a 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [300b 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 gate 1602702121897679100 evaluation starts +peer0.org1.example.com | [300c 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [300d 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [300e 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [300f 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 principal matched by identity 0 +peer0.org1.example.com | [3010 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [3011 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [3012 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [3013 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3014 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3015 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3016 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 gate 1602702121897679100 evaluation succeeds +peer0.org1.example.com | [3017 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3018 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3019 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [301a 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [301b 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [301c 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [301d 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [301e 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [301f 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3020 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3021 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org1.example.com | [3022 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org1.example.com | [3023 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3024 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3025 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org1.example.com | [3026 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [3027 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3028 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3029 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [302a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [302b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [302c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [302d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [302e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [302f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 gate 1602702121911401200 evaluation starts +peer0.org1.example.com | [3030 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3031 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3032 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 principal matched by identity 0 +peer0.org1.example.com | [3033 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [3034 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer1.org1.example.com | [2ef7 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2ef8 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef9 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2efa 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2efb 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2efc 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2efd 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2efe 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2eff 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 gate 1602702130242647700 evaluation starts +peer1.org1.example.com | [2f00 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f01 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2f02 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 principal matched by identity 0 +peer1.org1.example.com | [2f03 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 9f ac 79 45 4e 68 5c 24 72 a5 a8 2c 9c 4a c6 |...yENh\$r..,.J.| +peer1.org1.example.com | 00000010 d0 20 86 ca 47 fa ea 7e 9c 43 0b e3 1f 46 a6 a3 |. ..G..~.C...F..| +peer1.org1.example.com | [2f04 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ec f8 74 d7 fc e8 83 63 55 9a c4 |0D. P..t....cU..| +peer1.org1.example.com | 00000010 9a b8 39 29 d1 0b bf cb 15 65 d2 e0 b1 c7 4c bf |..9).....e....L.| +peer1.org1.example.com | 00000020 a1 71 58 b0 02 20 42 b3 6d 3b 29 3a 64 5b 24 cf |.qX.. B.m;):d[$.| +peer1.org1.example.com | 00000030 94 e9 37 32 c6 33 c0 72 e0 55 87 25 b9 0c cd 71 |..72.3.r.U.%...q| +peer1.org1.example.com | 00000040 7d 19 0a 64 f7 c9 |}..d..| +peer1.org1.example.com | [2f05 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f06 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b25420 gate 1602702130242647700 evaluation succeeds +peer1.org1.example.com | [2f07 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f08 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f09 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f0a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f0b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f0c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2f0d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2f0e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2f0f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2f10 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f11 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f12 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f13 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f14 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f15 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f16 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f17 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f18 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f19 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f1a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f1d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f1e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f1f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f20 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f21 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f22 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f23 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2f24 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f25 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f26 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f27 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f28 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f29 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f2a 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f2b 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f2c 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f2d 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2f2e 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2f2f 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [2f30 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [2f31 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f32 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3293 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [3294 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [3295 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [3296 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.566Z grpc.peer_address=172.18.0.6:39284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=264.6µs +peer0.org2.example.com | [3297 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [3298 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0049147c0)} +peer0.org2.example.com | [3299 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [329a 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [329b 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [329c 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org2.example.com | [329d 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org1.example.com | [3035 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3036 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 gate 1602702121911401200 evaluation succeeds +peer0.org1.example.com | [3037 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3038 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3039 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [303a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [303b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [303c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [303d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [303e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [303f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3040 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3041 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3042 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3043 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 gate 1602702121912462200 evaluation starts +peer0.org1.example.com | [3044 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3045 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3046 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 principal matched by identity 0 +peer0.org1.example.com | [3047 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org1.example.com | [3048 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org1.example.com | [3049 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [304a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 gate 1602702121912462200 evaluation succeeds +peer0.org1.example.com | [304b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [304c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [304d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [304e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [304f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3050 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [3051 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3052 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +peer0.org1.example.com | 00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +peer0.org1.example.com | [3053 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +peer0.org1.example.com | 00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +peer0.org1.example.com | 00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +peer0.org1.example.com | 00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +peer0.org1.example.com | 00000040 36 51 a3 22 24 a8 |6Q."$.| +peer0.org1.example.com | [3054 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +peer0.org1.example.com | 00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +peer0.org1.example.com | [3055 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +peer0.org1.example.com | 00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +peer0.org1.example.com | 00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +peer0.org1.example.com | 00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +peer0.org1.example.com | 00000040 fc d0 10 18 d0 4c 38 |.....L8| +peer0.org1.example.com | [3056 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3057 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org1.example.com | [3058 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org1.example.com | [3059 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [305a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [329e 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org2.example.com | [329f 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer0.org2.example.com | [32a0 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +peer0.org2.example.com | txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +peer0.org2.example.com | ] +peer0.org2.example.com | [32a1 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to txid-index +peer0.org2.example.com | [32a2 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx number:[0] ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to blockNumTranNum index +peer0.org2.example.com | [32a3 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [32a4 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [32a5 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [32a6 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [32a9 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 8f f0 43 2e cd 29 51 70 87 93 |0E.!....C..)Qp..| +peer0.org2.example.com | 00000010 15 bb da 79 4d b8 a5 9b 11 8e 33 51 ba ea 72 e0 |...yM.....3Q..r.| +peer0.org2.example.com | 00000020 01 41 a7 26 60 02 20 2c bc 03 44 76 2f d4 79 43 |.A.&`. ,..Dv/.yC| +peer0.org2.example.com | 00000030 16 f6 1a e1 2d 71 79 34 39 b1 55 24 84 00 d7 75 |....-qy49.U$...u| +peer0.org2.example.com | 00000040 ef 5b d6 6a 01 c2 fd |.[.j...| +peer0.org2.example.com | [32aa 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138781], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org2.example.com | [32ab 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org2.example.com | [32ac 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:39284 +peer0.org2.example.com | [32ad 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:39284 +peer0.org2.example.com | [32ae 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org2.example.com | [32af 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org2.example.com | [32b0 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [32b1 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [32b2 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [32b3 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [32b4 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [32b5 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [32b6 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org2.example.com | [32b7 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer0.org2.example.com | [32b8 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org2.example.com | [32b9 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32ba 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org2.example.com | [32bb 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [32bc 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32bd 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org2.example.com | [32be 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org2.example.com | [32c2 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [32c3 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [32c4 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [32bf 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | [31dc 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31dd 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31de 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [31df 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer1.org2.example.com | [31e0 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer1.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer1.org2.example.com | [31e1 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31e2 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [31e3 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e4 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e5 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e6 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e7 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [31e8 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31e9 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [31ea 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [31eb 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31ec 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31ed 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ee 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31ef 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31f0 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31f1 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31f2 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 gate 1602702130340013200 evaluation starts +peer1.org2.example.com | [31f3 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31f4 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [31f5 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31f6 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 principal evaluation fails +peer1.org2.example.com | [31f7 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb08e0 gate 1602702130340013200 evaluation fails +peer1.org2.example.com | [31f8 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31f9 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31fa 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31fb 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 gate 1602702130340800800 evaluation starts +peer1.org2.example.com | [31fc 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31fd 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [31fe 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 principal matched by identity 0 +peer1.org2.example.com | [31ff 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org2.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org2.example.com | [3200 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org2.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org2.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org2.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org1.example.com | [2f33 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f34 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f35 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f36 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f37 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f38 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f39 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 gate 1602702130267534800 evaluation starts +peer1.org1.example.com | [2f3a 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f3b 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2f3c 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 principal matched by identity 0 +peer1.org1.example.com | [2f3d 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2f3e 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2f3f 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f41 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f42 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f40 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba2cd0 gate 1602702130267534800 evaluation succeeds +peer1.org1.example.com | [2f43 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f44 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f45 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f46 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f47 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f48 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f49 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f4a 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f4b 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f4c 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f4d 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f4e 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f4f 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 gate 1602702130272603000 evaluation starts +peer1.org1.example.com | [2f50 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f51 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2f52 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 principal matched by identity 0 +peer1.org1.example.com | [2f53 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2f54 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | [305b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [305c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [305d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [305e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [305f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3060 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3061 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 gate 1602702121923947500 evaluation starts +peer0.org1.example.com | [3062 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3063 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3064 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 principal matched by identity 0 +peer0.org1.example.com | [3065 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +peer0.org1.example.com | 00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +peer0.org1.example.com | [3066 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +peer0.org1.example.com | 00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +peer0.org1.example.com | 00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +peer0.org1.example.com | 00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +peer0.org1.example.com | 00000040 a8 d1 32 1d 77 d5 |..2.w.| +peer0.org1.example.com | [3067 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3068 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 gate 1602702121923947500 evaluation succeeds +peer0.org1.example.com | [3069 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [306a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [306b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [306c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [306d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [306e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [306f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3070 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3071 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3072 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3073 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [32c0 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:39148 disconnected +peer0.org2.example.com | [32c1 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [32c5 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:59204 disconnected +peer0.org2.example.com | [32c6 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org2.example.com | [32c7 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [32c8 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:39284 disconnected +peer0.org2.example.com | [32c9 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [32ca 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org2.example.com | [32cb 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:39148 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m7.3791743s +peer0.org2.example.com | [32cc 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [32cd 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:59204 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m6.7058069s +peer0.org2.example.com | [32ce 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [32cf 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.58Z grpc.peer_address=172.18.0.6:39284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6231ms +peer0.org2.example.com | [32d0 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 68ms (state_validation=27ms block_and_pvtdata_commit=22ms state_commit=4ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org2.example.com | [32d1 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org2.example.com | [32d2 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [32d3 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [32d4 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [32d5 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org2.example.com | [3201 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3202 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb0e50 gate 1602702130340800800 evaluation succeeds +peer1.org2.example.com | [3203 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3204 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3205 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3206 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3207 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3208 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3209 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [320a 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org2.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org2.example.com | [320b 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org2.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org2.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org2.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org2.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org2.example.com | [320c 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [320d 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [320e 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [320f 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org2.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer1.org2.example.com | [3210 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org2.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org2.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org2.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer1.org2.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer1.org2.example.com | [3211 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3212 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3213 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3214 10-14 19:02:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3215 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3216 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3217 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3218 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3219 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [321a 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [321b 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [321c 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [321d 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [321e 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [321f 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3220 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3221 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 gate 1602702130422897400 evaluation starts +peer1.org2.example.com | [3222 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3223 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3224 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3225 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 principal evaluation fails +peer1.org2.example.com | [3226 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5770 gate 1602702130422897400 evaluation fails +peer1.org2.example.com | [3227 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3228 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3229 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [322a 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 gate 1602702130423234300 evaluation starts +peer1.org2.example.com | [322b 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [322c 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [322d 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 principal matched by identity 0 +peer1.org2.example.com | [322e 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 e0 96 01 24 0a 44 d8 43 d6 45 e4 d8 bc 00 1f |....$.D.C.E.....| +peer1.org2.example.com | 00000010 97 d8 77 cb 20 dc 01 ee 7d 9b bd 67 df 19 cd dd |..w. ...}..g....| +peer1.org2.example.com | [322f 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 d9 34 ad ac c8 1b 6c 67 ab 1a |0E.!...4....lg..| +peer1.org2.example.com | 00000010 98 48 8b 7a 08 f8 8c 25 50 ce d2 14 3b 0b 3a b0 |.H.z...%P...;.:.| +peer1.org2.example.com | 00000020 03 a3 0d 12 dc 02 20 48 e7 23 f3 5d e0 ea 88 03 |...... H.#.]....| +peer1.org2.example.com | 00000030 f3 be 38 9e ab 2c ef 54 33 0f d3 f2 54 60 04 60 |..8..,.T3...T`.`| +peer1.org2.example.com | 00000040 7a 74 2c cc 42 42 79 |zt,.BBy| +peer1.org2.example.com | [3230 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3074 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [32d6 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [3231 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cc5ce0 gate 1602702130423234300 evaluation succeeds +peer0.org1.example.com | [3075 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 gate 1602702121925380200 evaluation starts +peer0.org2.example.com | [32d7 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f55 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3232 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3076 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3077 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3078 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 principal matched by identity 0 +peer0.org2.example.com | [32d8 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3079 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +peer0.org2.example.com | [32d9 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3233 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2f56 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba3ed0 gate 1602702130272603000 evaluation succeeds +peer0.org1.example.com | 00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +peer0.org2.example.com | [32da 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3234 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3235 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [307a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +peer0.org2.example.com | [32db 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3236 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3237 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +peer0.org2.example.com | [32dc 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f57 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f58 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32dd 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | 00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +peer1.org1.example.com | [2f59 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [32de 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 gate 1602702136629411600 evaluation starts +peer1.org2.example.com | [3238 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +peer0.org1.example.com | 00000040 ef bb b9 6e 1e d1 |...n..| +peer0.org2.example.com | [32df 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3239 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [307b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f5a 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32e0 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [323a 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [32e1 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [32e2 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 principal evaluation fails +peer0.org2.example.com | [32e3 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a97f0 gate 1602702136629411600 evaluation fails +peer1.org2.example.com | [323b 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323c 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323d 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [323e 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [323f 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3240 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3241 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3242 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3243 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3244 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3245 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3246 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3247 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3248 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3249 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324a 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324b 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324c 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324d 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [324e 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [324f 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3250 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3251 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3252 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3253 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3254 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3255 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3256 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3257 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3258 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3259 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325a 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325b 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325c 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325d 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [325e 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [325f 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3260 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [32e4 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [32e5 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [32e6 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32e7 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 gate 1602702136634282800 evaluation starts +peer0.org2.example.com | [32e8 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32e9 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [32ea 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [32eb 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [32ec 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [32ed 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 principal matched by identity 0 +peer0.org2.example.com | [32ee 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [32ef 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 f3 8f 38 5b ad a9 82 9c 17 ca c0 |0D. ...8[.......| +peer0.org2.example.com | 00000010 23 88 61 cf b3 02 6f 40 a9 00 93 5c 4c 55 25 67 |#.a...o@...\LU%g| +peer0.org2.example.com | 00000020 2e 54 79 e7 02 20 3d 2f 51 6d 6c 77 5e fc 7e 04 |.Ty.. =/Qmlw^.~.| +peer0.org2.example.com | 00000030 f9 0d f4 31 7e 0c e1 10 49 b5 26 6d 56 be 27 94 |...1~...I.&mV.'.| +peer0.org2.example.com | 00000040 ba 48 44 e4 22 9d |.HD.".| +peer0.org2.example.com | [32f0 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32f1 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a9d80 gate 1602702136634282800 evaluation succeeds +peer0.org2.example.com | [32f2 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32f3 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32f4 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [32f5 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32f6 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [32f7 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32f8 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [32f9 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [32fa 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161031 +peer0.org2.example.com | [32fb 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8FFFEFC994FE226453D8369640D0B5BB7F7B7CD34F15FDF6D62B88E527D4FD32 +peer0.org2.example.com | [32fc 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [32fd 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [32fe 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [32ff 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.661Z grpc.peer_address=172.18.0.8:50370 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=115.2µs +peer0.org2.example.com | [3300 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3301 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:12581341794814934657 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3302 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:12581341794814934657 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3303 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3304 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3305 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3306 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [3307 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3308 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3309 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [330a 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [330b 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3262 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3263 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3264 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3265 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3266 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3267 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3268 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3269 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [326a 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [326b 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [326c 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 gate 1602702130513961000 evaluation starts +peer1.org2.example.com | [326d 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [326e 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [326f 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3270 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 principal evaluation fails +peer1.org2.example.com | [3271 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc92f0 gate 1602702130513961000 evaluation fails +peer1.org2.example.com | [3272 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3273 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3274 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3275 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 gate 1602702130514333700 evaluation starts +peer1.org2.example.com | [3276 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3277 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3278 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 principal matched by identity 0 +peer1.org2.example.com | [3279 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer1.org2.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer1.org2.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer1.org2.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer1.org2.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer1.org2.example.com | [327b 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [327c 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc9860 gate 1602702130514333700 evaluation succeeds +peer1.org2.example.com | [327d 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [327e 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [330d 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:50370 +peer0.org2.example.com | [330e 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [330f 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3310 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3311 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3312 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3313 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3314 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3315 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3316 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f5b 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f5c 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f5d 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f5e 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f5f 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f60 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f61 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f62 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f63 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f64 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2f65 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f66 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f67 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f68 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f69 10-14 19:02:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [2f6a 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f6c 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f6b 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [2f6d 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [2f6e 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [2f6f 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [307c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 gate 1602702121925380200 evaluation succeeds +peer0.org1.example.com | [307d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [307e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [307f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3080 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3081 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3082 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3083 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3084 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3085 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3086 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3087 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3088 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3089 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [308a 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [308b 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [308c 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [308d 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [308e 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [308f 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3090 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3091 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3092 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3093 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3094 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3095 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3096 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3097 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3098 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3099 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [309a 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [309b 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [309c 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [309d 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [309e 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [309f 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30a0 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [30a1 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [30a3 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [30a4 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 gate 1602702122170682400 evaluation starts +peer0.org1.example.com | [30a5 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30a6 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [30a2 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30a7 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 principal matched by identity 0 +peer0.org1.example.com | [30a8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org1.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org1.example.com | [30a9 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org1.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org1.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org1.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org1.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org1.example.com | [30aa 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [30ab 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 gate 1602702122170682400 evaluation succeeds +peer0.org1.example.com | [30ac 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30ad 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30ae 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [30af 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [30b0 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30b1 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [30b2 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30b3 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30b4 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [30b5 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b6 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b7 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [30b9 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ba 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30bb 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30bc 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30bd 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +peer0.org1.example.com | [30be 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [30bf 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30c0 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c1 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c2 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [30c3 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c4 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c5 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c6 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c7 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c8 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30c9 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [30ca 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30cb 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [30cc 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30cd 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ce 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30cf 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [30d0 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [30d1 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | [327f 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3280 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3281 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3282 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3283 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3284 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3285 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3286 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3287 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3288 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3289 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [328a 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328b 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328c 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [328d 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [328e 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:xI\225\315Xl\232\233^\223\362E" > alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive: alive: +peer1.org2.example.com | [328f 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3290 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3291 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3292 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3293 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3294 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3295 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3296 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3297 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3298 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3299 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [329a 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [329b 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [329c 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [329d 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [329e 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [329f 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32a0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32a1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32a2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32a3 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32a4 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32a5 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32a6 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 gate 1602702130584418600 evaluation starts +peer1.org2.example.com | [32a7 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32a8 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [32a9 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32aa 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 principal evaluation fails +peer1.org2.example.com | [32ab 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cffef0 gate 1602702130584418600 evaluation fails +peer1.org2.example.com | [32ac 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32ad 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32ae 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32af 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 gate 1602702130584664600 evaluation starts +peer1.org2.example.com | [32b0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32b1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [32b2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 principal matched by identity 0 +peer1.org2.example.com | [32b3 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c ab 21 da c8 d8 1f 4e 72 9a 2e dc 15 c7 00 92 |..!....Nr.......| +peer1.org2.example.com | 00000010 a2 c0 2b 81 f2 ab fb 3c cb 03 d6 ba ce 45 8b 77 |..+....<.....E.w| +peer1.org2.example.com | [32b4 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 00 4f 74 45 5d c1 d7 a8 7e 53 |0E.!...OtE]...~S| +peer1.org2.example.com | 00000010 23 8e d4 39 88 35 b5 bf bc d3 ea a3 7a bd 2b 60 |#..9.5......z.+`| +peer1.org2.example.com | 00000020 81 0a d8 b3 31 02 20 0d 91 f4 94 02 61 14 eb 32 |....1. .....a..2| +peer1.org2.example.com | 00000030 92 92 0d 3b 35 ea be 7c 92 55 1b d4 b9 f5 bf de |...;5..|.U......| +peer1.org2.example.com | 00000040 19 bf d6 15 e7 c6 f7 |.......| +peer1.org2.example.com | [32b5 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32b6 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d5c480 gate 1602702130584664600 evaluation succeeds +peer1.org2.example.com | [32b7 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32b8 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32b9 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32ba 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32bb 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32bc 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [32bd 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [32be 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2f70 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f71 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f72 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f73 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f74 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f75 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f76 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f77 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 gate 1602702130285987700 evaluation starts +peer1.org1.example.com | [2f78 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f79 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2f7a 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 principal matched by identity 0 +peer1.org1.example.com | [2f7b 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2f7c 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2f7d 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f7e 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be0900 gate 1602702130285987700 evaluation succeeds +peer1.org1.example.com | [2f7f 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f80 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f81 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f82 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f83 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f84 10-14 19:02:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [30d2 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30d3 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [30d4 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [30d5 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [30d6 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [30d7 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 gate 1602702122270996700 evaluation starts +peer0.org1.example.com | [30d8 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30d9 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [30da 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3317 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3318 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3319 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [331a 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [331b 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [331c 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [331d 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 gate 1602702136703779300 evaluation starts +peer0.org2.example.com | [331e 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [331f 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3320 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3322 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 principal evaluation fails +peer0.org2.example.com | [3321 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a1ab90, READY +peer0.org2.example.com | [3323 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.706Z grpc.peer_address=172.18.0.5:59344 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.6176ms +peer0.org2.example.com | [3324 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4ee40 gate 1602702136703779300 evaluation fails +peer0.org2.example.com | [3326 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3327 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3328 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3329 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 gate 1602702136715871100 evaluation starts +peer0.org2.example.com | [332a 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [332b 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3325 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [332c 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:50206 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:10912341937971802934 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [332e 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [332d 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [332f 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3330 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:10912341937971802934 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3332 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3331 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3334 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 principal matched by identity 0 +peer0.org2.example.com | [3335 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [3336 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 8e 99 3e 2c f7 51 6b bd ef af 16 |0D. ...>,.Qk....| +peer0.org2.example.com | 00000010 66 28 a6 9e 09 f7 5b 58 ff 9b f1 e8 e7 c6 f6 68 |f(....[X.......h| +peer0.org2.example.com | 00000020 86 4d b2 34 02 20 23 e7 fd 33 6c 17 20 fb dd 66 |.M.4. #..3l. ..f| +peer0.org2.example.com | 00000030 72 ab 0f e3 9d 8b 8f fc 1e 1a 97 04 f2 4f 8c ea |r............O..| +peer0.org2.example.com | 00000040 f4 78 56 31 75 c7 |.xV1u.| +peer0.org2.example.com | [3337 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3333 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3338 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a3b5f0 gate 1602702136715871100 evaluation succeeds +peer1.org2.example.com | [32bf 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [32c0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32c1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32c2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32c3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c6 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c7 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c8 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32c9 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32ca 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [32cb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32cc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [32cd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32ce 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32cf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32d0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d1 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [32d2 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [32d3 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32d4 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32d5 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d6 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32d7 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32d8 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d9 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32da 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32db 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [32dc 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32dd 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [32de 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [32df 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32e0 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32e1 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32e2 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32e3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32e4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32e5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32e6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 gate 1602702130637008500 evaluation starts +peer1.org2.example.com | [32e7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32e8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [32e9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32ea 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 principal evaluation fails +peer1.org2.example.com | [32eb 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da6fc0 gate 1602702130637008500 evaluation fails +peer1.org2.example.com | [32ec 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32ed 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32ee 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32ef 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 gate 1602702130637282400 evaluation starts +peer1.org2.example.com | [32f0 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32f1 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [32f2 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 principal matched by identity 0 +peer1.org2.example.com | [32f3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer1.org2.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer1.org2.example.com | [32f4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer1.org2.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer1.org2.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer1.org2.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer1.org2.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer1.org2.example.com | [32f5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32f6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da7530 gate 1602702130637282400 evaluation succeeds +peer1.org2.example.com | [32f7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32f8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32f9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32fa 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32fb 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32fc 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [32fd 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [32fe 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [32ff 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3300 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3301 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3302 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3303 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [333a 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3339 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [333b 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [333c 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [333d 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [333e 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3340 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:50370 +peer0.org2.example.com | [3341 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:50370 +peer0.org2.example.com | [333f 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3342 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3344 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3346 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3347 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 gate 1602702136731624600 evaluation starts +peer0.org2.example.com | [3348 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3349 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [3345 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:50206 disconnected +peer0.org2.example.com | [334c 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:50206 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m8.0855897s +peer0.org2.example.com | [334a 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [334d 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [334e 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 principal evaluation fails +peer0.org2.example.com | [334f 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a4fca0 gate 1602702136731624600 evaluation fails +peer0.org2.example.com | [3350 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3351 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3352 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3353 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 gate 1602702136738354500 evaluation starts +peer0.org2.example.com | [3354 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3355 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3356 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 principal matched by identity 0 +peer0.org2.example.com | [3357 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +peer0.org2.example.com | 00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +peer0.org2.example.com | [3358 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +peer0.org2.example.com | 00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +peer0.org2.example.com | 00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +peer0.org2.example.com | 00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +peer0.org2.example.com | 00000040 19 3c b2 fe e4 20 |.<... | +peer0.org2.example.com | [3359 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [335a 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9cb10 gate 1602702136738354500 evaluation succeeds +peer0.org2.example.com | [335b 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [335c 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [335d 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [30db 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 principal evaluation fails +peer0.org1.example.com | [30dc 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 gate 1602702122270996700 evaluation fails +peer0.org1.example.com | [30dd 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30de 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30df 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [30e0 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 gate 1602702122273575400 evaluation starts +peer0.org1.example.com | [30e1 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30e2 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [30e3 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 principal matched by identity 0 +peer0.org1.example.com | [30e4 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [30e5 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [30e6 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [30e7 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 gate 1602702122273575400 evaluation succeeds +peer0.org1.example.com | [30e8 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [30e9 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [30ea 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [30eb 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [30ec 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ed 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ee 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ef 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [30f0 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30f1 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30f2 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [30f3 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f4 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [30f5 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f6 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [30f7 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [30f8 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [30f9 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [30fa 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fb 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30fc 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30fd 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30fe 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [30ff 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3100 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3101 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3102 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3103 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3104 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3105 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3106 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3107 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3108 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 gate 1602702122318590200 evaluation starts +peer0.org1.example.com | [3109 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [310a 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [310c 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 principal matched by identity 0 +peer0.org1.example.com | [310b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [310d 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [310e 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [310f 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3110 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3111 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3112 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer0.org1.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer0.org1.example.com | [3113 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer0.org1.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer0.org1.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer0.org1.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer0.org1.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer0.org1.example.com | [3114 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3115 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 gate 1602702122318590200 evaluation succeeds +peer0.org1.example.com | [3116 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3117 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3118 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3119 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [311a 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [311b 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [311c 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [311d 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [311e 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [311f 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3120 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3121 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3122 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3123 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3124 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3125 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3126 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3127 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +peer0.org1.example.com | [3128 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3129 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [312a 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [312b 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [312c 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3304 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3305 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3306 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3307 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3308 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: alive: +peer1.org2.example.com | [3309 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [330a 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [330b 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [330c 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [330d 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [330e 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [330f 10-14 19:02:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3310 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3311 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3312 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3313 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3314 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3315 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3316 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3317 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3318 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3319 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [331a 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [331b 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [331c 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [335e 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [335f 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3360 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3361 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3362 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3363 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3364 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3365 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3366 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3367 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3368 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3369 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [336a 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org2.example.com | [3343 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [334b 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:50370 disconnected +peer0.org2.example.com | [336b 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.676Z grpc.peer_address=172.18.0.8:50370 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=71.2911ms +peer0.org2.example.com | [336c 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [336d 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [336e 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 10912341937971802934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3371 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > alive: alive: alive: +peer0.org2.example.com | [336f 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3370 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3372 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 10912341937971802934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [3373 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3374 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3375 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3376 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3378 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [3358 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [3359 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [335a 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [335b 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [335c 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [335d 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [335e 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fa2 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fa3 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2fa4 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fa5 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fa6 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 gate 1602702130292405300 evaluation starts +peer1.org1.example.com | [2fa7 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fa8 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2fa9 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 principal matched by identity 0 +peer1.org1.example.com | [2faa 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [2fab 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [2fac 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fad 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bffd30 gate 1602702130292405300 evaluation succeeds +peer1.org1.example.com | [2fae 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2faf 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fb0 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fb1 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fb2 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fb3 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fb4 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2fb5 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fb6 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fb7 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2fb8 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fb9 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fba 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 gate 1602702130293835100 evaluation starts +peer1.org1.example.com | [2fbb 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fbc 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2fbd 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 principal matched by identity 0 +peer1.org1.example.com | [2fbe 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [2fbf 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [2fc0 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fc1 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c20f30 gate 1602702130293835100 evaluation succeeds +peer1.org1.example.com | [2fc2 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3379 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:59344 +peer0.org2.example.com | [337a 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [337b 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [337c 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [337d 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [337e 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3377 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org1.example.com | [312d 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [312e 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [312f 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3130 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3131 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3132 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41820 +peer1.org2.example.com | [335f 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3360 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3361 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3362 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3363 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3364 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3365 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 gate 1602702130924981400 evaluation starts +peer1.org2.example.com | [3366 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3367 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3368 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3369 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 principal evaluation fails +peer1.org2.example.com | [336a 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f60c0 gate 1602702130924981400 evaluation fails +peer1.org2.example.com | [336b 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [336c 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [336d 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [336e 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 gate 1602702130926813700 evaluation starts +peer1.org2.example.com | [336f 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3370 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3371 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 principal matched by identity 0 +peer1.org2.example.com | [3372 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [3373 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [3374 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3375 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6630 gate 1602702130926813700 evaluation succeeds +peer1.org2.example.com | [3376 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3377 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3378 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3379 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [337a 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337b 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337c 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [337d 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [337e 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fc3 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fc4 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fc5 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fc6 10-14 19:02:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc7 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc8 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc9 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fca 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2fcb 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fcc 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2fcd 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fce 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fcf 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2fd0 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fd1 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fd2 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 gate 1602702130326830700 evaluation starts +peer1.org1.example.com | [2fd3 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2fd4 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [2fd5 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 principal matched by identity 0 +peer1.org1.example.com | [2fd6 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org1.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer1.org1.example.com | [2fd7 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org1.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org1.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org1.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer1.org1.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer1.org1.example.com | [2fd8 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fd9 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b5d180 gate 1602702130326830700 evaluation succeeds +peer1.org1.example.com | [2fda 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fdb 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fdc 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fdd 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2fde 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [337f 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3381 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3382 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fdf 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2fe0 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2fe1 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2fe2 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2fe3 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fe4 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fe5 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fe6 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2fe7 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fe8 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fe9 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fea 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2feb 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fec 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fed 10-14 19:02:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +peer1.org1.example.com | [2fee 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fef 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ff0 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2ff1 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ff2 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ff3 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ff4 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ff5 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ff6 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ff7 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ff8 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ff9 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ffa 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ffb 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161030 +peer1.org1.example.com | [2ffc 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 94E09601240A44D843D645E4D8BC001F97D877CB20DC01EE7D9BBD67DF19CDDD +peer1.org1.example.com | [2ffd 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ffe 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2fff 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3000 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3001 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3002 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3003 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3383 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3384 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3385 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3386 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 gate 1602702136760349800 evaluation starts +peer0.org2.example.com | [3387 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3388 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3389 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [338a 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 principal evaluation fails +peer0.org2.example.com | [338b 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9bc0 gate 1602702136760349800 evaluation fails +peer0.org2.example.com | [338c 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [338d 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [338e 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [338f 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 gate 1602702136760804900 evaluation starts +peer0.org2.example.com | [3390 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3391 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3392 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 principal matched by identity 0 +peer0.org2.example.com | [3393 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [3394 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 b1 47 ed c4 43 0e 9a 0a a8 1d |0E.!...G..C.....| +peer0.org2.example.com | 00000010 5c e2 9d 9e bd a4 05 37 b7 86 1f 8d 7f 7d a4 d1 |\......7.....}..| +peer0.org2.example.com | 00000020 aa b8 bb 6d 60 02 20 51 5e d1 3d 77 23 41 22 1c |...m`. Q^.=w#A".| +peer0.org2.example.com | 00000030 b0 74 78 06 d1 b1 6b ee c0 a7 64 82 1a ce ed da |.tx...k...d.....| +peer0.org2.example.com | 00000040 0a 10 ec f4 eb 04 5f |......_| +peer0.org2.example.com | [3395 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3396 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8130 gate 1602702136760804900 evaluation succeeds +peer0.org2.example.com | [3397 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3398 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3399 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [339a 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [339b 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:59344 +peer0.org2.example.com | [339c 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:59344 +peer0.org2.example.com | [3380 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [339f 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33a0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33a1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33a2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33a3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33a4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [337f 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3380 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3381 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3382 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 gate 1602702130929621400 evaluation starts +peer1.org2.example.com | [3383 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3384 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3385 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3386 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 principal evaluation fails +peer1.org2.example.com | [3387 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7830 gate 1602702130929621400 evaluation fails +peer1.org2.example.com | [3388 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3389 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [338a 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [338b 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 gate 1602702130929871400 evaluation starts +peer1.org2.example.com | [338c 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [338d 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [338e 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 principal matched by identity 0 +peer1.org2.example.com | [338f 10-14 19:02:10.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [3390 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [3391 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3392 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7da0 gate 1602702130929871400 evaluation succeeds +peer1.org2.example.com | [3393 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3394 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3395 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3396 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3397 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [3398 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [3399 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [339a 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [339b 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [339c 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [339d 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [339e 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [339f 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33a0 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [33a1 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33a2 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33a3 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [33a4 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3004 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3005 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3006 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3007 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3008 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3009 10-14 19:02:10.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [300a 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [300b 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [300c 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [300d 10-14 19:02:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [300e 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [300f 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3010 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3011 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3012 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3013 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 e0 96 01 24 0a 44 d8 43 d6 45 e4 d8 bc 00 1f |....$.D.C.E.....| +peer1.org1.example.com | 00000010 97 d8 77 cb 20 dc 01 ee 7d 9b bd 67 df 19 cd dd |..w. ...}..g....| +peer1.org1.example.com | [3014 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 d9 34 ad ac c8 1b 6c 67 ab 1a |0E.!...4....lg..| +peer1.org1.example.com | 00000010 98 48 8b 7a 08 f8 8c 25 50 ce d2 14 3b 0b 3a b0 |.H.z...%P...;.:.| +peer1.org1.example.com | 00000020 03 a3 0d 12 dc 02 20 48 e7 23 f3 5d e0 ea 88 03 |...... H.#.]....| +peer1.org1.example.com | 00000030 f3 be 38 9e ab 2c ef 54 33 0f d3 f2 54 60 04 60 |..8..,.T3...T`.`| +peer1.org1.example.com | 00000040 7a 74 2c cc 42 42 79 |zt,.BBy| +peer1.org1.example.com | [3015 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3016 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3017 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3018 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3019 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [301a 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [301b 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [301c 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [301d 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [301e 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3020 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [301f 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3021 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3022 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3133 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003b6d360 +peer0.org1.example.com | [3134 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3135 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3136 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3137 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3138 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3139 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 00 ca 9d d4 41 9b ea 18 19 92 dd 1f 0a 86 92 |s....A..........| +peer0.org1.example.com | 00000010 07 51 fd fc 21 a5 15 e1 38 b8 42 50 9a 3b 91 7d |.Q..!...8.BP.;.}| +peer0.org1.example.com | [313a 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c6 1b ac 5f b8 10 a6 25 2e f4 66 |0D. 7..._...%..f| +peer0.org1.example.com | 00000010 06 f0 75 b7 7c 9c 53 51 85 86 bd 7d c0 ae 63 41 |..u.|.SQ...}..cA| +peer0.org1.example.com | 00000020 38 50 cf 87 02 20 7b 9d c8 2e c1 d9 7a 6e cd 82 |8P... {.....zn..| +peer0.org1.example.com | 00000030 d7 4b 5e c2 c6 4b 69 a5 12 9d 2b dc 67 1e 64 5c |.K^..Ki...+.g.d\| +peer0.org1.example.com | 00000040 30 9e 48 35 ff 47 |0.H5.G| +peer0.org1.example.com | [313b 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [313c 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba61c0, header 0xc003b8ca00 +peer0.org1.example.com | [313d 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [313e 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] processing txid: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8 +peer0.org1.example.com | [313f 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8] +peer0.org1.example.com | [3140 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3141 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3142 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3143 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [3144 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [3145 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3146 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3147 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3148 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3149 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 gate 1602702122485496600 evaluation starts +peer0.org1.example.com | [314a 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [314b 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [314c 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [314d 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 principal evaluation fails +peer0.org1.example.com | [314e 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 gate 1602702122485496600 evaluation fails +peer0.org1.example.com | [314f 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3150 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3151 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3152 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 gate 1602702122487282300 evaluation starts +peer0.org1.example.com | [3153 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3154 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3155 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 principal matched by identity 0 +peer0.org1.example.com | [3156 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 00 ca 9d d4 41 9b ea 18 19 92 dd 1f 0a 86 92 |s....A..........| +peer0.org1.example.com | 00000010 07 51 fd fc 21 a5 15 e1 38 b8 42 50 9a 3b 91 7d |.Q..!...8.BP.;.}| +peer0.org1.example.com | [3157 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c6 1b ac 5f b8 10 a6 25 2e f4 66 |0D. 7..._...%..f| +peer0.org1.example.com | 00000010 06 f0 75 b7 7c 9c 53 51 85 86 bd 7d c0 ae 63 41 |..u.|.SQ...}..cA| +peer0.org1.example.com | 00000020 38 50 cf 87 02 20 7b 9d c8 2e c1 d9 7a 6e cd 82 |8P... {.....zn..| +peer0.org1.example.com | 00000030 d7 4b 5e c2 c6 4b 69 a5 12 9d 2b dc 67 1e 64 5c |.K^..Ki...+.g.d\| +peer0.org1.example.com | 00000040 30 9e 48 35 ff 47 |0.H5.G| +peer0.org1.example.com | [3159 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3158 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [315a 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 gate 1602702122487282300 evaluation succeeds +peer0.org1.example.com | [315c 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [315d 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [315e 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [315f 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [315b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33a5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33a6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33a7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [33a8 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33a9 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33aa 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org2.example.com | [33ab 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [33ac 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [33ad 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 gate 1602702136768394400 evaluation starts +peer0.org2.example.com | [33ae 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33af 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b03dc0, CONNECTING +peer0.org2.example.com | [33b0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [33b1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [33b2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 principal evaluation fails +peer0.org2.example.com | [33b3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a200 gate 1602702136768394400 evaluation fails +peer0.org2.example.com | [33b4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [33b5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [33b6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33b7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 gate 1602702136768772700 evaluation starts +peer0.org2.example.com | [33b8 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33b9 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [33ba 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 principal matched by identity 0 +peer0.org2.example.com | [33bb 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [33bc 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 3e b7 65 1c 49 ec 09 dc 41 47 50 |0D. !>.e.I...AGP| +peer0.org2.example.com | 00000010 93 cb 63 98 10 12 64 a2 7a d7 39 74 63 0a e5 3d |..c...d.z.9tc..=| +peer0.org2.example.com | 00000020 d0 4c 45 4f 02 20 35 a4 be 92 47 4e de b8 52 3f |.LEO. 5...GN..R?| +peer0.org2.example.com | 00000030 15 19 b1 86 52 ce 94 f5 d3 44 f2 0c 87 18 2c 47 |....R....D....,G| +peer0.org2.example.com | 00000040 25 f7 1b bc a4 05 |%.....| +peer0.org2.example.com | [33bd 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33be 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1a770 gate 1602702136768772700 evaluation succeeds +peer0.org2.example.com | [33bf 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33c0 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33c1 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33c2 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33c3 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [33c4 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33c5 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [33c6 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33c7 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [33c8 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [33c9 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:59344 disconnected +peer0.org2.example.com | [33ca 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.748Z grpc.peer_address=172.18.0.5:59344 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.9543ms +peer0.org2.example.com | [33cb 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [33cc 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [33cd 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003b03dc0, READY +peer0.org2.example.com | [33ce 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [33cf 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [33d0 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org1.example.com | [3160 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [bc410fe8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3161 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [bc410fe8] notifying Txid:bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, channelID:businesschannel +peer0.org1.example.com | [3162 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3163 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][bc410fe8] Exit chaincode: name:"qscc" (29ms) +peer0.org1.example.com | [3164 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Exit +peer0.org1.example.com | [3165 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3166 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [3167 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, chaincode: qscc} +peer0.org1.example.com | [3168 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C739031FD250202DF62B9FED1612...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3169 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A56A9755D3D423656156B827D11FDC93D6349A712DA4177E9D6824817323C0AB +peer0.org1.example.com | [316a 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, chaincode: qscc} +peer0.org1.example.com | [316b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Exit +peer0.org1.example.com | [316c 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [316d 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [316e 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41820 +peer0.org1.example.com | [316f 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41820 grpc.code=OK grpc.call_duration=35.001ms +peer0.org1.example.com | [3170 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer0.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer0.org1.example.com | [3171 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer0.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer0.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer0.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer0.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer0.org1.example.com | [3172 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3173 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 4c 76 58 e8 66 d7 19 1b c5 c0 07 |0D. YLvX.f......| +peer0.org1.example.com | 00000010 f2 0a e9 4a e1 b7 a2 c7 fd 4d 7d 64 0d 46 11 0a |...J.....M}d.F..| +peer0.org1.example.com | 00000020 20 7f 62 ed 02 20 1c b1 bf b9 b9 33 49 88 f9 c7 | .b.. .....3I...| +peer0.org1.example.com | 00000030 f2 f8 f9 0e 18 2c bb a4 f5 e9 6f 3a c3 ce 6a 37 |.....,....o:..j7| +peer0.org1.example.com | 00000040 77 27 c8 d4 61 69 |w'..ai| +peer0.org1.example.com | [3174 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3175 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3176 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3177 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3178 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3179 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [317a 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [317b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [317c 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [317d 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [317e 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [317f 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3180 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3181 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [33a5 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [33a6 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 gate 1602702130931237900 evaluation starts +peer1.org2.example.com | [33a7 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33a8 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [33a9 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [33aa 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 principal evaluation fails +peer1.org2.example.com | [33ab 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003355fd0 gate 1602702130931237900 evaluation fails +peer1.org2.example.com | [33ac 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33ad 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33ae 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [33af 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 gate 1602702130933232400 evaluation starts +peer1.org2.example.com | [33b0 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33b1 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [33b2 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 principal matched by identity 0 +peer1.org2.example.com | [33b3 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [33b4 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [33b5 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33b6 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003378540 gate 1602702130933232400 evaluation succeeds +peer1.org2.example.com | [33b7 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33b8 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33b9 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33ba 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33bb 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33bc 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33bd 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [33be 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33bf 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3023 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3024 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3025 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3026 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3027 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3028 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3029 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [302a 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [302b 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [302c 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [302d 10-14 19:02:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [302e 10-14 19:02:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [302f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161031 +peer1.org1.example.com | [3030 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FEEC042F43873C5480FD5B66C1C91E2C0F5F09808E33DED9F39676EAC56EF91F +peer1.org1.example.com | [3031 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3032 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3033 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3034 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3035 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3036 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3037 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33d1 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org2.example.com | [33d4 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d5 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33d6 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d7 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33d8 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d9 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [33db 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [33dc 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [33dd 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [33de 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [33da 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33e2 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e3 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e4 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33e5 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33e6 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [33e7 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 gate 1602702136815019500 evaluation starts +peer0.org2.example.com | [33e8 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33c0 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [33c1 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [33c2 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [33c3 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 gate 1602702130939119200 evaluation starts +peer1.org2.example.com | [33c4 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33c5 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [33c6 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [33c7 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 principal evaluation fails +peer1.org2.example.com | [33c8 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379740 gate 1602702130939119200 evaluation fails +peer1.org2.example.com | [33c9 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33ca 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33cb 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [33cc 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 gate 1602702130939652000 evaluation starts +peer1.org2.example.com | [33cd 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33ce 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [33cf 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 principal matched by identity 0 +peer1.org2.example.com | [33d0 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [33d1 10-14 19:02:10.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [33d2 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33d3 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003379cb0 gate 1602702130939652000 evaluation succeeds +peer1.org2.example.com | [33d4 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33d5 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33d6 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33d7 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33d8 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [33d9 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [33da 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [33db 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [33dc 10-14 19:02:10.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33dd 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33de 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33df 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [33e0 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33e1 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33e2 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [33e3 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e4 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33e5 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e6 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e7 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [33e8 10-14 19:02:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33e9 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [33ea 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org1.example.com | [3038 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3039 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [303a 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [303b 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [303c 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [303d 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [303e 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [303f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer1.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer1.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer1.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer1.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer1.org1.example.com | [3041 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3042 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 4f 1a ce 76 e2 e2 e4 cb 16 7d |0E.!..O..v.....}| +peer1.org1.example.com | 00000010 b7 b6 b7 23 7d d4 82 13 6d 80 69 be 8b a0 db 7f |...#}...m.i.....| +peer1.org1.example.com | 00000020 c7 00 06 87 92 02 20 5c bf 0b af 8e db e5 f9 87 |...... \........| +peer1.org1.example.com | 00000030 40 7c cf 27 4f 1d 25 1b e4 22 d3 ff 01 b7 81 0b |@|.'O.%.."......| +peer1.org1.example.com | 00000040 df 41 46 2a 13 26 9e |.AF*.&.| +peer1.org1.example.com | [3043 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3044 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3045 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3046 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3047 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3048 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3049 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [304a 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [304b 10-14 19:02:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [304c 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [304d 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [304e 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [304f 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3050 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3051 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3052 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3053 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3054 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3055 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3056 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3057 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3058 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3059 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 gate 1602702130527411800 evaluation starts +peer1.org1.example.com | [305a 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [305b 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [305c 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 principal matched by identity 0 +peer1.org1.example.com | [305d 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer1.org1.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer1.org1.example.com | [305e 10-14 19:02:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org1.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer1.org1.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer1.org1.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer1.org1.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer1.org1.example.com | [305f 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3060 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8f910 gate 1602702130527411800 evaluation succeeds +peer1.org1.example.com | [3061 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3062 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3063 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3064 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3065 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3066 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3067 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3068 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org1.example.com | [3069 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org1.example.com | [306a 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [306b 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [306c 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [306d 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer1.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer1.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer1.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer1.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer1.org1.example.com | [306f 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3070 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3071 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3072 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3073 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3074 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3075 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3076 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3077 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3078 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3079 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [307a 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [307b 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [307c 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 gate 1602702130534025400 evaluation starts +peer1.org1.example.com | [307d 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [307e 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [307f 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3080 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 principal matched by identity 0 +peer1.org1.example.com | [3081 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer1.org1.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer1.org1.example.com | [3082 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer1.org1.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer1.org1.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer1.org1.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer1.org1.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer1.org1.example.com | [3083 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3084 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cd6020 gate 1602702130534025400 evaluation succeeds +peer1.org1.example.com | [3085 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3086 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3087 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3088 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3089 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [308a 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [308b 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [308c 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org1.example.com | [3182 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +peer0.org1.example.com | [3183 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3184 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3185 10-14 19:02:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3186 10-14 19:02:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3187 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3188 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [318a 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3189 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [318b 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [318c 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [318d 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [318e 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [318f 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3190 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3191 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3192 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3193 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3194 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3195 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [33e1 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33e9 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33ea 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33ec 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33eb 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [33ee 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [33ef 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 principal evaluation fails +peer0.org2.example.com | [33f0 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6ab50 gate 1602702136815019500 evaluation fails +peer0.org2.example.com | [33f1 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [33f2 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [33f3 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33ed 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33f4 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 gate 1602702136824986300 evaluation starts +peer0.org2.example.com | [33f5 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33f6 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33f7 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33f8 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33f9 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [33fa 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 gate 1602702136826060200 evaluation starts +peer0.org2.example.com | [33fb 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33fc 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33fd 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [33fe 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [33eb 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [33ec 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E16100F1801 +peer1.org2.example.com | [33ed 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 76A09BDF3FB1CA51441F9CC78C0CC1AA9A7F6D883D20B8D436547EE3D14C7BBF +peer1.org2.example.com | [33ee 10-14 19:02:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [33ef 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f0 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f1 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f2 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f3 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [33f4 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f5 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33f6 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [33f7 10-14 19:02:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33f8 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33f9 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fa 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fb 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33fc 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33fd 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [33fe 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [33ff 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3400 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3401 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3402 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3403 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3404 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3405 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3406 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3407 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer1.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer1.org2.example.com | [3408 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer1.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer1.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer1.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer1.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer1.org2.example.com | [3409 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer1.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer1.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer1.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer1.org1.example.com | [308e 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [308f 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3090 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3091 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3092 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer1.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer1.org1.example.com | [3093 10-14 19:02:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer1.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer1.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer1.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer1.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer1.org1.example.com | [3094 10-14 19:02:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3095 10-14 19:02:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3096 10-14 19:02:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3097 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3098 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3099 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [309a 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [309b 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [309c 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [309d 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [309e 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [309f 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30a1 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30a2 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30a3 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30a4 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30a5 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30a6 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30a7 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30a0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30a8 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [30a9 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c ab 21 da c8 d8 1f 4e 72 9a 2e dc 15 c7 00 92 |..!....Nr.......| +peer1.org1.example.com | 00000010 a2 c0 2b 81 f2 ab fb 3c cb 03 d6 ba ce 45 8b 77 |..+....<.....E.w| +peer1.org1.example.com | [30aa 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 00 4f 74 45 5d c1 d7 a8 7e 53 |0E.!...OtE]...~S| +peer1.org1.example.com | 00000010 23 8e d4 39 88 35 b5 bf bc d3 ea a3 7a bd 2b 60 |#..9.5......z.+`| +peer1.org1.example.com | 00000020 81 0a d8 b3 31 02 20 0d 91 f4 94 02 61 14 eb 32 |....1. .....a..2| +peer1.org1.example.com | 00000030 92 92 0d 3b 35 ea be 7c 92 55 1b d4 b9 f5 bf de |...;5..|.U......| +peer1.org1.example.com | 00000040 19 bf d6 15 e7 c6 f7 |.......| +peer1.org1.example.com | [30ab 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30ac 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [30ad 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [30ae 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [30af 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [30b0 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b1 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b2 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b3 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b4 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30b5 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30b6 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b7 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b8 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30b9 10-14 19:02:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30ba 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30bb 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30bc 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30bd 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [30be 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [30bf 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30c0 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30c1 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [30c2 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30c3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [30c4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [30c5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3400 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [33ff 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 principal matched by identity 0 +peer0.org2.example.com | [3401 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 principal evaluation fails +peer0.org2.example.com | [3402 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [3403 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b340 gate 1602702136826060200 evaluation fails +peer0.org2.example.com | [3404 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 41 fe 7a cb e6 2b 74 07 ab 21 |0E.!..A.z..+t..!| +peer0.org2.example.com | 00000010 33 70 73 7d ac 74 8e cd c2 0b 77 fd df dc 26 de |3ps}.t....w...&.| +peer0.org2.example.com | 00000020 9b 16 1a 69 ac 02 20 46 b2 a2 df 2c 4e 4a 28 1b |...i.. F...,NJ(.| +peer0.org2.example.com | 00000030 79 b8 82 0c 23 0a 43 15 80 2d 07 88 51 21 c3 37 |y...#.C..-..Q!.7| +peer0.org2.example.com | 00000040 af 5b a9 6f fb 84 c2 |.[.o...| +peer0.org2.example.com | [3405 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3406 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3407 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3408 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 gate 1602702136826465400 evaluation starts +peer0.org2.example.com | [3409 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [340a 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [340b 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [340c 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 principal matched by identity 0 +peer0.org2.example.com | [340d 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ba5450 gate 1602702136824986300 evaluation succeeds +peer0.org2.example.com | [340e 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [340f 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3410 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e a7 41 6f b8 fb 64 05 3e 40 24 |0E.!...Ao..d.>@$| +peer0.org2.example.com | 00000010 d2 07 37 a6 aa 5f 18 89 be 35 35 91 4b 34 20 51 |..7.._...55.K4 Q| +peer0.org2.example.com | 00000020 e1 57 12 fe f1 02 20 6a ed b8 e8 2c 2d a1 f2 3c |.W.... j...,-..<| +peer0.org2.example.com | 00000030 fa 88 cd 9f 3a 3f 87 d9 4e 58 32 f7 58 30 07 25 |....:?..NX2.X0.%| +peer0.org2.example.com | 00000040 25 58 e1 bc 7a 6b 6c |%X..zkl| +peer0.org2.example.com | [3411 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3412 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6b8b0 gate 1602702136826465400 evaluation succeeds +peer0.org2.example.com | [3413 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3414 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3415 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3416 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3417 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:59350 +peer0.org2.example.com | [3418 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:59350 +peer0.org2.example.com | [3419 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:59350 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [341a 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [341b 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [341c 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [341d 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [341e 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [341f 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3421 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | [3422 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3424 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [3425 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:59350 disconnected +peer0.org2.example.com | [3426 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:59350 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=27.6701ms +peer0.org2.example.com | [3423 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3427 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3429 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3428 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3420 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [342a 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [342b 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [342c 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [342d 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [342e 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [342f 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3430 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 gate 1602702136836392600 evaluation starts +peer0.org2.example.com | [3431 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3432 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3433 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3434 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 principal evaluation fails +peer0.org2.example.com | [3435 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8850 gate 1602702136836392600 evaluation fails +peer0.org2.example.com | [3436 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3437 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3438 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3439 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 gate 1602702136840376800 evaluation starts +peer0.org2.example.com | [343a 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [340a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 cd c7 b2 7e dc 5a 48 e9 ba 3b ad |0D. ....~.ZH..;.| +peer1.org2.example.com | 00000010 cb 5f 82 50 46 50 2e 82 cb ba d9 aa 65 cf 64 5e |._.PFP......e.d^| +peer1.org2.example.com | 00000020 bc e1 24 e7 02 20 69 34 32 6e 65 0d a1 e0 b8 33 |..$.. i42ne....3| +peer1.org2.example.com | 00000030 32 e5 1e b4 cd 0e 78 eb 87 a0 6b ab 55 be 12 5b |2.....x...k.U..[| +peer1.org2.example.com | 00000040 3f ad 38 04 13 98 |?.8...| +peer1.org2.example.com | [340b 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [340c 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [340d 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [340e 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [340f 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3410 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3411 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3412 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3413 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3414 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3415 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3416 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3417 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [3418 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3419 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [341a 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [341b 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [341c 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [341d 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [341e 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [341f 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3420 10-14 19:02:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3421 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3422 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3423 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3424 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3425 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3426 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3427 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3428 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3429 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [342a 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [342b 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [342c 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [342d 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [342e 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [342f 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3430 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3431 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3432 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3433 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3434 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3435 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3436 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3437 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3438 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16102B +peer1.org2.example.com | [3439 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CC68EE31A4F1AE617403C4F81580406A3A5316494855F6AF9338900E303EA90F +peer1.org2.example.com | [343a 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [343b 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [30c6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [30c7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [30c8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer1.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer1.org1.example.com | [30c9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer1.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer1.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer1.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer1.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer1.org1.example.com | [30ca 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [30cb 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 01 7f be 54 a1 0f fd 37 d8 94 b5 |0D. ?...T...7...| +peer1.org1.example.com | 00000010 2a 7f a5 f1 ed 40 11 b7 dc 8f 57 fd 48 6b 09 62 |*....@....W.Hk.b| +peer1.org1.example.com | 00000020 5f b6 d0 7e 02 20 20 7b c6 27 30 03 ea 54 58 2a |_..~. {.'0..TX*| +peer1.org1.example.com | 00000030 cf 14 71 42 3f a9 4a 06 6f 62 50 78 76 f6 c8 30 |..qB?.J.obPxv..0| +peer1.org1.example.com | 00000040 0e 0b 7b 8e 50 b5 |..{.P.| +peer1.org1.example.com | [30cc 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [30cd 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [30ce 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [30cf 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [30d0 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [30d1 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d2 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30d4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [30d5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30d6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30d7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [30d8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [30d9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [30da 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30db 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30dc 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30dd 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30de 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30df 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30e0 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [30e1 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [30e2 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30e3 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E16100F1801 +peer1.org1.example.com | [30e4 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 94ECAE063CE91FB6DF07C673562D57595B5BC01802767DC3E54AEA7A950E4141 +peer1.org1.example.com | [30e5 10-14 19:02:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [30e6 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e7 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e8 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e9 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ea 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [30eb 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ec 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ed 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [30ee 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30ef 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f0 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f1 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30f2 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30f3 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f4 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f5 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f6 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [30f7 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [30f8 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30f9 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [30fa 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [30fb 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [30fc 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30fd 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30fe 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ff 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3100 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3101 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3102 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3103 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3104 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3105 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3106 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3107 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3108 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3109 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [310a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [310b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [310c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [310d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [310e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [310f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3110 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 gate 1602702134187045200 evaluation starts +peer1.org1.example.com | [3111 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3112 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3113 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 principal matched by identity 0 +peer1.org1.example.com | [3114 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer1.org1.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer1.org1.example.com | [3115 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer1.org1.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer1.org1.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer1.org1.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer1.org1.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer1.org1.example.com | [3116 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3117 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d2f5b0 gate 1602702134187045200 evaluation succeeds +peer1.org1.example.com | [3118 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3119 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [311a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [311b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [311c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [311d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [311e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [311f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3120 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3121 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3122 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3123 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3124 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [343b 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [343c 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 principal matched by identity 0 +peer0.org2.example.com | [343d 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 83 b4 04 89 f2 2e b1 a7 3a dd fc db f3 46 47 |"........:....FG| +peer0.org2.example.com | 00000010 c6 2b b3 26 ff d2 ec d2 65 7d 3f 04 d4 97 74 ab |.+.&....e}?...t.| +peer0.org2.example.com | [343e 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 d0 5b 66 88 33 8f 4d 7e dc d7 3c |0D. ..[f.3.M~..<| +peer0.org2.example.com | 00000010 fc 47 a2 e4 61 45 b5 ad 14 0f d9 5b 83 3b c3 d6 |.G..aE.....[.;..| +peer0.org2.example.com | 00000020 79 d5 a6 de 02 20 71 5d c8 14 40 b5 f1 9f 61 63 |y.... q]..@...ac| +peer0.org2.example.com | 00000030 a3 dc 76 bb b5 b2 f2 4d d4 8d 7b 13 b0 10 14 f3 |..v....M..{.....| +peer0.org2.example.com | 00000040 f5 cd 77 64 bc fe |..wd..| +peer0.org2.example.com | [343f 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3440 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bd8dc0 gate 1602702136840376800 evaluation succeeds +peer0.org2.example.com | [3441 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3442 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3443 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3444 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3445 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3446 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3447 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3196 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3197 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3198 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3199 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [319a 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [319b 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [319c 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [319d 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [319e 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [319f 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a0 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a1 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a2 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [31a3 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161029 +peer0.org1.example.com | [31a4 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3BF5B338CFDEA13682574C842C53C4C98873E1D76CDEE341F9B3BAD88DDF0A62 +peer0.org1.example.com | [31a5 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [31a6 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [31a7 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [31a8 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a9 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31aa 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31ab 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31ac 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31ad 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ae 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [31b0 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [31b2 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31b1 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31af 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31b3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [31b4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [31b5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [31b7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31b8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31b9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31ba 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31bb 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31bc 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 gate 1602702122635775600 evaluation starts +peer0.org1.example.com | [31bd 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31be 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [31bf 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 principal matched by identity 0 +peer0.org1.example.com | [31c0 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [31c1 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [31c2 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31c3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 gate 1602702122635775600 evaluation succeeds +peer0.org1.example.com | [31c4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31c5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31c6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [31c7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [31c8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31c9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3448 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3449 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [344a 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344b 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344c 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [344d 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [344e 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344f 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3450 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3451 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3452 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > alive: alive: alive: +peer0.org2.example.com | [3453 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [3454 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3455 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3456 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3457 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [3458 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3459 10-14 19:02:16.84 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003c0bbb0, CONNECTING +peer0.org2.example.com | [345a 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003c0bbb0, READY +peer0.org2.example.com | [345b 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [345c 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [345d 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [345e 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer1.org2.example.com | [343c 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [343d 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" secret_envelope:\031\310\240\207FY\3544\345`\321\207vW#\333," > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [343e 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [343f 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3440 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3441 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3442 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3443 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3444 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" secret_envelope:\031\310\240\207FY\3544\345`\321\207vW#\333," > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3445 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3446 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3447 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3448 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3449 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [344a 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [344b 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [344c 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [344d 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org2.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer1.org2.example.com | [344e 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer1.org2.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer1.org2.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer1.org2.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer1.org2.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer1.org2.example.com | [344f 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3450 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 21 3c 22 c3 a2 60 72 b8 db fa ae b2 |0D. !<"..`r.....| +peer1.org2.example.com | 00000010 b2 65 7a 88 cf 04 6b fc ea c7 9d f0 85 b7 e4 3f |.ez...k........?| +peer1.org2.example.com | 00000020 77 dc 83 70 02 20 6d 22 c8 2e 65 4e fc 59 3c 0b |w..p. m"..eN.Y<.| +peer1.org2.example.com | 00000030 76 a7 0b 67 3e 19 c8 a0 87 46 59 ec 34 e5 60 d1 |v..g>....FY.4.`.| +peer1.org2.example.com | 00000040 87 76 57 23 db 2c |.vW#.,| +peer1.org2.example.com | [3451 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [31ca 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31cb 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31cc 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31cd 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31ce 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31cf 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 gate 1602702122638678500 evaluation starts +peer0.org1.example.com | [31d0 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31d1 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [31d2 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 principal matched by identity 0 +peer0.org1.example.com | [31d3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [31d4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [31d5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31d6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 gate 1602702122638678500 evaluation succeeds +peer0.org1.example.com | [31d7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31d8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31d9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [31da 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [31db 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31dc 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31dd 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31de 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [31df 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31e0 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31e1 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [31e2 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e3 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [31e4 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e5 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e6 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e7 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e8 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e9 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [31ea 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3461 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3462 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3463 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3464 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3465 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3466 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3467 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3468 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3469 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [346a 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3452 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3453 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3454 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3455 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3456 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3457 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3458 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3459 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [345a 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [345b 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [345c 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [345d 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [345e 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [345f 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3460 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 gate 1602702134341901100 evaluation starts +peer1.org2.example.com | [3461 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3462 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3463 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3464 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 principal evaluation fails +peer1.org2.example.com | [3465 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003417b00 gate 1602702134341901100 evaluation fails +peer1.org2.example.com | [3466 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3467 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3468 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3469 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 gate 1602702134342354100 evaluation starts +peer1.org2.example.com | [346a 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [346b 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [346c 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 principal matched by identity 0 +peer1.org2.example.com | [346d 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer1.org2.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer1.org2.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer1.org2.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer1.org2.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer1.org2.example.com | [346f 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3470 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003454070 gate 1602702134342354100 evaluation succeeds +peer1.org2.example.com | [3471 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3472 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3125 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3126 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3127 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3128 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3129 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [312a 10-14 19:02:14.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [312b 10-14 19:02:14.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [312c 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [312d 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [312e 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [312f 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3130 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3131 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3132 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3133 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3134 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3135 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3136 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3137 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3138 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [3139 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [313a 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [313b 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [313c 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [313d 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [346b 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 gate 1602702136859401800 evaluation starts +peer0.org2.example.com | [346c 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [346d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [346e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [346f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 principal evaluation fails +peer0.org2.example.com | [3470 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c670a0 gate 1602702136859401800 evaluation fails +peer0.org2.example.com | [3471 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3472 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3473 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3474 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 gate 1602702136861817400 evaluation starts +peer0.org2.example.com | [3475 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3476 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3477 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 principal matched by identity 0 +peer0.org2.example.com | [3478 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [3479 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c3 14 53 a9 5e 97 18 69 62 37 f1 |0E.!...S.^..ib7.| +peer0.org2.example.com | 00000010 e5 0e fa 6a 83 4c b5 71 b9 0e 8f 72 dd b9 af 6b |...j.L.q...r...k| +peer0.org2.example.com | 00000020 7f dd 69 b1 b0 02 20 5b bd ac e2 0e b4 61 52 29 |..i... [.....aR)| +peer0.org2.example.com | 00000030 ff 28 dc 79 a0 3e 65 22 89 e5 b2 b7 d3 4e c4 63 |.(.y.>e".....N.c| +peer0.org2.example.com | 00000040 95 24 93 be 25 47 17 |.$..%G.| +peer0.org2.example.com | [347a 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [347b 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c67610 gate 1602702136861817400 evaluation succeeds +peer0.org2.example.com | [347c 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [347d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [347e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [347f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3480 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [3481 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3482 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3483 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3484 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3485 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3486 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3487 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3488 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3489 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [348a 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [348b 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [348c 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31eb 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [31ec 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31ed 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31ee 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31ef 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31f0 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31f1 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 gate 1602702122662408300 evaluation starts +peer0.org1.example.com | [31f2 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [31f3 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [31f4 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 principal matched by identity 0 +peer0.org1.example.com | [31f5 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +peer0.org1.example.com | 00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +peer0.org1.example.com | [31f6 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +peer0.org1.example.com | 00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +peer0.org1.example.com | 00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +peer0.org1.example.com | 00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +peer0.org1.example.com | 00000040 c0 0c 0b 4c 59 c0 |...LY.| +peer0.org1.example.com | [31f7 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [31f8 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 gate 1602702122662408300 evaluation succeeds +peer0.org1.example.com | [31f9 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31fa 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [31fb 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [31fc 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [31fd 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31fe 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31ff 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3200 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer0.org1.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer0.org1.example.com | [3201 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer0.org1.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer0.org1.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer0.org1.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer0.org1.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer0.org1.example.com | [3202 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3203 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3204 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3205 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3206 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer0.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer0.org1.example.com | [3207 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer0.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer0.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer0.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer0.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer0.org1.example.com | [3208 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3209 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [320a 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [320b 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [320c 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [320d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [320e 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [320f 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3210 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3211 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3212 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3213 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3214 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 gate 1602702122669129700 evaluation starts +peer0.org1.example.com | [3215 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3216 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3217 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 principal matched by identity 0 +peer0.org1.example.com | [3218 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3219 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [321a 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [321b 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 gate 1602702122669129700 evaluation succeeds +peer0.org1.example.com | [321c 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [321d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [321e 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [321f 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3220 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3221 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3222 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [3223 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [3224 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3225 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer0.org1.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer0.org1.example.com | [3226 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer0.org1.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer0.org1.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer0.org1.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer1.org1.example.com | [313e 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [313f 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3140 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3141 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3142 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3143 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3144 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 gate 1602702134260423900 evaluation starts +peer1.org1.example.com | [3145 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3146 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3147 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 principal matched by identity 0 +peer1.org1.example.com | [3148 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [3149 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [314a 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [314b 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8da30 gate 1602702134260423900 evaluation succeeds +peer1.org1.example.com | [314c 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [314d 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [314e 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [314f 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3150 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3151 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3152 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3153 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3154 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3155 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3156 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3157 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3158 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 gate 1602702134261242400 evaluation starts +peer1.org2.example.com | [3473 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3474 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3475 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3476 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3477 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3478 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer1.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer1.org2.example.com | [3479 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer1.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer1.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer1.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer1.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer1.org2.example.com | [347a 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [347b 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [347c 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [347d 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org2.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer1.org2.example.com | [347e 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer1.org2.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer1.org2.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer1.org2.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer1.org2.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer1.org2.example.com | [347f 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3480 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3481 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3482 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3483 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3484 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3485 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3486 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3487 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3488 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3489 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [348a 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [348b 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [348c 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [348d 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [348e 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [348f 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 gate 1602702134360488700 evaluation starts +peer1.org2.example.com | [3490 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3491 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3492 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3493 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 principal evaluation fails +peer1.org2.example.com | [3494 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003449130 gate 1602702134360488700 evaluation fails +peer1.org2.example.com | [3495 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3496 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3497 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3498 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 gate 1602702134360816600 evaluation starts +peer1.org2.example.com | [3499 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [349a 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [349b 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 principal matched by identity 0 +peer1.org2.example.com | [349c 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer1.org2.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer1.org2.example.com | [349d 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer1.org2.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer1.org2.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer1.org2.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer1.org2.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer1.org2.example.com | [349e 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [349f 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034496a0 gate 1602702134360816600 evaluation succeeds +peer0.org2.example.com | [348d 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [348e 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [348f 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3490 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3491 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3492 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3493 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 gate 1602702137892270900 evaluation starts +peer0.org2.example.com | [3494 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3495 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3496 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3497 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 principal evaluation fails +peer0.org2.example.com | [3498 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c80d50 gate 1602702137892270900 evaluation fails +peer0.org2.example.com | [3499 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [349a 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [349b 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [349c 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 gate 1602702137894416000 evaluation starts +peer0.org2.example.com | [349d 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [349e 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [349f 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 principal matched by identity 0 +peer0.org2.example.com | [34a0 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [34a1 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [34a2 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34a3 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c812c0 gate 1602702137894416000 evaluation succeeds +peer0.org2.example.com | [34a4 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34a5 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34a6 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34a7 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34a8 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a9 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34aa 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ab 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ac 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34ad 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34ae 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [34af 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 gate 1602702137899173000 evaluation starts +peer0.org2.example.com | [34b0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34b1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [34b2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [34b3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 principal evaluation fails +peer0.org2.example.com | [34b4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81eb0 gate 1602702137899173000 evaluation fails +peer0.org2.example.com | [34b5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [34b6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [34b7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34b8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 gate 1602702137904951400 evaluation starts +peer0.org2.example.com | [34b9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34ba 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [34bb 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 principal matched by identity 0 +peer0.org2.example.com | [34bc 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3159 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [315a 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [315b 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 principal matched by identity 0 +peer1.org1.example.com | [315c 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [315d 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [315e 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [315f 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbcc30 gate 1602702134261242400 evaluation succeeds +peer1.org1.example.com | [3160 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3161 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3162 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3163 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3164 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3165 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3166 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3167 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [3168 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [3169 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [316a 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [316b 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [316c 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [316d 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [316e 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [316f 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3170 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3171 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3172 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3173 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 gate 1602702134269393300 evaluation starts +peer1.org1.example.com | [3174 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3175 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3176 10-14 19:02:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 principal matched by identity 0 +peer0.org1.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer0.org1.example.com | [3227 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3228 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 ac 69 ad 00 62 65 42 55 a5 5c |0E.!...i..beBU.\| +peer0.org1.example.com | 00000010 ab d9 20 6b bd f2 ea 49 27 5b 28 98 c6 ad f1 bc |.. k...I'[(.....| +peer0.org1.example.com | 00000020 86 7b c9 99 88 02 20 3b 16 57 20 2f 90 37 db 96 |.{.... ;.W /.7..| +peer0.org1.example.com | 00000030 fb 7a 69 78 8f 03 da 48 5e 8b 25 d4 dd b6 db ec |.zix...H^.%.....| +peer0.org1.example.com | 00000040 14 5d d2 5a c0 f6 39 |.].Z..9| +peer0.org1.example.com | [3229 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [322a 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [322b 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [322c 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [322d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [322e 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [322f 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [3230 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3231 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [3232 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3233 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3234 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3235 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3236 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3237 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3238 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3239 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [323a 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 gate 1602702122692571500 evaluation starts +peer0.org1.example.com | [323b 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [323c 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [323d 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 principal matched by identity 0 +peer0.org1.example.com | [323e 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +peer0.org1.example.com | 00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +peer0.org1.example.com | [323f 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +peer0.org1.example.com | 00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +peer0.org1.example.com | 00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +peer0.org1.example.com | 00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +peer0.org1.example.com | 00000040 e3 6c 82 19 05 b6 19 |.l.....| +peer0.org1.example.com | [3240 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3241 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 gate 1602702122692571500 evaluation succeeds +peer0.org1.example.com | [3242 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3243 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3244 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3245 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3246 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3247 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3248 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3249 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +peer0.org1.example.com | 00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +peer0.org1.example.com | [324a 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +peer0.org1.example.com | 00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +peer0.org1.example.com | 00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +peer0.org1.example.com | 00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +peer0.org1.example.com | 00000040 7e e9 c8 0c cb c1 59 |~.....Y| +peer0.org1.example.com | [324b 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [324c 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [324d 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [324e 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +peer0.org1.example.com | 00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +peer0.org1.example.com | [324f 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +peer0.org1.example.com | 00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +peer0.org1.example.com | 00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +peer0.org1.example.com | 00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +peer0.org1.example.com | 00000040 fd 69 ae 22 60 96 a0 |.i."`..| +peer0.org1.example.com | [3250 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3251 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3252 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3253 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3254 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3255 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34a0 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34a1 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34a2 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34a3 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34a4 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [34a5 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34a6 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [34a7 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer1.org2.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer1.org2.example.com | [34a8 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer1.org2.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer1.org2.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer1.org2.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer1.org2.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer1.org2.example.com | [34a9 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [34aa 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ab 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [34ac 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org2.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer1.org2.example.com | [34ad 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer1.org2.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer1.org2.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer1.org2.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer1.org2.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer1.org2.example.com | [34ae 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [34af 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [34b0 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34b1 10-14 19:02:14.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34b2 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [34b3 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [34b4 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [34b5 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34b6 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34b7 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34b8 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34b9 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ba 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34bb 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [34bc 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34bd 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [34be 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [34bf 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [34c0 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [34c1 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34c2 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [34c3 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34c4 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34c5 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34c6 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34c7 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34c8 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 gate 1602702134524890900 evaluation starts +peer1.org2.example.com | [34c9 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34ca 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [34cb 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [34cc 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 principal evaluation fails +peer1.org2.example.com | [34cd 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003484f60 gate 1602702134524890900 evaluation fails +peer1.org2.example.com | [34ce 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34cf 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34d0 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [34d1 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 gate 1602702134529199300 evaluation starts +peer1.org2.example.com | [34d2 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34d3 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [34d4 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 principal matched by identity 0 +peer1.org2.example.com | [34d5 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer1.org2.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer1.org2.example.com | [34d6 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer1.org2.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer1.org2.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer1.org2.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer1.org2.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer1.org2.example.com | [34d7 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34d8 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034854d0 gate 1602702134529199300 evaluation succeeds +peer1.org2.example.com | [34d9 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34da 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34db 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34dc 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34dd 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [34de 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [34df 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [34e0 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [34e1 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [34e2 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34e3 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34e4 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34e5 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [34e6 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e7 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e8 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e9 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [34ea 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > alive: alive: alive: +peer1.org2.example.com | [34eb 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [34ec 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ed 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ee 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3177 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [3178 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [3179 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [317a 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dcee60 gate 1602702134269393300 evaluation succeeds +peer1.org1.example.com | [317b 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [317c 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [317d 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [317e 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [317f 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3180 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3181 10-14 19:02:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3182 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3183 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3184 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3185 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3186 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3187 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 gate 1602702134283508000 evaluation starts +peer1.org1.example.com | [3188 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3189 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [318a 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 principal matched by identity 0 +peer1.org1.example.com | [318b 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [318c 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [318d 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [318e 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dec060 gate 1602702134283508000 evaluation succeeds +peer1.org1.example.com | [318f 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3190 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3191 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34bd 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [34be 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34bf 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9e420 gate 1602702137904951400 evaluation succeeds +peer0.org2.example.com | [34c0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34c1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34c2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34c3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34c4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34c5 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c6 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c7 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [34c8 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c9 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34ca 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34cb 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34cc 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34cd 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [34ce 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [34cf 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [34d0 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [34d1 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [34d2 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc6e80, CONNECTING +peer0.org2.example.com | [34d3 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34d4 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [34d5 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34d6 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34d7 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34d8 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34d9 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34da 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34db 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [34dc 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 gate 1602702137930128300 evaluation starts +peer0.org2.example.com | [34dd 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34de 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [34df 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [34e0 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 principal evaluation fails +peer0.org2.example.com | [34e1 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc7b60 gate 1602702137930128300 evaluation fails +peer0.org2.example.com | [34e2 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [34e3 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [34e4 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34e5 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 gate 1602702137930384300 evaluation starts +peer0.org2.example.com | [34e6 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34e7 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [34e8 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 principal matched by identity 0 +peer0.org2.example.com | [34e9 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [34ea 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [34eb 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34ec 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce80d0 gate 1602702137930384300 evaluation succeeds +peer0.org2.example.com | [34ed 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34ee 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34ef 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34f0 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34f1 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34f2 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34f3 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [34f4 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003cc6e80, READY +peer0.org2.example.com | [34f5 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [34f6 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [34f7 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [34f8 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [34fb 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 c9 3e 95 74 02 b7 07 8f 57 af 3b |0D.!..>.t....W.;| +peer0.org2.example.com | 00000010 1a 55 94 cf 87 69 f2 84 41 00 6e 72 ff c5 ff eb |.U...i..A.nr....| +peer0.org2.example.com | 00000020 08 95 8c 5f c4 02 1f 16 6c fb 99 7b d3 ae 9d 27 |..._....l..{...'| +peer0.org2.example.com | 00000030 f9 39 2e 4e 26 77 3e 62 5f 2f 55 c2 c7 77 75 f1 |.9.N&w>b_/U..wu.| +peer0.org2.example.com | 00000040 d1 49 c8 4a 76 ff |.I.Jv.| +peer0.org2.example.com | [34fc 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org2.example.com | [34fd 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34fe 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [34ff 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3500 10-14 19:02:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3501 10-14 19:02:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3502 10-14 19:02:18.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3503 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3504 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3505 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3506 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3507 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3508 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3509 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [350a 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [350b 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [350c 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [350d 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [350e 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [350f 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3510 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3511 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3512 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3513 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3514 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3192 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3193 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3194 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3195 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3196 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3197 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3198 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3199 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [319a 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [319b 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [319c 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [319d 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [319e 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [319f 10-14 19:02:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a0 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [31a1 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [31a2 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [31a3 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [31a4 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a5 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a6 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31a7 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31a8 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31a9 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31aa 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31ab 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31ac 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 gate 1602702134295214800 evaluation starts +peer1.org1.example.com | [31ad 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31ae 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [31af 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 principal matched by identity 0 +peer1.org1.example.com | [31b0 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [31b1 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [31b2 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31b3 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0e9e0 gate 1602702134295214800 evaluation succeeds +peer1.org1.example.com | [31b4 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31b5 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31b6 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31b7 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31b8 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31b9 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31ba 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31bb 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31bc 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31bd 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31be 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31bf 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31c0 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 gate 1602702134296675900 evaluation starts +peer1.org1.example.com | [31c1 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31c2 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [31c3 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 principal matched by identity 0 +peer1.org1.example.com | [31c4 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [31c5 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [31c6 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31c7 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0fbe0 gate 1602702134296675900 evaluation succeeds +peer1.org1.example.com | [31c8 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31c9 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31ca 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31cb 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31cc 10-14 19:02:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31cd 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ce 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31cf 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d0 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [31d1 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d2 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31d3 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31d4 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31d5 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31d6 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31d7 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31d8 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 gate 1602702134356427500 evaluation starts +peer1.org1.example.com | [31d9 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31da 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [31db 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 principal matched by identity 0 +peer1.org1.example.com | [31dc 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org1.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer1.org1.example.com | [31dd 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer1.org1.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer1.org1.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer1.org1.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer1.org1.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer1.org1.example.com | [31de 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31df 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d737e0 gate 1602702134356427500 evaluation succeeds +peer1.org1.example.com | [31e0 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31e1 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31e2 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31e3 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31e4 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [31e5 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [31e6 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [31e7 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [31e8 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [31e9 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ea 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31eb 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ec 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [31ed 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31ee 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31ef 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f0 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31f1 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [31f2 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f3 10-14 19:02:14.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > alive: +peer1.org1.example.com | [31f4 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f5 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f6 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [31f7 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f8 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f9 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31fa 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [31fb 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31fc 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [31fd 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [31fe 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ff 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3200 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3201 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3202 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3203 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3204 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3205 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3206 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3209 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3207 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [320a 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3208 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [320b 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [320c 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [320d 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [320e 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [320f 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3210 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3211 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3212 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3213 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3214 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3215 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3216 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3217 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3218 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161032 +peer1.org1.example.com | [3219 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 98BD5684C09161BB00FC0D3A43E83805A246C7558399E3A0D5F0C523CA36E54A +peer1.org1.example.com | [321a 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [321b 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [321c 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [321d 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [321e 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321f 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3220 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3515 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3516 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3517 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3518 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3519 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161032 +peer0.org2.example.com | [351a 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8EEF4508578855B9971172B1C138715AE0961ED389D5AE96652E432EAABAF4E +peer0.org2.example.com | [351b 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [351c 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [351d 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [351e 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005t3\266<\262Y\306\240G\253\034X\320 $\241\020\374\211Ih\002 \010\213\034*(\245l\330U\301\350a\353\355\235\007\236\317\347E\351w\014\224Y\325\336\244\242\277\245\302" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [351f 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3520 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3521 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3522 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3523 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3524 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3525 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005t3\266<\262Y\306\240G\253\034X\320 $\241\020\374\211Ih\002 \010\213\034*(\245l\330U\301\350a\353\355\235\007\236\317\347E\351w\014\224Y\325\336\244\242\277\245\302" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3526 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3527 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3528 10-14 19:02:18.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3529 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [352a 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [352c 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [352d 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [352e 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [352f 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3530 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer0.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer0.org2.example.com | [3531 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer0.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer0.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer0.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer0.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer0.org2.example.com | [3532 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3533 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4e 1a fb bb 9f 17 a6 3f 3e 05 74 |0D. 'N......?>.t| +peer0.org2.example.com | 00000010 33 b6 3c b2 59 c6 a0 47 ab 1c 58 d0 20 24 a1 10 |3.<.Y..G..X. $..| +peer0.org2.example.com | 00000020 fc 89 49 68 02 20 08 8b 1c 2a 28 a5 6c d8 55 c1 |..Ih. ...*(.l.U.| +peer0.org2.example.com | 00000030 e8 61 eb ed 9d 07 9e cf e7 45 e9 77 0c 94 59 d5 |.a.......E.w..Y.| +peer0.org2.example.com | 00000040 de a4 a2 bf a5 c2 |......| +peer0.org2.example.com | [3534 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3535 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3536 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3537 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [352b 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3538 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3539 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [353b 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [353a 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [353c 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [353d 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [353e 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [353f 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3540 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3541 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3542 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3543 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3544 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 gate 1602702138180134000 evaluation starts +peer0.org2.example.com | [3545 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3546 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3547 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [3221 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3222 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3223 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3224 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3225 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3226 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3227 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3228 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3229 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [322a 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [322b 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [322c 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [322d 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer1.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer1.org1.example.com | [322e 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer1.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer1.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer1.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer1.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer1.org1.example.com | [3230 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3231 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 35 18 69 f4 15 ff f0 ee 8b 57 91 |0D. .5.i......W.| +peer1.org1.example.com | 00000010 4f c7 7e 97 f5 12 da 4b dd 14 e9 a7 de cf f1 d9 |O.~....K........| +peer1.org1.example.com | 00000020 eb 9c b2 13 02 20 32 10 01 49 3a 33 e9 4e 00 b2 |..... 2..I:3.N..| +peer1.org1.example.com | 00000030 f3 b6 6e af 78 cc 38 e6 9a 94 33 ef 01 35 0c 20 |..n.x.8...3..5. | +peer1.org1.example.com | 00000040 c8 6d 79 f8 15 f9 |.my...| +peer1.org1.example.com | [322f 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3232 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3233 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3234 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3235 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3236 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3237 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3238 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3239 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [323a 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [323b 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3256 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3257 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3258 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3259 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [325a 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [325b 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [325c 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 gate 1602702122720959700 evaluation starts +peer0.org1.example.com | [325d 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [325e 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [325f 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 principal matched by identity 0 +peer0.org1.example.com | [3260 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3261 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3262 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3263 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 gate 1602702122720959700 evaluation succeeds +peer0.org1.example.com | [3264 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3265 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3266 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3267 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3268 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3269 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41824 +peer0.org1.example.com | [326a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e80410 +peer0.org1.example.com | [326b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [326c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [326d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [326e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [326f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3270 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 9b fe 70 46 18 c7 f5 d0 26 bb 7a 72 c9 62 3e |...pF....&.zr.b>| +peer0.org1.example.com | 00000010 20 1e dc ff c6 af 8f df 93 fd 09 9d b0 02 51 47 | .............QG| +peer0.org1.example.com | [3271 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 47 c8 38 2f de f5 99 a5 80 a9 |0E.!..G.8/......| +peer0.org1.example.com | 00000010 bc 16 9f 78 e1 93 56 91 f7 78 8c dd fb d5 44 9a |...x..V..x....D.| +peer0.org1.example.com | 00000020 be f3 0b 35 3b 02 20 68 f3 a8 4c 36 c2 39 4e 48 |...5;. h..L6.9NH| +peer0.org1.example.com | 00000030 5d b2 38 76 a9 29 2c 77 65 6e 0a 97 01 f2 f4 6e |].8v.),wen.....n| +peer0.org1.example.com | 00000040 a5 d4 7a a8 b9 d4 9e |..z....| +peer0.org1.example.com | [3272 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3273 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba7180, header 0xc003e80820 +peer0.org1.example.com | [3274 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [3275 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] processing txid: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0 +peer0.org1.example.com | [3276 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0] +peer0.org1.example.com | [3277 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3278 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][df854b7b] Entry chaincode: name:"qscc" +peer0.org1.example.com | [3279 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [327a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +peer0.org1.example.com | [327b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +peer0.org1.example.com | [327c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [327d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [327e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [327f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3280 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 gate 1602702122815814800 evaluation starts +peer0.org1.example.com | [3281 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3282 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3283 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3284 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 principal evaluation fails +peer0.org1.example.com | [3285 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 gate 1602702122815814800 evaluation fails +peer0.org1.example.com | [3286 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3548 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 principal evaluation fails +peer0.org2.example.com | [3549 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e140 gate 1602702138180134000 evaluation fails +peer0.org2.example.com | [354a 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [354b 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [354c 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [354d 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 gate 1602702138182492800 evaluation starts +peer0.org2.example.com | [354e 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [354f 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3550 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 principal matched by identity 0 +peer0.org2.example.com | [3551 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +peer0.org2.example.com | 00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +peer0.org2.example.com | [3552 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +peer0.org2.example.com | 00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +peer0.org2.example.com | 00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +peer0.org2.example.com | 00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +peer0.org2.example.com | 00000040 19 3c b2 fe e4 20 |.<... | +peer0.org2.example.com | [3553 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3554 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8e6b0 gate 1602702138182492800 evaluation succeeds +peer0.org2.example.com | [3555 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3556 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3557 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3558 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3559 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [355a 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [355b 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [355c 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer0.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer0.org2.example.com | [355d 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer0.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer0.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer0.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer0.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer0.org2.example.com | [355e 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [355f 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3560 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3561 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3562 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3563 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3564 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3565 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer0.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer0.org2.example.com | [3566 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer0.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer0.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer0.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer0.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer0.org2.example.com | [3567 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3568 10-14 19:02:18.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3569 10-14 19:02:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [356a 10-14 19:02:18.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [356b 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org2.example.com | [356c 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org1.example.com | [323c 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [323d 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [323e 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [323f 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3240 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3241 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3242 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 gate 1602702134545297300 evaluation starts +peer1.org1.example.com | [3243 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3244 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3245 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 principal matched by identity 0 +peer1.org1.example.com | [3246 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org1.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer1.org1.example.com | [3247 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer1.org1.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer1.org1.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer1.org1.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer1.org1.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer1.org1.example.com | [3248 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3249 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e83760 gate 1602702134545297300 evaluation succeeds +peer1.org1.example.com | [324a 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [324b 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [324c 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [324d 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [324e 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [324f 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3250 10-14 19:02:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3251 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer1.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer1.org1.example.com | [3252 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer1.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer1.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer1.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer1.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer1.org1.example.com | [3253 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3254 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3255 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3256 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3257 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer1.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer1.org1.example.com | [3258 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer1.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer1.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer1.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer1.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer1.org1.example.com | [3259 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [325a 10-14 19:02:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325b 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325c 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325d 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [325e 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [325f 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer1.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer1.org1.example.com | [3260 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer1.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer1.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer1.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer1.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer1.org1.example.com | [3261 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3262 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3263 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3264 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3265 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3266 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3267 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3268 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3269 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [326a 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [326b 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3287 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3288 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3289 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 gate 1602702122816546100 evaluation starts +peer0.org1.example.com | [328a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [328b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [328c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 principal matched by identity 0 +peer0.org1.example.com | [328d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 9b fe 70 46 18 c7 f5 d0 26 bb 7a 72 c9 62 3e |...pF....&.zr.b>| +peer0.org1.example.com | 00000010 20 1e dc ff c6 af 8f df 93 fd 09 9d b0 02 51 47 | .............QG| +peer0.org1.example.com | [328e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 47 c8 38 2f de f5 99 a5 80 a9 |0E.!..G.8/......| +peer0.org1.example.com | 00000010 bc 16 9f 78 e1 93 56 91 f7 78 8c dd fb d5 44 9a |...x..V..x....D.| +peer0.org1.example.com | 00000020 be f3 0b 35 3b 02 20 68 f3 a8 4c 36 c2 39 4e 48 |...5;. h..L6.9NH| +peer0.org1.example.com | 00000030 5d b2 38 76 a9 29 2c 77 65 6e 0a 97 01 f2 f4 6e |].8v.),wen.....n| +peer0.org1.example.com | 00000040 a5 d4 7a a8 b9 d4 9e |..z....| +peer0.org1.example.com | [328f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3290 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 gate 1602702122816546100 evaluation succeeds +peer0.org1.example.com | [3291 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3292 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3293 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3294 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3295 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +peer0.org1.example.com | [3296 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56677] +peer0.org1.example.com | [3297 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40889], Going to peek [8] bytes +peer0.org1.example.com | [3298 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28207], placementInfo={fileNum=[0], startOffset=[56677], bytesOffset=[56680]} +peer0.org1.example.com | [3299 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [df854b7b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [329a 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [df854b7b] notifying Txid:df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, channelID:businesschannel +peer0.org1.example.com | [329b 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [329c 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][df854b7b] Exit chaincode: name:"qscc" (6ms) +peer0.org1.example.com | [329d 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Exit +peer0.org1.example.com | [329e 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Entry chaincode: name:"qscc" +peer0.org1.example.com | [329f 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] escc for chaincode name:"qscc" is escc +peer0.org1.example.com | [32a0 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, chaincode: qscc} +peer0.org1.example.com | [32a1 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20CEC4298E3D18F84D48694F976F84...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [32a2 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3B7030D12C9F433B937FEF86033263FC5681A977CAAE2A3C7040CB362E3F4D +peer0.org1.example.com | [32a3 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, chaincode: qscc} +peer0.org1.example.com | [32a4 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Exit +peer0.org1.example.com | [32a5 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41824 +peer0.org1.example.com | [32a6 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41824 grpc.code=OK grpc.call_duration=9.8185ms +peer0.org1.example.com | [32a7 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41824: read: connection reset by peer +peer0.org1.example.com | [32a8 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [32a9 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [32aa 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32ab 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [32ac 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32ad 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32ae 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32af 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32b0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32b1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32b2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ef 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [34f0 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f1 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f2 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f3 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f4 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f5 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f6 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [34f7 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34f8 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [34f9 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [34fa 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34fb 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34fc 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34fd 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [34fe 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ff 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3500 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3501 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3502 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3503 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3504 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3505 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3506 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3507 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3508 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 gate 1602702134641010500 evaluation starts +peer1.org2.example.com | [3509 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [350a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [350b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [350c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 principal evaluation fails +peer0.org2.example.com | [356d 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer0.org2.example.com | [356e 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [356f 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3570 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3571 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3572 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3573 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3574 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3575 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3576 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3577 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3578 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3579 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [357a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [357b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [357c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [357d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [357e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [357f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 gate 1602702138246940400 evaluation starts +peer0.org2.example.com | [3580 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3581 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3582 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3583 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 principal evaluation fails +peer0.org2.example.com | [3584 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75cb0 gate 1602702138246940400 evaluation fails +peer0.org2.example.com | [3585 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3586 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3587 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3588 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 gate 1602702138247817900 evaluation starts +peer0.org2.example.com | [3589 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [358a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32b3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32b4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32b5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32b6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32b7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32b8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32b9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 gate 1602702122932037700 evaluation starts +peer0.org1.example.com | [32ba 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32bb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32bc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 principal matched by identity 0 +peer0.org1.example.com | [32bd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [32be 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [32bf 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32c0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 gate 1602702122932037700 evaluation succeeds +peer0.org1.example.com | [32c1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32c2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32c3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32c4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32c5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32c6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32c7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32c8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32c9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32ca 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32cb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32cc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 gate 1602702122933269400 evaluation starts +peer0.org1.example.com | [32cd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32ce 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32cf 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 principal matched by identity 0 +peer0.org1.example.com | [32d0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [32d1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [32d2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32d3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 gate 1602702122933269400 evaluation succeeds +peer1.org1.example.com | [326c 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 gate 1602702134563537700 evaluation starts +peer1.org1.example.com | [326d 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [326e 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [326f 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 principal matched by identity 0 +peer1.org1.example.com | [3270 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer1.org1.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer1.org1.example.com | [3271 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer1.org1.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer1.org1.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer1.org1.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer1.org1.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer1.org1.example.com | [3272 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3273 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb27f0 gate 1602702134563537700 evaluation succeeds +peer1.org1.example.com | [3274 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3275 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3276 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3277 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3278 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3279 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [327a 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [327b 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer1.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer1.org1.example.com | [327c 10-14 19:02:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer1.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer1.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer1.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer1.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer1.org1.example.com | [327d 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [327e 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [327f 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3280 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3281 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3282 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3283 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3284 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3285 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3286 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3287 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3288 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3289 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [328a 10-14 19:02:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328b 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [358b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 principal matched by identity 0 +peer0.org2.example.com | [358c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [358d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [358e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [358f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2220 gate 1602702138247817900 evaluation succeeds +peer0.org2.example.com | [3590 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3591 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3592 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3593 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3594 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3595 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3596 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3597 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3598 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3599 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [359a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [359b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 gate 1602702138248473200 evaluation starts +peer0.org2.example.com | [359c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [359d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [359e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [359f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 principal evaluation fails +peer0.org2.example.com | [35a0 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc2e10 gate 1602702138248473200 evaluation fails +peer0.org2.example.com | [35a1 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [35a2 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [35a3 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35a4 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 gate 1602702138248704400 evaluation starts +peer0.org2.example.com | [35a5 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35a6 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [35a7 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 principal matched by identity 0 +peer0.org2.example.com | [35a8 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [35a9 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [35aa 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35ab 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3380 gate 1602702138248704400 evaluation succeeds +peer0.org2.example.com | [35ac 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35ad 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35ae 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35af 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35b0 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35b1 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35b2 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35b3 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [35b4 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35b5 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35b6 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [35b7 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [35b9 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35b8 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ba 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [35bb 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [35bc 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35bd 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [35be 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35bf 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35c0 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [35c1 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c2 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35c3 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [35c4 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 gate 1602702138284781800 evaluation starts +peer0.org2.example.com | [35c5 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35c6 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [35c7 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [35c8 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 principal evaluation fails +peer0.org2.example.com | [35c9 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5a60 gate 1602702138284781800 evaluation fails +peer0.org2.example.com | [35ca 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [35cb 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [35cc 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35cd 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 gate 1602702138287260300 evaluation starts +peer0.org2.example.com | [35ce 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35cf 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [35d0 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 principal matched by identity 0 +peer0.org2.example.com | [35d1 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [35d2 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [35d3 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35d4 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da5fd0 gate 1602702138287260300 evaluation succeeds +peer0.org2.example.com | [35d5 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35d6 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35d7 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35d8 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35d9 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35da 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [35db 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35dc 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [35dd 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [35de 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org2.example.com | [350d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d2150 gate 1602702134641010500 evaluation fails +peer1.org2.example.com | [350e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [350f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3510 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3511 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 gate 1602702134641294500 evaluation starts +peer1.org2.example.com | [3512 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3513 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3514 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 principal matched by identity 0 +peer1.org2.example.com | [3515 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer1.org2.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer1.org2.example.com | [3516 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer1.org2.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer1.org2.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer1.org2.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer1.org2.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer1.org2.example.com | [3517 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3518 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d26c0 gate 1602702134641294500 evaluation succeeds +peer1.org2.example.com | [3519 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [351a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [351b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [351c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [351d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [351e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [351f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3520 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3521 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3522 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3523 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3524 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3525 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3526 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3527 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3528 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3529 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" > alive: +peer1.org2.example.com | [352a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [352b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [352c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [352d 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [352e 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [352f 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3530 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3531 10-14 19:02:14.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3532 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3533 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3534 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3535 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3536 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3537 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3538 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3539 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [353a 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [353b 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [353c 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [353d 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [353e 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [353f 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3540 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3541 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3542 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3543 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3544 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3545 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3546 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 gate 1602702134916358700 evaluation starts +peer1.org2.example.com | [3547 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3548 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3549 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [354a 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 principal evaluation fails +peer1.org2.example.com | [354b 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fc680 gate 1602702134916358700 evaluation fails +peer1.org2.example.com | [354c 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [354d 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [354e 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [354f 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 gate 1602702134917546700 evaluation starts +peer0.org2.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer0.org2.example.com | [35df 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer0.org2.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer0.org2.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer0.org2.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer0.org2.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer0.org2.example.com | [35e0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [35e1 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 b1 c3 b4 54 dc 65 d2 0f dd ed 78 |0D. )...T.e....x| +peer0.org2.example.com | 00000010 8a 39 c8 4b 12 81 9a 3c 4f 83 8d 6b 0a d2 fa 20 |.9.K...,.?:7.q..B.+.| +peer0.org2.example.com | 00000040 87 46 11 e2 09 77 |.F...w| +peer0.org2.example.com | [35e2 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [35e3 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [35e4 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [35e5 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [35e6 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [35e7 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35e8 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35e9 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [35ea 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35eb 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ec 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35ed 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > alive: +peer0.org2.example.com | [35ee 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ef 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f1 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [35f2 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [35f3 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [35f4 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f5 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f6 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f7 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f8 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35f9 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [328c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [328d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [328f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3290 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer1.org1.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer1.org1.example.com | [3291 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer1.org1.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer1.org1.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer1.org1.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer1.org1.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer1.org1.example.com | [3292 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3293 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 27 7c 94 2e 63 38 23 34 2d 55 68 |0D. &'|..c8#4-Uh| +peer1.org1.example.com | 00000010 72 d8 9e ac 27 48 86 9a c3 5a 04 78 34 84 a1 08 |r...'H...Z.x4...| +peer1.org1.example.com | 00000020 66 75 b8 3e 02 20 77 25 70 f6 db 1d 9f ab 08 15 |fu.>. w%p.......| +peer1.org1.example.com | 00000030 82 21 16 d2 cd 0c ab cf 03 2c 7a f2 ba b4 26 65 |.!.......,z...&e| +peer1.org1.example.com | 00000040 66 c5 e6 6b d3 33 |f..k.3| +peer1.org1.example.com | [3294 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3295 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3296 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3297 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3298 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3299 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329a 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329b 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [329c 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [329d 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3550 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3551 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3552 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3553 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 principal matched by identity 0 +peer1.org2.example.com | [3554 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [3555 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [3556 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3557 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fcbf0 gate 1602702134917546700 evaluation succeeds +peer1.org2.example.com | [3558 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3559 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [355a 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [355b 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [355c 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [355d 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [355e 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [355f 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3560 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3561 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3562 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3563 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3564 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 gate 1602702134919195000 evaluation starts +peer1.org2.example.com | [3565 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3566 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3567 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3568 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 principal evaluation fails +peer1.org2.example.com | [3569 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fddf0 gate 1602702134919195000 evaluation fails +peer1.org2.example.com | [356a 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [356b 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [356c 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [356d 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 gate 1602702134919922900 evaluation starts +peer1.org2.example.com | [356e 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [356f 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3570 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 principal matched by identity 0 +peer1.org2.example.com | [3571 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [3572 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org2.example.com | [35fa 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [35fb 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35fc 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fd 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [35fe 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ff 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3600 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3601 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3602 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [329e 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [329f 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [32a0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > alive: +peer1.org1.example.com | [32a1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [32a2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a3 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32a4 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a5 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a6 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a7 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32d4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32d5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32d6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32d7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32d8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32d9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32da 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32db 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32dc 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32dd 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32de 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32df 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32e0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32e1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 gate 1602702122947694200 evaluation starts +peer0.org1.example.com | [32e2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32e3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32e4 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 principal matched by identity 0 +peer0.org1.example.com | [32e5 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [32e6 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [32e7 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32e8 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 gate 1602702122947694200 evaluation succeeds +peer0.org1.example.com | [32e9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32ea 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32eb 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32ec 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32ed 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32ee 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32ef 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32f0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [3573 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3574 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003514360 gate 1602702134919922900 evaluation succeeds +peer1.org2.example.com | [3575 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3576 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3577 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3578 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3579 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [357a 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [357b 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [357c 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [357d 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [357e 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [357f 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3580 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3581 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3582 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3583 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3584 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3585 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3586 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3587 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3588 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 gate 1602702134922007200 evaluation starts +peer1.org2.example.com | [3589 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [358a 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [358b 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [358c 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 principal evaluation fails +peer1.org2.example.com | [358d 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352a590 gate 1602702134922007200 evaluation fails +peer1.org2.example.com | [358e 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [358f 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3590 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3603 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3604 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3605 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3606 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3607 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3608 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 gate 1602702138492712400 evaluation starts +peer0.org2.example.com | [3609 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [360a 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [360b 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [360c 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 principal evaluation fails +peer0.org2.example.com | [360d 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e388e0 gate 1602702138492712400 evaluation fails +peer0.org2.example.com | [360e 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [360f 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3610 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3611 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 gate 1602702138495894900 evaluation starts +peer0.org2.example.com | [3612 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3613 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3614 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 principal matched by identity 0 +peer0.org2.example.com | [3615 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer0.org2.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer0.org2.example.com | [3616 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer0.org2.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer0.org2.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer0.org2.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer0.org2.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer0.org2.example.com | [3617 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3618 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38e50 gate 1602702138495894900 evaluation succeeds +peer0.org2.example.com | [3619 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [361a 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [361b 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [361c 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [361d 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [361e 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [361f 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3620 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3621 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3622 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3623 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3624 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3625 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3626 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3627 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3628 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3629 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3591 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 gate 1602702134922261900 evaluation starts +peer1.org2.example.com | [3592 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3593 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3594 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 principal matched by identity 0 +peer1.org2.example.com | [3595 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [3596 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [3597 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3598 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352ab00 gate 1602702134922261900 evaluation succeeds +peer1.org2.example.com | [3599 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [359a 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [359b 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [359c 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [359d 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [359e 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [359f 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35a0 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35a1 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35a2 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35a3 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35a4 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [35a5 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 gate 1602702134924189700 evaluation starts +peer1.org2.example.com | [35a6 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35a7 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35a8 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [35a9 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 principal evaluation fails +peer1.org2.example.com | [35aa 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352bd00 gate 1602702134924189700 evaluation fails +peer1.org2.example.com | [35ab 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35ac 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35ad 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35ae 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 gate 1602702134924431800 evaluation starts +peer1.org2.example.com | [35af 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35b0 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35b1 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 principal matched by identity 0 +peer1.org2.example.com | [35b2 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [35b3 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | [32a8 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32a9 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32aa 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32ab 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32ac 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [32ad 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32ae 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32af 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32b0 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32b1 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [32b2 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32b3 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32b4 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 gate 1602702135156231800 evaluation starts +peer1.org1.example.com | [32b5 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32b6 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [32b7 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 principal matched by identity 0 +peer1.org1.example.com | [32b8 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 82 54 dd a3 45 86 1d 4f f3 56 2e eb 28 87 aa |S.T..E..O.V..(..| +peer1.org1.example.com | 00000010 92 cc 18 d7 a4 1d f1 a6 7c e5 1e c2 76 42 3b 86 |........|...vB;.| +peer1.org1.example.com | [32b9 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 bb 34 42 61 48 0e fd 06 c9 cf |0E.!...4BaH.....| +peer1.org1.example.com | 00000010 b8 c9 59 3c 07 5a 2e 18 2c c8 ce c7 b2 26 88 eb |..Y<.Z..,....&..| +peer1.org1.example.com | 00000020 20 e0 53 80 61 02 20 21 f1 84 0b 8c 2e 63 df 4e | .S.a. !.....c.N| +peer1.org1.example.com | 00000030 d4 40 a4 45 c5 f8 9d bf 83 62 ee c3 92 33 ec e8 |.@.E.....b...3..| +peer1.org1.example.com | 00000040 e7 85 99 c8 97 03 d4 |.......| +peer1.org1.example.com | [32ba 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32bb 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efebe0 gate 1602702135156231800 evaluation succeeds +peer1.org1.example.com | [32bc 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32bd 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32be 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [32bf 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32c0 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32c1 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [32c2 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [32c3 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [32c4 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [32c5 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32c6 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32c7 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32c8 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32c9 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32ca 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32cb 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32cc 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32cd 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32ce 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32cf 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32d0 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32d1 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d2 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32d3 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d4 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [32d5 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32d6 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [32d7 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32d8 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32d9 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32da 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32db 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32dc 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32dd 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32de 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32df 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32e0 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32e1 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32e2 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [32e3 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [35b4 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35b5 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003540270 gate 1602702134924431800 evaluation succeeds +peer1.org2.example.com | [35b6 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35b7 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35b8 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35b9 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35ba 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [35bb 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [35bc 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [35bd 10-14 19:02:14.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [35be 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35bf 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [35c0 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35c1 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35c2 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35c3 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35c4 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35c5 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35c6 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35c7 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [35c8 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 gate 1602702134933216800 evaluation starts +peer1.org2.example.com | [35c9 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35ca 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35cb 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [35cc 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 principal evaluation fails +peer1.org2.example.com | [35cd 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035543f0 gate 1602702134933216800 evaluation fails +peer1.org2.example.com | [35ce 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35cf 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32f1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32f2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32f3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32f4 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32f5 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32f6 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32f7 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 gate 1602702122953923100 evaluation starts +peer0.org1.example.com | [32f8 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32f9 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [32fa 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 principal matched by identity 0 +peer0.org1.example.com | [32fb 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [32fc 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [32fd 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32fe 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 gate 1602702122953923100 evaluation succeeds +peer0.org1.example.com | [32ff 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3300 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3301 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3302 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3303 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3304 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3305 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3306 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3307 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [3308 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3309 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [330a 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [330b 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [330c 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [330d 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [330e 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41828 +peer1.org1.example.com | [32e4 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32e5 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32e6 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32e7 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [32e8 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32e9 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32ea 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 gate 1602702135240014300 evaluation starts +peer1.org1.example.com | [32eb 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32ec 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [32ed 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 principal matched by identity 0 +peer1.org1.example.com | [32ee 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 2c ae 75 56 83 98 80 d0 bb d1 b4 0a 55 59 d7 |1,.uV........UY.| +peer1.org1.example.com | 00000010 bd b1 41 b1 d0 62 c7 69 a3 41 f9 a2 1e 9d 82 93 |..A..b.i.A......| +peer1.org1.example.com | [32ef 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 98 ed b9 86 ae e1 66 89 52 03 |0E.!........f.R.| +peer1.org1.example.com | 00000010 de 32 8e 15 87 10 7c 65 c2 7c eb f0 a2 8c 50 6b |.2....|e.|....Pk| +peer1.org1.example.com | 00000020 d9 4c ad 94 3e 02 20 07 b7 a5 a9 93 25 1b c9 41 |.L..>. .....%..A| +peer1.org1.example.com | 00000030 b8 15 62 46 e8 44 12 a5 b0 f1 8f 59 3e f7 ad d6 |..bF.D.....Y>...| +peer1.org1.example.com | 00000040 4f 69 f0 8d 3b d0 aa |Oi..;..| +peer1.org1.example.com | [32f0 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32f1 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28f20 gate 1602702135240014300 evaluation succeeds +peer1.org1.example.com | [32f2 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32f3 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32f4 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [32f5 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32f6 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32f7 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [32f8 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [32f9 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [32fa 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [32fb 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32fc 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32fd 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32fe 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [32ff 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3300 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d0 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35d1 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 gate 1602702134933497400 evaluation starts +peer1.org2.example.com | [35d2 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35d3 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35d4 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 principal matched by identity 0 +peer1.org2.example.com | [35d5 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [35d6 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [35d7 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35d8 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554960 gate 1602702134933497400 evaluation succeeds +peer1.org2.example.com | [35d9 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35da 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35db 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35dc 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35dd 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35de 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35df 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35e0 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35e1 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35e2 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35e3 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35e4 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [35e5 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 gate 1602702134934350300 evaluation starts +peer1.org2.example.com | [35e6 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35e7 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35e8 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [35e9 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 principal evaluation fails +peer1.org2.example.com | [35ea 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555b60 gate 1602702134934350300 evaluation fails +peer1.org2.example.com | [35eb 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35ec 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35ed 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35ee 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 gate 1602702134934598600 evaluation starts +peer1.org2.example.com | [35ef 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35f0 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [35f1 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 principal matched by identity 0 +peer1.org2.example.com | [35f2 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [35f3 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [35f4 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35f5 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035700d0 gate 1602702134934598600 evaluation succeeds +peer1.org2.example.com | [35f6 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35f7 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35f8 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35f9 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35fa 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [35fb 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [35fc 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [35fd 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [35fe 10-14 19:02:14.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ff 10-14 19:02:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3600 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3601 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3602 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3603 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3604 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3605 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3606 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3607 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3608 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3609 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [360a 10-14 19:02:14.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [360b 10-14 19:02:15.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [360c 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [360d 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [360e 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [360f 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3610 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 82 54 dd a3 45 86 1d 4f f3 56 2e eb 28 87 aa |S.T..E..O.V..(..| +peer1.org2.example.com | 00000010 92 cc 18 d7 a4 1d f1 a6 7c e5 1e c2 76 42 3b 86 |........|...vB;.| +peer1.org2.example.com | [3611 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 bb 34 42 61 48 0e fd 06 c9 cf |0E.!...4BaH.....| +peer1.org2.example.com | 00000010 b8 c9 59 3c 07 5a 2e 18 2c c8 ce c7 b2 26 88 eb |..Y<.Z..,....&..| +peer1.org2.example.com | 00000020 20 e0 53 80 61 02 20 21 f1 84 0b 8c 2e 63 df 4e | .S.a. !.....c.N| +peer1.org2.example.com | 00000030 d4 40 a4 45 c5 f8 9d bf 83 62 ee c3 92 33 ec e8 |.@.E.....b...3..| +peer1.org2.example.com | 00000040 e7 85 99 c8 97 03 d4 |.......| +peer1.org2.example.com | [3612 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [3301 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3302 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3303 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3304 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3305 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3306 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3307 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3308 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3309 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [330a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [330b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [330c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [330d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [330e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [330f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3310 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3311 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3312 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3313 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3314 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3315 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3316 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3317 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161033 +peer1.org1.example.com | [3318 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47F753CB14257BA3A76B37E819A1A393BEFB114B9878F7E6FB1B9FB1A61B68B2 +peer1.org1.example.com | [3319 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [331a 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [331b 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [331c 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [331d 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [331e 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [331f 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3320 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3321 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3322 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3323 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3324 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3325 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3326 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3327 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3328 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [362a 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > alive: alive: +peer0.org2.example.com | [362b 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [362c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [362d 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [362e 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [362f 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3630 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3631 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3632 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3633 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3634 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3635 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3636 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3637 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3638 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3639 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [363a 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [363c 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [363d 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [363e 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3640 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [363f 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3641 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3642 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [363b 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408E0CCCDAC8DA1FC9E16...08071A0C0A0565787030321203312E30 +peer0.org2.example.com | [3643 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F7FD67794AC9AAFC9D1A2F2704809036327F598D24D9D6167C09B58B25901B2A +peer0.org2.example.com | [3644 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3645 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3646 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [3647 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [3648 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [3649 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [364a 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [364b 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [364c 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [330f 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f434a0 +peer0.org1.example.com | [3310 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3311 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3312 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3313 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3314 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3315 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 f3 9e 8c 57 7f 0b 92 96 74 19 90 a4 10 61 |.X...W....t....a| +peer0.org1.example.com | 00000010 04 4f 9e 33 77 d7 0c a2 74 7d 9a a4 f4 08 08 5f |.O.3w...t}....._| +peer0.org1.example.com | [3316 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ec 24 98 22 d6 3a a7 1d 68 cf |0E.!...$.".:..h.| +peer0.org1.example.com | 00000010 36 94 46 da 67 ff c9 a2 60 e7 da 5b 21 5b d3 c1 |6.F.g...`..[![..| +peer0.org1.example.com | 00000020 e2 3c 4d b7 a4 02 20 22 67 dd c2 ce f0 e9 30 6c |./.O`| +peer0.org1.example.com | [3317 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3318 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba7b90, header 0xc003f438b0 +peer0.org1.example.com | [3319 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [331a 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] processing txid: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9 +peer0.org1.example.com | [331b 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9] +peer0.org1.example.com | [331c 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +peer0.org1.example.com | [331d 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +peer0.org1.example.com | [331e 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [331f 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +peer0.org1.example.com | [3320 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +peer0.org1.example.com | [3321 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [3322 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3323 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3324 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3325 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 gate 1602702123228929300 evaluation starts +peer0.org1.example.com | [3326 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3327 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3328 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3329 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 principal evaluation fails +peer0.org1.example.com | [332a 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 gate 1602702123228929300 evaluation fails +peer0.org1.example.com | [332b 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [332c 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [332d 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [332e 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 gate 1602702123230237400 evaluation starts +peer0.org1.example.com | [332f 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3330 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3331 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 principal matched by identity 0 +peer0.org1.example.com | [3332 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 f3 9e 8c 57 7f 0b 92 96 74 19 90 a4 10 61 |.X...W....t....a| +peer0.org1.example.com | 00000010 04 4f 9e 33 77 d7 0c a2 74 7d 9a a4 f4 08 08 5f |.O.3w...t}....._| +peer0.org1.example.com | [3333 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ec 24 98 22 d6 3a a7 1d 68 cf |0E.!...$.".:..h.| +peer0.org1.example.com | 00000010 36 94 46 da 67 ff c9 a2 60 e7 da 5b 21 5b d3 c1 |6.F.g...`..[![..| +peer0.org1.example.com | 00000020 e2 3c 4d b7 a4 02 20 22 67 dd c2 ce f0 e9 30 6c |./.O`| +peer0.org1.example.com | [3334 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3335 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 gate 1602702123230237400 evaluation succeeds +peer0.org1.example.com | [3336 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3337 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3338 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3339 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [333a 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [19e4f3ec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [333b 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [19e4f3ec] notifying Txid:19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, channelID:businesschannel +peer0.org1.example.com | [333c 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [333d 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][19e4f3ec] Exit chaincode: name:"cscc" (5ms) +peer0.org1.example.com | [333e 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Exit +peer0.org1.example.com | [333f 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3340 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] escc for chaincode name:"cscc" is escc +peer0.org1.example.com | [3341 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, chaincode: cscc} +peer0.org1.example.com | [3342 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209B13B827CE682E953E823537732C...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3343 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DBD7C2AA459050B6276F2DDB664FB3CA96E64BA2CED4B336B0A91C0E24CBC37D +peer0.org1.example.com | [3344 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, chaincode: cscc} +peer0.org1.example.com | [3345 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Exit +peer0.org1.example.com | [3346 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41828 +peer0.org1.example.com | [3347 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41828 grpc.code=OK grpc.call_duration=10.5658ms +peer0.org1.example.com | [3348 10-14 19:02:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3349 10-14 19:02:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [334a 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [334b 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 99 e5 16 c0 b6 a7 30 ba e0 7b 03 fa 77 ff b6 |.......0..{..w..| +peer0.org1.example.com | 00000010 d4 6d 1a a0 97 92 d4 a5 a8 e1 df 87 f9 36 1f 65 |.m...........6.e| +peer0.org1.example.com | [334c 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 17 cd 66 f8 52 61 da 42 08 ff |0E.!....f.Ra.B..| +peer0.org1.example.com | 00000010 06 ec 70 dd b3 6d 90 37 85 5c c4 50 cc 2c 03 93 |..p..m.7.\.P.,..| +peer0.org1.example.com | 00000020 96 30 c3 ae b8 02 20 44 e8 6d 2c fa c0 f6 d7 1f |.0.... D.m,.....| +peer0.org1.example.com | 00000030 44 33 90 9b 20 9e 47 1c 6c f4 80 7d c9 ce 50 44 |D3.. .G.l..}..PD| +peer0.org1.example.com | 00000040 4f 16 ae 81 4c 33 18 |O...L3.| +peer0.org1.example.com | [334d 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [334e 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [334f 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3350 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [3351 10-14 19:02:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [3352 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41832 +peer0.org1.example.com | [3353 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00401c4b0 +peer0.org1.example.com | [3354 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [3355 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3356 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3357 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [3358 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3359 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 84 4d 4f d0 64 75 23 7a 02 e5 cf 4d 63 66 3c |~.MO.du#z...Mcf<| +peer0.org1.example.com | 00000010 7d bc fd e0 e1 f5 54 ec ba 6f b6 98 06 02 92 ba |}.....T..o......| +peer0.org1.example.com | [335a 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 8a 65 88 88 37 f0 70 af e4 1b |0E.!...e..7.p...| +peer0.org1.example.com | 00000010 d4 fe f0 0b c0 08 1f 51 66 0a 5b c8 5e 39 59 ed |.......Qf.[.^9Y.| +peer0.org1.example.com | 00000020 08 16 ca 30 89 02 20 5b 29 8f 13 bd 4d 7e 22 3b |...0.. [)...M~";| +peer0.org1.example.com | 00000030 b1 52 df c0 59 1d 0a 15 2b a5 ed 45 c4 cc 27 45 |.R..Y...+..E..'E| +peer0.org1.example.com | 00000040 2d 32 d2 e7 2d 66 87 |-2..-f.| +peer0.org1.example.com | [335b 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [335c 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b33570, header 0xc00401c8c0 +peer0.org1.example.com | [335d 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [335e 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] processing txid: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f +peer0.org1.example.com | [335f 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f] +peer0.org1.example.com | [3360 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3361 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][797d8626] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3362 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3363 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [3364 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 84 4d 4f d0 64 75 23 7a 02 e5 cf 4d 63 66 3c |~.MO.du#z...Mcf<| +peer0.org1.example.com | 00000010 7d bc fd e0 e1 f5 54 ec ba 6f b6 98 06 02 92 ba |}.....T..o......| +peer0.org1.example.com | [3365 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 8a 65 88 88 37 f0 70 af e4 1b |0E.!...e..7.p...| +peer0.org1.example.com | 00000010 d4 fe f0 0b c0 08 1f 51 66 0a 5b c8 5e 39 59 ed |.......Qf.[.^9Y.| +peer0.org1.example.com | 00000020 08 16 ca 30 89 02 20 5b 29 8f 13 bd 4d 7e 22 3b |...0.. [)...M~";| +peer0.org1.example.com | 00000030 b1 52 df c0 59 1d 0a 15 2b a5 ed 45 c4 cc 27 45 |.R..Y...+..E..'E| +peer0.org1.example.com | 00000040 2d 32 d2 e7 2d 66 87 |-2..-f.| +peer0.org1.example.com | [3366 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [797d8626] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3367 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [797d8626] notifying Txid:797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, channelID:businesschannel +peer0.org1.example.com | [3368 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3369 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][797d8626] Exit chaincode: name:"cscc" (2ms) +peer0.org1.example.com | [336a 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Exit +peer0.org1.example.com | [336b 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Entry chaincode: name:"cscc" +peer0.org1.example.com | [336c 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] escc for chaincode name:"cscc" is escc +peer1.org1.example.com | [3329 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [332a 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [332b 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [332c 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [332d 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [332e 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [332f 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 aa e7 d4 8d fd e7 8a 71 30 8e 0c 0b 4f e7 ed |........q0...O..| +peer1.org1.example.com | 00000010 4e 79 75 e7 05 8d 85 20 8f 3b f5 cc c1 b2 aa fb |Nyu.... .;......| +peer1.org1.example.com | [3330 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 12 12 8a 55 db f8 a3 d3 a6 08 c0 |0D. ...U.......| +peer1.org1.example.com | 00000010 52 54 05 bd ff a3 a0 44 da 0f f2 e6 1f 62 ca 15 |RT.....D.....b..| +peer1.org1.example.com | 00000020 e5 14 28 45 02 20 09 c3 78 d3 9e e8 f5 c5 0b 14 |..(E. ..x.......| +peer1.org1.example.com | 00000030 66 41 1a a9 b5 06 31 9d 93 27 f1 d3 2e 1a 12 30 |fA....1..'.....0| +peer1.org1.example.com | 00000040 1f a6 ab 66 96 d8 |...f..| +peer1.org1.example.com | [3331 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3332 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3333 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3334 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3335 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3336 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3337 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3338 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3339 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333a 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333b 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333c 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [333d 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333e 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [333f 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3340 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3341 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3342 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3343 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3344 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3345 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3346 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3347 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [336d 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, chaincode: cscc} +peer0.org1.example.com | [336e 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20BEE8ADF2FF752E4D6566B16C3A19...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [336f 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF99719379F896B3059FDE13B273656F210D7FE4429DC9A7D2DC2315CA8BEB92 +peer0.org1.example.com | [3370 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, chaincode: cscc} +peer0.org1.example.com | [3371 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Exit +peer0.org1.example.com | [3372 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41832 +peer0.org1.example.com | [3373 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41832 grpc.code=OK grpc.call_duration=6.8033ms +peer0.org1.example.com | [3375 10-14 19:02:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3374 10-14 19:02:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3376 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3377 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3378 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3379 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [337a 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [337b 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [337c 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [337d 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [337e 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [337f 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3380 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3381 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3382 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 gate 1602702125138986900 evaluation starts +peer0.org1.example.com | [3383 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3384 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3385 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 principal matched by identity 0 +peer0.org1.example.com | [3386 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 6b 36 9b 71 2f 1b 65 7a 2b f4 d6 38 6b 23 dc |nk6.q/.ez+..8k#.| +peer0.org1.example.com | 00000010 46 a8 8a 9e a4 86 45 19 f4 31 ff 20 67 93 1f b5 |F.....E..1. g...| +peer0.org1.example.com | [3387 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e ae 66 be f3 57 67 41 9f dc |0E.!..n.f..WgA..| +peer0.org1.example.com | 00000010 db 1e 45 ea 52 e6 03 4c 95 81 b9 f4 9c b5 e5 78 |..E.R..L.......x| +peer0.org1.example.com | 00000020 b1 c8 8c a5 82 02 20 7c 38 52 21 70 4b 1b aa 76 |...... |8R!pK..v| +peer0.org1.example.com | 00000030 70 98 64 6b e6 4a 2b e5 1b 35 6d bc 68 ab 50 e0 |p.dk.J+..5m.h.P.| +peer0.org1.example.com | 00000040 63 8c 10 5b 2e ac aa |c..[...| +peer0.org1.example.com | [3388 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [338a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 gate 1602702125138986900 evaluation succeeds +peer0.org1.example.com | [338b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3613 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 07 31 5b 8f 3a 4f 8b 74 1a e6 |0E.!...1[.:O.t..| +peer0.org2.example.com | [364d 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [364e 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [364f 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3650 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3651 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3652 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3653 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 gate 1602702138565409800 evaluation starts +peer0.org2.example.com | [3655 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3656 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3657 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3658 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 principal evaluation fails +peer0.org2.example.com | [3659 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e827d0 gate 1602702138565409800 evaluation fails +peer0.org2.example.com | [365a 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [365b 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [365c 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [365d 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 gate 1602702138567422100 evaluation starts +peer0.org2.example.com | [365e 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [365f 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3660 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 principal matched by identity 0 +peer0.org2.example.com | [3661 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3662 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3663 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3664 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e82e00 gate 1602702138567422100 evaluation succeeds +peer0.org2.example.com | [3665 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3654 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3666 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3668 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3669 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [366a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3667 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3348 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3349 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [334a 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [334b 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [334c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [334d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [334e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [334f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3350 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [3351 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 gate 1602702136413145000 evaluation starts +peer1.org1.example.com | [3352 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3353 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3354 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 principal matched by identity 0 +peer1.org1.example.com | [3355 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 50 1f 2e e7 76 f5 a9 11 7a fe a4 7e f4 c7 a9 |.P...v...z..~...| +peer1.org1.example.com | 00000010 f1 58 d6 02 80 14 cd 2e 63 80 da f9 b5 af 7b 79 |.X......c.....{y| +peer1.org1.example.com | [3356 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 46 c6 88 8d e7 a1 94 8b ef 79 |0E.!..F........y| +peer1.org1.example.com | 00000010 56 b0 df 5f af f1 64 26 2d 54 98 d1 74 bc 02 dd |V.._..d&-T..t...| +peer1.org1.example.com | 00000020 f2 01 49 9e f2 02 20 72 4e df 95 74 87 86 7e 1f |..I... rN..t..~.| +peer1.org1.example.com | 00000030 af e7 75 b3 66 23 d2 1c 9b 78 0b ac a8 25 74 d8 |..u.f#...x...%t.| +peer1.org1.example.com | 00000040 c4 e8 8f bf dc 56 9c |.....V.| +peer1.org1.example.com | [3357 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3358 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f907a0 gate 1602702136413145000 evaluation succeeds +peer1.org1.example.com | [3359 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [335a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [335b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [335c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [335d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [335e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [335f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [3360 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org1.example.com | [3361 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org1.example.com | [3362 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [3363 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org1.example.com | [3364 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org1.example.com | [3365 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [3366 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0035ddc40 env 0xc003ec34f0 txn 0 +peer1.org1.example.com | [3367 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003ec34f0 +peer1.org1.example.com | [3368 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer1.org1.example.com | [3369 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [336a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [336b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [336c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [336d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | [338c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [338d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [338e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [338f 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3390 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3391 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3392 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3393 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3394 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3395 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3396 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3389 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3397 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3398 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3399 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [339a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [339b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [339c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [339d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [339e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [339f 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a0 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a1 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a2 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a3 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a4 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a5 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [33a6 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a7 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a8 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [33a9 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33aa 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ab 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33ac 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ad 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 ec ca 33 64 a0 17 43 02 ab bd 30 ed d4 f5 8c 62 |..3d..C...0....b| +peer1.org2.example.com | 00000020 e4 c0 12 b2 0a 02 20 7c 2d 0c e2 72 83 2d fd 69 |...... |-..r.-.i| +peer1.org2.example.com | 00000030 f0 e4 e5 6a 7b 0e e1 a8 23 b2 48 1e 59 c5 0a 74 |...j{...#.H.Y..t| +peer1.org2.example.com | 00000040 cb 6a 06 13 81 c9 f0 |.j.....| +peer1.org2.example.com | [3614 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3615 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [3616 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3617 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3618 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3619 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [361a 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [361b 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [361c 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [361d 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [361e 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [361f 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3620 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3621 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3622 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3623 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3624 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3626 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3625 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3627 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3628 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3629 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [362a 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [362b 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [362c 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [362d 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [362e 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [362f 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3630 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16102C +peer1.org2.example.com | [3631 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 312CAE7556839880D0BBD1B40A5559D7BDB141B1D062C769A341F9A21E9D8293 +peer1.org2.example.com | [3632 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3633 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3634 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [366b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [366c 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366e 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366d 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366f 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3670 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3671 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3672 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3673 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3674 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3675 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3676 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 gate 1602702138572290000 evaluation starts +peer0.org2.example.com | [3677 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3678 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3679 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [367b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [367c 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367d 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 principal evaluation fails +peer0.org2.example.com | [367e 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea6120 gate 1602702138572290000 evaluation fails +peer0.org2.example.com | [367f 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3680 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3681 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3682 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3683 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3684 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 gate 1602702138587234500 evaluation starts +peer0.org2.example.com | [3685 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3686 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3687 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 principal matched by identity 0 +peer0.org2.example.com | [3688 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [336e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [336f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [3370 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [3371 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3372 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +peer1.org1.example.com | 00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.| +peer1.org1.example.com | [3373 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +peer1.org1.example.com | 00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +peer1.org1.example.com | 00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +peer1.org1.example.com | 00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +peer1.org1.example.com | 00000040 4d 58 92 4e a4 4a df |MX.N.J.| +peer1.org1.example.com | [3374 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3375 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc00400c000, header channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer1.org1.example.com | [3376 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [3377 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [3378 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [3379 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [337a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [337b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [337c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [337d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [337e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [337f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [3380 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [3381 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [3382 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [3383 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [3384 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [3385 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [3386 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [3387 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [3388 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [3389 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [338a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [338b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [338c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [338d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [338e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [338f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [3390 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [3391 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [3392 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [3393 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org1.example.com | [3394 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org1.example.com | [3395 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org1.example.com | [3396 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3397 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3398 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [3399 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [339a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [339b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [339c 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [339d 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3635 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3636 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3637 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3638 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3639 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [363a 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [363b 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [363c 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [363d 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [363e 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [363f 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3640 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3641 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3642 10-14 19:02:15.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3643 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3644 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3645 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3646 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3647 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3648 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3649 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [364a 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [364b 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [364c 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [364d 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [364e 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [364f 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 gate 1602702135407478200 evaluation starts +peer1.org2.example.com | [3650 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3651 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3652 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3653 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 principal evaluation fails +peer1.org2.example.com | [3654 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7230 gate 1602702135407478200 evaluation fails +peer1.org2.example.com | [3655 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3656 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3657 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3658 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 gate 1602702135407722000 evaluation starts +peer1.org2.example.com | [3659 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [365a 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [365b 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 principal matched by identity 0 +peer1.org2.example.com | [365c 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 f7 53 cb 14 25 7b a3 a7 6b 37 e8 19 a1 a3 93 |G.S..%{..k7.....| +peer1.org2.example.com | 00000010 be fb 11 4b 98 78 f7 e6 fb 1b 9f b1 a6 1b 68 b2 |...K.x........h.| +peer1.org2.example.com | [365d 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 e6 ae b2 bb 9b ff db 19 46 8c |0E.!..........F.| +peer1.org2.example.com | 00000010 eb 5a ee de 03 6c 24 3f 8d 92 59 67 37 a6 d6 9e |.Z...l$?..Yg7...| +peer1.org2.example.com | 00000020 1a 97 ee c5 1c 02 20 20 4f c5 9d 88 70 dc 47 ca |...... O...p.G.| +peer1.org2.example.com | 00000030 c6 9b cf 6d 80 2d da f9 e0 29 f5 67 2a 43 fc ee |...m.-...).g*C..| +peer1.org2.example.com | 00000040 95 27 a7 29 f9 e3 a7 |.'.)...| +peer1.org2.example.com | [365e 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [365f 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b77a0 gate 1602702135407722000 evaluation succeeds +peer1.org2.example.com | [3660 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3661 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3662 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3663 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3664 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3665 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3666 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3667 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3668 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3669 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [366d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [366e 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [366f 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3670 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3671 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3672 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3673 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3674 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3675 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3676 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3677 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3678 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33ae 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33af 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33b0 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [33b1 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33b2 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [33b3 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33b4 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33b5 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [33b6 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [33b7 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [33b8 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 gate 1602702125241123200 evaluation starts +peer0.org1.example.com | [33b9 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33ba 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [33bb 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 principal matched by identity 0 +peer0.org1.example.com | [33bc 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 1d 94 e2 48 42 c2 93 2c df 23 85 5e d7 83 03 |....HB..,.#.^...| +peer0.org1.example.com | 00000010 ac b7 05 c8 b6 46 0d d2 75 70 31 72 2d a8 2e 4e |.....F..up1r-..N| +peer0.org1.example.com | [33bd 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 42 f8 aa e1 63 7f d3 62 e1 a2 |0E.!..B...c..b..| +peer0.org1.example.com | 00000010 6d 3b 0c 6d 74 33 cc 8d a9 6a dd 8d f3 cf be 39 |m;.mt3...j.....9| +peer0.org1.example.com | 00000020 29 ea 13 6a cb 02 20 7b 32 eb 95 30 bc 09 72 d1 |)..j.. {2..0..r.| +peer0.org1.example.com | 00000030 2e e5 0d 3c fa 39 33 12 b2 8c 41 47 13 8f 52 c3 |...<.93...AG..R.| +peer0.org1.example.com | 00000040 72 f5 d9 a6 fa f4 d5 |r......| +peer0.org1.example.com | [33be 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [33bf 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 gate 1602702125241123200 evaluation succeeds +peer0.org1.example.com | [33c0 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33c1 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33c2 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [33c3 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [33c4 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33c5 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33c6 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c7 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33c8 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [33c9 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [33ca 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [33cb 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [33cc 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33cd 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ce 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33cf 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33d1 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d0 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d2 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33d3 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d4 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33d5 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d6 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33d7 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33d8 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33d9 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33da 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33db 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33dc 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [33dd 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33de 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33df 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [33e0 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33e1 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e2 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33e3 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e4 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33e5 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e6 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33e7 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [33e8 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 64 a2 b3 bc d2 13 51 a9 fc fb a5 d7 d2 30 9d |.d.....Q......0.| +peer0.org1.example.com | 00000010 b6 6c 21 97 6d 75 3a fa 54 ac 47 87 cf c6 42 e1 |.l!.mu:.T.G...B.| +peer0.org1.example.com | [33e9 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 17 37 fb 44 6e 58 59 96 f5 fb e2 |0D. 0.7.DnXY....| +peer0.org1.example.com | 00000010 8a ed 02 27 14 24 b9 29 41 14 36 8f 79 48 7a 48 |...'.$.)A.6.yHzH| +peer0.org1.example.com | 00000020 a4 a7 eb 25 02 20 49 51 26 17 90 4a 3d 68 e1 70 |...%. IQ&..J=h.p| +peer0.org1.example.com | 00000030 ad cb 9a 47 03 f8 56 cd 9c 8f 5e 39 44 4b 78 b5 |...G..V...^9DKx.| +peer0.org1.example.com | 00000040 1b 00 74 8b 03 87 |..t...| +peer0.org1.example.com | [33ea 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33eb 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [33ec 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [33ed 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [33ee 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [33ef 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f0 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f1 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f2 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33f3 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33f4 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33f5 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [33f6 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33f7 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [33f8 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33fa 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33f9 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33fb 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33fc 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33fd 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33fe 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ff 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3400 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3401 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3402 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3403 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3404 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3405 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3406 10-14 19:02:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [3407 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3408 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102A +peer0.org1.example.com | [3409 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C06A203ABC27F0B33BA43254D7EE77AE4A383570B6BC4DD0422F580B02D4FBC +peer0.org1.example.com | [340a 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [340b 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [340c 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [340d 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [340e 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [340f 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [339e 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org1.example.com | [339f 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [33a0 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [33a1 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [33a2 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 gate 1602702136418336700 evaluation starts +peer1.org1.example.com | [33a3 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [33a4 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [33a5 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [33a6 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 processing identity 1 with bytes of 115a6c0 +peer1.org1.example.com | [33a7 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [33a8 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [33a9 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [33aa 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [33ab 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [33ac 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [33ad 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 principal matched by identity 1 +peer1.org1.example.com | [33ae 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +peer1.org1.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.| +peer1.org1.example.com | [33af 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +peer1.org1.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +peer1.org1.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +peer1.org1.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +peer1.org1.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..| +peer1.org1.example.com | [33b0 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 principal evaluation succeeds for identity 1 +peer1.org1.example.com | [33b1 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040379b0 gate 1602702136418336700 evaluation succeeds +peer1.org1.example.com | [33b2 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [33b3 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [33b4 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [33b5 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [33b6 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 gate 1602702136419564400 evaluation starts +peer1.org1.example.com | [33b7 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [33b8 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [33b9 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer1.org1.example.com | [33ba 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [33bb 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org1.example.com | [33bc 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33bd 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33be 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33bf 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33c0 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [33c1 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33c2 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33c3 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes +peer1.org1.example.com | [33c4 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [33c5 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 principal matched by identity 0 +peer1.org1.example.com | [33c6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +peer1.org1.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o| +peer1.org1.example.com | [33c7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +peer1.org1.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +peer1.org1.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +peer1.org1.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +peer1.org1.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.| +peer1.org1.example.com | [33c8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [33c9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407c300 gate 1602702136419564400 evaluation succeeds +peer1.org1.example.com | [33ca 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [33cb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [33cc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org1.example.com | [33cd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org1.example.com | [33ce 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [33cf 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [33d0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [33d1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [33d2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [33d3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [33d4 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33d5 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33d6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33d7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33d8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33d9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33da 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33db 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [33dc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33dd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33de 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [33df 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org1.example.com | [33e0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [33e1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [33e2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [33e3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e4 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e5 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e6 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e7 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e8 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33e9 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [33ea 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33eb 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33ec 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33ed 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [33ee 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [33ef 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [33f0 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [33f1 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [33f2 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [33f3 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [33f4 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [33f5 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [33f6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [33f7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [33f8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [33f9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [33fa 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [33fb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [33fc 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [33fd 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [33fe 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [33ff 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3400 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3401 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [3402 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [3689 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [368a 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [368b 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1ca0 gate 1602702138587234500 evaluation succeeds +peer0.org2.example.com | [368c 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [368d 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [368e 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [368f 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3690 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3691 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3692 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3693 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [3694 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [3695 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [3696 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [3697 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3698 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3699 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [369a 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [369b 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369c 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369d 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [369e 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [369f 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36a0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [36a1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 gate 1602702138612876100 evaluation starts +peer0.org2.example.com | [36a2 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36a3 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36a4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [36a5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 principal evaluation fails +peer0.org2.example.com | [36a6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ed0 gate 1602702138612876100 evaluation fails +peer0.org2.example.com | [36a7 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36a8 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36a9 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36aa 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 gate 1602702138616161900 evaluation starts +peer0.org2.example.com | [36ab 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36ac 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36ad 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 principal matched by identity 0 +peer0.org2.example.com | [36ae 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [36af 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [36b0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36b1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed0440 gate 1602702138616161900 evaluation succeeds +peer0.org2.example.com | [36b2 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36b3 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36b4 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36b5 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36b6 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36b7 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36b8 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36b9 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3679 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [367a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [367b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [367c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [367d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [367e 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [367f 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3680 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3681 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3682 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3683 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45620 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3684 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3685 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3686 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3687 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3688 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3689 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [368a 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [368b 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [368c 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [368d 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [368e 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [368f 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3690 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 gate 1602702135583909100 evaluation starts +peer0.org1.example.com | [3410 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3411 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3412 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3413 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3414 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3416 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3417 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3415 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3418 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3419 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [341a 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [341b 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [341c 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [341d 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [341e 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [341f 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3420 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 a2 03 ab c2 7f 0b 33 ba 43 25 4d 7e e7 7a |\.......3.C%M~.z| +peer0.org1.example.com | 00000010 e4 a3 83 57 0b 6b c4 dd 04 22 f5 80 b0 2d 4f bc |...W.k..."...-O.| +peer0.org1.example.com | [3421 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 45 4e 56 91 0e 21 36 3c 3b 89 7c |0D. BENV..!6<;.|| +peer0.org1.example.com | 00000010 ed 7a 1c 09 c5 d2 8b 2b 86 38 22 2a 69 87 29 e5 |.z.....+.8"*i.).| +peer0.org1.example.com | 00000020 7c b4 c2 46 02 20 58 b9 ff 90 f7 79 c4 66 69 c0 ||..F. X....y.fi.| +peer0.org1.example.com | 00000030 54 5c 35 47 ab 91 59 e9 27 93 88 1c 56 f4 3b 21 |T\5G..Y.'...V.;!| +peer0.org1.example.com | 00000040 87 e5 70 ef 9d 45 |..p..E| +peer0.org1.example.com | [3422 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3423 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3424 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3425 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3426 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3427 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3428 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3429 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [342a 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [342b 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [342c 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [342d 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [342e 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [342f 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3430 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3431 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3432 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3433 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3434 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3435 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3436 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3437 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3438 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3439 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [343a 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [343b 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [343c 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [343d 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 gate 1602702125898326500 evaluation starts +peer0.org1.example.com | [343e 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [343f 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3440 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 principal matched by identity 0 +peer0.org1.example.com | [3441 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3442 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3443 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3444 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 gate 1602702125898326500 evaluation succeeds +peer0.org1.example.com | [3445 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3446 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3447 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3448 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3449 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [344a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [344b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [344c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [344d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [344e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [344f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3450 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3451 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 gate 1602702125901939300 evaluation starts +peer0.org1.example.com | [3452 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3453 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3454 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 principal matched by identity 0 +peer0.org1.example.com | [3455 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3456 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3457 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3458 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 gate 1602702125901939300 evaluation succeeds +peer0.org1.example.com | [3459 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [345a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [345b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [345c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [345d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [345e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [345f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3460 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3461 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3462 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3463 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3464 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3465 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3466 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3467 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3468 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3469 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [346a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [346b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 gate 1602702125907179200 evaluation starts +peer0.org1.example.com | [346c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [346d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [346e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 principal matched by identity 0 +peer0.org1.example.com | [346f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3470 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3471 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3472 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 gate 1602702125907179200 evaluation succeeds +peer0.org1.example.com | [3473 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3474 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3475 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3476 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3477 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3478 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3479 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [347a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [347b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [347c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [347d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [347e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [347f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 gate 1602702125912814200 evaluation starts +peer0.org1.example.com | [3480 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3481 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3482 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 principal matched by identity 0 +peer0.org1.example.com | [3483 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3484 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3485 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3486 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 gate 1602702125912814200 evaluation succeeds +peer0.org1.example.com | [3487 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3488 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3489 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [348a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [348b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [348c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [348d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [348e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [348f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3490 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3491 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3492 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3493 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3494 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3495 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3496 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3497 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3498 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3499 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [349a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 gate 1602702125918595500 evaluation starts +peer0.org1.example.com | [349b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [349c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3403 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [3404 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [3405 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3406 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3407 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3408 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3409 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [340a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [340b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [340c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [340d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [340e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [340f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3410 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3411 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3412 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3413 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3414 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [3415 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [3416 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3417 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3418 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [3419 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3691 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3692 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3693 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3694 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 principal evaluation fails +peer1.org2.example.com | [3695 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d73a0 gate 1602702135583909100 evaluation fails +peer1.org2.example.com | [3696 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3697 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3698 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3699 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 gate 1602702135590552900 evaluation starts +peer1.org2.example.com | [369a 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [369b 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [369c 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 principal matched by identity 0 +peer1.org2.example.com | [369d 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 aa e7 d4 8d fd e7 8a 71 30 8e 0c 0b 4f e7 ed |........q0...O..| +peer1.org2.example.com | 00000010 4e 79 75 e7 05 8d 85 20 8f 3b f5 cc c1 b2 aa fb |Nyu.... .;......| +peer1.org2.example.com | [369e 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 12 12 8a 55 db f8 a3 d3 a6 08 c0 |0D. ...U.......| +peer1.org2.example.com | 00000010 52 54 05 bd ff a3 a0 44 da 0f f2 e6 1f 62 ca 15 |RT.....D.....b..| +peer1.org2.example.com | 00000020 e5 14 28 45 02 20 09 c3 78 d3 9e e8 f5 c5 0b 14 |..(E. ..x.......| +peer1.org2.example.com | 00000030 66 41 1a a9 b5 06 31 9d 93 27 f1 d3 2e 1a 12 30 |fA....1..'.....0| +peer1.org2.example.com | 00000040 1f a6 ab 66 96 d8 |...f..| +peer1.org2.example.com | [369f 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36a0 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035d7910 gate 1602702135590552900 evaluation succeeds +peer1.org2.example.com | [36a1 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36a2 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36a3 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [36a4 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [36a5 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36a6 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [36a7 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [36a8 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [36a9 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [36aa 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ab 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ac 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ad 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36ae 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36af 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b0 10-14 19:02:15.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36b1 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b2 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b3 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b4 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b5 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b6 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b7 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36b8 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36b9 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36ba 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36bb 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36bc 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36bd 10-14 19:02:15.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36be 10-14 19:02:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36bf 10-14 19:02:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c0 10-14 19:02:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c1 10-14 19:02:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [36c2 10-14 19:02:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36c3 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36c4 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36c5 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [36c6 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36c7 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [36c8 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 gate 1602702136372438500 evaluation starts +peer1.org2.example.com | [36c9 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36ca 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [36cb 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 principal matched by identity 0 +peer1.org2.example.com | [36cc 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 50 1f 2e e7 76 f5 a9 11 7a fe a4 7e f4 c7 a9 |.P...v...z..~...| +peer1.org2.example.com | 00000010 f1 58 d6 02 80 14 cd 2e 63 80 da f9 b5 af 7b 79 |.X......c.....{y| +peer1.org2.example.com | [36cd 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 46 c6 88 8d e7 a1 94 8b ef 79 |0E.!..F........y| +peer1.org2.example.com | 00000010 56 b0 df 5f af f1 64 26 2d 54 98 d1 74 bc 02 dd |V.._..d&-T..t...| +peer1.org2.example.com | 00000020 f2 01 49 9e f2 02 20 72 4e df 95 74 87 86 7e 1f |..I... rN..t..~.| +peer1.org2.example.com | 00000030 af e7 75 b3 66 23 d2 1c 9b 78 0b ac a8 25 74 d8 |..u.f#...x...%t.| +peer1.org2.example.com | 00000040 c4 e8 8f bf dc 56 9c |.....V.| +peer1.org2.example.com | [36ce 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36cf 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003612e10 gate 1602702136372438500 evaluation succeeds +peer1.org2.example.com | [36d0 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [36d1 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [36d2 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [36d3 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [36d4 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org2.example.com | [36d5 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org2.example.com | [36d6 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [36d7 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer1.org2.example.com | [36d8 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [36d9 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org2.example.com | [36da 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org2.example.com | [36db 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org2.example.com | [36dc 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org2.example.com | [36dd 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org2.example.com | [36de 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer1.org2.example.com | [36df 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [36e0 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00282e200 env 0xc004a9f090 txn 0 +peer1.org2.example.com | [36e1 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004a9f090 +peer1.org2.example.com | [36e2 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer1.org2.example.com | [36e3 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [36e4 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [36e5 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [349d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 principal matched by identity 0 +peer0.org1.example.com | [349e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [349f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [34a0 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34a1 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 gate 1602702125918595500 evaluation succeeds +peer0.org1.example.com | [34a2 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34a3 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34a4 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34a5 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34a6 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34a7 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34a8 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [34a9 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34aa 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34ab 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34ac 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34ad 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34ae 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 gate 1602702125921617000 evaluation starts +peer0.org1.example.com | [34af 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34b0 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [34b1 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 principal matched by identity 0 +peer0.org1.example.com | [34b2 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [34b3 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [34b4 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34b5 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 gate 1602702125921617000 evaluation succeeds +peer0.org1.example.com | [34b6 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34b7 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34b8 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34b9 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34ba 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34bb 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34bc 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34bd 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [34be 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34bf 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34c0 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34c1 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c2 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c3 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c4 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c5 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34c6 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c7 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c8 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [34c9 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34ca 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cb 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cc 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cd 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34ce 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34cf 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [34d0 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34d1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34d4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [34d5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [34d6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34d7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [341a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [341b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [341c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [341d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [341e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org1.example.com | [341f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org1.example.com | [3420 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3421 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3422 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org1.example.com | [3423 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3424 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org1.example.com | [3425 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org1.example.com | [3426 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [3427 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [3428 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [3429 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [342a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [342b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [342c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org1.example.com | [342d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org1.example.com | [342e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org1.example.com | [342f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org1.example.com | [3430 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [3431 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [3432 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [3433 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [3434 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [3435 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [3436 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [3437 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [3438 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [3439 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [343a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [343b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [343c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [343d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [343e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [343f 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [3440 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [3441 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [3442 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [3443 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [3444 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [3445 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [3446 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [3447 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [3448 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [3449 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [344a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [344b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [344c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [344d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [344e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [344f 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [3450 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [3451 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [3452 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [3453 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [3454 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [3455 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [3456 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [3457 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [3458 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [3459 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [345a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [345b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [345c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [34d8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34d9 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34da 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34db 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34dc 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34dd 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 gate 1602702126184805400 evaluation starts +peer0.org1.example.com | [34de 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34df 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [34e0 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 principal matched by identity 0 +peer0.org1.example.com | [34e1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer0.org1.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer0.org1.example.com | [34e2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer0.org1.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer0.org1.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer0.org1.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer0.org1.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer0.org1.example.com | [34e3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34e4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 gate 1602702126184805400 evaluation succeeds +peer0.org1.example.com | [34e5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34e6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34e7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34e8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34e9 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [34ea 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [34eb 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [34ec 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [34ed 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [34ee 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34ef 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f0 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [34f2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34f3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34f4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34f5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [34f6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [34f7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [34f8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [34f9 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [34fa 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [34fb 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [34fc 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34fd 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34fe 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34ff 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3500 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3501 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3502 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3503 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3504 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3505 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3506 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3507 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3508 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3509 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [350a 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36ba 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36bb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36bc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36bd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [36be 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 gate 1602702138631941300 evaluation starts +peer0.org2.example.com | [36bf 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36c0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36c1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [36c2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 principal evaluation fails +peer0.org2.example.com | [36c3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1640 gate 1602702138631941300 evaluation fails +peer0.org2.example.com | [36c4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36c5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36c6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [36e6 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36e7 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [36e8 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [36e9 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [36ea 10-14 19:02:16.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [36eb 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [36ec 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +peer1.org2.example.com | 00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.| +peer1.org2.example.com | [36ed 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +peer1.org2.example.com | 00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +peer1.org2.example.com | 00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +peer1.org2.example.com | 00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +peer1.org2.example.com | 00000040 4d 58 92 4e a4 4a df |MX.N.J.| +peer1.org2.example.com | [36ee 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [36ef 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0036a0000, header channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer1.org2.example.com | [36f0 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [36f1 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36f2 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [36f3 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36f4 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [36f5 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [36f6 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [36f7 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36f8 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [36f9 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [36fa 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36fb 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [36fc 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [36fd 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [36fe 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [36ff 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3700 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3701 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3702 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3703 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [3704 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [3705 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [3706 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes +peer1.org2.example.com | [3707 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3708 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3709 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [370a 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [370b 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [370c 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [370d 10-14 19:02:16.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [370e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [370f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [3710 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3711 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [3712 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3713 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [3714 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [3715 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [3716 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [3717 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [3718 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [3719 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [371a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [371b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org2.example.com | [371c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org2.example.com | [371d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org2.example.com | [371e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [371f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3720 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3721 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3722 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3723 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3724 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3725 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [3726 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org2.example.com | [3727 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3728 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org2.example.com | [3729 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org2.example.com | [372a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 gate 1602702136398788500 evaluation starts +peer1.org2.example.com | [372b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [372c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36c7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 gate 1602702138634276500 evaluation starts +peer0.org2.example.com | [36c8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36c9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36ca 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 principal matched by identity 0 +peer0.org2.example.com | [36cb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [36cc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [36cd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36ce 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed1bb0 gate 1602702138634276500 evaluation succeeds +peer0.org2.example.com | [36cf 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36d0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36d1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36d2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36d3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36d6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org2.example.com | [36d7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org2.example.com | [36d8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org2.example.com | [36d9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org2.example.com | [36da 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36db 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36dc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36dd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36de 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36df 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36e0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36e1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [36e2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 gate 1602702138635823900 evaluation starts +peer0.org2.example.com | [36e3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36e4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36e5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [36e6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 principal evaluation fails +peer0.org2.example.com | [36e7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eefde0 gate 1602702138635823900 evaluation fails +peer0.org2.example.com | [36e8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36e9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [36ea 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36eb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 gate 1602702138638709000 evaluation starts +peer0.org2.example.com | [36ec 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36ed 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [36ee 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 principal matched by identity 0 +peer0.org2.example.com | [36ef 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [36f0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [36f1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36f2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f10350 gate 1602702138638709000 evaluation succeeds +peer0.org2.example.com | [36f3 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36f4 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36f5 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36f6 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36f7 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f8 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f9 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36fa 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36fb 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36fc 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [345d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [345e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [345f 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [3460 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [3461 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [3462 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [3463 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [3464 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3465 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [3466 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [3467 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [3468 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [3469 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [346a 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [346b 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [346c 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [346d 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [346e 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [346f 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [3470 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [3471 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [3472 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [3473 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [3474 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [3475 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [3476 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [3477 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [3478 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3479 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [347a 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [347b 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [347c 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org1.example.com | [347d 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [347e 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [347f 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [3480 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [3481 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [3482 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3483 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3484 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [3485 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [3486 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [3487 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [3488 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [3489 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [348a 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [348b 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [348c 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [348d 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [348e 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [348f 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [3490 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org1.example.com | [3491 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [3492 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3493 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3494 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3495 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3496 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3497 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 gate 1602702136544099700 evaluation starts +peer1.org1.example.com | [3498 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3499 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [349a 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [349b 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 principal evaluation fails +peer1.org1.example.com | [349c 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2760 gate 1602702136544099700 evaluation fails +peer1.org1.example.com | [349d 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [349e 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [349f 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [34a0 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 gate 1602702136553056400 evaluation starts +peer1.org1.example.com | [34a1 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34a2 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [34a3 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 principal matched by identity 0 +peer1.org1.example.com | [34a4 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org1.example.com | [34a5 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org1.example.com | [34a6 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34a7 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2cd0 gate 1602702136553056400 evaluation succeeds +peer1.org1.example.com | [34a8 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34a9 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34aa 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34ab 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34ac 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34ad 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34ae 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34af 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34b0 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [34b1 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34b2 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 gate 1602702136568354400 evaluation starts +peer1.org1.example.com | [34b3 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34b4 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [34b5 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 principal matched by identity 0 +peer1.org1.example.com | [34b6 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [34b7 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [372d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 principal matched by identity 0 +peer1.org2.example.com | [372e 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +peer1.org2.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o| +peer1.org2.example.com | [372f 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +peer1.org2.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +peer1.org2.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +peer1.org2.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +peer1.org2.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.| +peer1.org2.example.com | [3730 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3731 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eb530 gate 1602702136398788500 evaluation succeeds +peer1.org2.example.com | [3732 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3733 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3734 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [3735 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org2.example.com | [3736 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 gate 1602702136399254800 evaluation starts +peer1.org2.example.com | [3737 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 signed by 0 principal evaluation starts (used [false false false]) +peer1.org2.example.com | [3738 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3739 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [373a 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 processing identity 1 with bytes of 115a6c0 +peer1.org2.example.com | [373b 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [373c 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [373d 10-14 19:02:16.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [373e 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [373f 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [3740 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3741 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 principal matched by identity 1 +peer1.org2.example.com | [3742 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +peer1.org2.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.| +peer1.org2.example.com | [3743 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +peer1.org2.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +peer1.org2.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +peer1.org2.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +peer1.org2.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..| +peer1.org2.example.com | [3744 10-14 19:02:16.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 principal evaluation succeeds for identity 1 +peer1.org2.example.com | [3745 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ebaa0 gate 1602702136399254800 evaluation succeeds +peer1.org2.example.com | [3746 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [3747 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [3748 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org2.example.com | [3749 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org2.example.com | [374a 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [374b 10-14 19:02:16.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [374c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [374d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [374e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [374f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3750 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [3751 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [3752 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [3753 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3754 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3755 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org2.example.com | [3756 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [3757 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [3758 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [3759 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org2.example.com | [375a 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [375b 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [375c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [375d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [375e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [375f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3760 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3761 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3762 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [3763 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [3764 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [3765 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [3766 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [3767 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [3768 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [3769 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [376a 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [376b 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [376c 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [376d 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [376e 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [376f 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3770 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3771 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [3772 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [3773 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3774 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3775 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [3776 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [36fd 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36fe 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [36ff 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3700 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 gate 1602702138647224800 evaluation starts +peer0.org2.example.com | [3701 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3702 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3703 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3704 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 principal evaluation fails +peer0.org2.example.com | [3705 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11550 gate 1602702138647224800 evaluation fails +peer0.org2.example.com | [3707 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3708 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3709 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3706 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [370a 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 gate 1602702138654739600 evaluation starts +peer0.org2.example.com | [370b 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [370c 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [370d 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 principal matched by identity 0 +peer0.org2.example.com | [370e 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [370f 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3710 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3711 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f11ac0 gate 1602702138654739600 evaluation succeeds +peer0.org2.example.com | [3712 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3713 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3714 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3715 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3716 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3717 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3718 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3719 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [371a 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [371b 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [371c 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371d 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [371f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3720 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3721 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 gate 1602702138660458400 evaluation starts +peer0.org2.example.com | [3722 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3723 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3724 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3725 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 principal evaluation fails +peer0.org2.example.com | [3726 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7510 gate 1602702138660458400 evaluation fails +peer0.org2.example.com | [3727 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [34b8 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34b9 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3810 gate 1602702136568354400 evaluation succeeds +peer1.org1.example.com | [34ba 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34bb 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34bc 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34bd 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34be 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34bf 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34c0 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34c1 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34c2 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [34c3 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34c4 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 gate 1602702136580568600 evaluation starts +peer1.org1.example.com | [34c5 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34c6 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [34c7 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 principal matched by identity 0 +peer1.org1.example.com | [34c8 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [34c9 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [34ca 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34cb 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ca350 gate 1602702136580568600 evaluation succeeds +peer1.org1.example.com | [34cc 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34cd 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34ce 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34cf 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34d0 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org1.example.com | [34d1 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [34d2 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [34d3 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34d4 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [34d5 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [34d6 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [34d7 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [34d8 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0041e10d0, CONNECTING +peer1.org1.example.com | [34d9 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [34da 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0041e10d0, READY +peer1.org1.example.com | [34db 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [34dc 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [34dd 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [34de 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [34df 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [34e0 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34e1 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org1.example.com | [34e2 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [34e3 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34e4 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [34e5 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34e6 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [34e7 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [34e8 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [34e9 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [34ea 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [34eb 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [34ec 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00423d910, CONNECTING +peer1.org1.example.com | [34ed 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00423d910, READY +peer1.org1.example.com | [34ee 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [34ef 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [34f0 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [34f1 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [34f2 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org1.example.com | [34f3 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [34f4 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0035ddc40 env 0xc003ec34f0 txn 0 +peer1.org1.example.com | [34f5 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [34f6 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 244ms +peer1.org1.example.com | [34f7 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [34f8 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [34f9 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [34fa 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org1.example.com | [34fb 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [34fc 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [34fd 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [34fe 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org1.example.com | [34ff 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [3500 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [3501 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [3502 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [3503 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3777 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [3778 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3779 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [377a 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [377b 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org2.example.com | [377c 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [377d 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [377e 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [377f 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [3780 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3781 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [3782 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [3783 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3784 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3785 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org2.example.com | [3786 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org2.example.com | [3787 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [350b 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [350c 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [350d 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [350e 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [350f 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3510 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3511 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3512 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3513 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3514 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 gate 1602702126310994100 evaluation starts +peer0.org1.example.com | [3515 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3516 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3517 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 principal matched by identity 0 +peer0.org1.example.com | [3518 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer0.org1.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer0.org1.example.com | [3519 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer0.org1.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer0.org1.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer0.org1.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc0041f0bb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [351b 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 gate 1602702126310994100 evaluation succeeds +peer0.org1.example.com | [351c 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [351d 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [351e 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [351f 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3520 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3521 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3522 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3523 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3524 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3525 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3526 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3527 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3528 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3529 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352a 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [352b 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [352c 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [352d 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [352e 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [352f 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3530 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3531 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3532 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3533 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3534 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3535 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3536 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3537 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3538 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3539 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [353a 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [353b 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [353c 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer0.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer0.org1.example.com | [353d 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer0.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer0.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer0.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer0.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer0.org1.example.com | [353e 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [3788 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3789 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org2.example.com | [378a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [378b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [378c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [378d 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [378e 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [378f 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [3790 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [3791 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [3792 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [3793 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [3794 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3795 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [3796 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [3797 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [3798 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [3799 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [379a 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [379b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer1.org2.example.com | [379c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer1.org2.example.com | [379d 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [379e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [379f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [37a0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | [37a1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [37a2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [37a3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org2.example.com | [37a4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org2.example.com | [37a5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org2.example.com | [37a6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org2.example.com | [37a7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [37a8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [37a9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [37aa 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [37ab 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [37ac 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [37ad 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [37ae 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [37af 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [37b0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [3728 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3729 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [372a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 gate 1602702138663630300 evaluation starts +peer0.org2.example.com | [372b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [372c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [372d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 principal matched by identity 0 +peer0.org2.example.com | [372e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer0.org2.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer0.org2.example.com | [372f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer0.org2.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer0.org2.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer0.org2.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer0.org2.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer0.org2.example.com | [3730 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3731 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea7a80 gate 1602702138663630300 evaluation succeeds +peer0.org2.example.com | [3732 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3733 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3734 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3735 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3736 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3737 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3738 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3739 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [373a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [373b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [373c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [373d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [373e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [373f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3740 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3741 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3742 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3743 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > alive: alive: +peer0.org2.example.com | [3744 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3745 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3746 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3747 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3748 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3749 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [374a 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [374b 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [374c 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [374d 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 dc 5f cc 1e c5 7f 5f ba 26 92 33 b9 0c 48 ca |.._...._.&.3..H.| +peer0.org2.example.com | 00000010 26 c2 2e 79 62 32 f0 4a bc 6c 43 ac b5 0c 05 1e |&..yb2.J.lC.....| +peer0.org2.example.com | [374e 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 ad 82 a1 f3 3a 41 be dd 2f 46 24 |0D. ....:A../F$| +peer0.org2.example.com | 00000010 04 18 a8 1c 1b f1 f9 eb 3b 92 f6 5a ea 02 28 18 |........;..Z..(.| +peer0.org2.example.com | 00000020 94 11 d7 b0 02 20 7c 75 04 6d 31 43 5a 28 50 1b |..... |u.m1CZ(P.| +peer0.org2.example.com | 00000030 cb 92 0e b2 88 16 d1 d4 1d cd c1 dd 3f d5 ca 22 |............?.."| +peer0.org2.example.com | 00000040 af bc c3 8a 56 32 |....V2| +peer0.org2.example.com | [374f 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3504 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [3505 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [37b1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37b2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37b3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [37b4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [37b5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [37b6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [37b7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [37b8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [37b9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [37ba 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [37bb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [37bc 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [37bd 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [37be 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [37bf 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [37c0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [37c1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37c2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [37c3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [37c4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [37c5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [37c6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [37c7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37c8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org2.example.com | [37c9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org2.example.com | [37ca 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org2.example.com | [37cb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org2.example.com | [37cc 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [37cd 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org2.example.com | [37ce 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [37cf 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [37d0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [37d1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [37d2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [37d3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [37d4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [37d5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [3750 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3751 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3752 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3753 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3754 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3755 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3756 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3757 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3758 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3759 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [375a 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [375b 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [375c 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [375d 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [375e 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [375f 10-14 19:02:18.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3760 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3761 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3762 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3763 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3764 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3765 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3766 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3767 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3768 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3769 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [376a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [376b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [376c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [376d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [376e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [376f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3770 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 gate 1602702138922451600 evaluation starts +peer0.org2.example.com | [3771 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3772 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [37d6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [37d7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [37d8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [37d9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [37da 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [37db 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [37dc 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [37dd 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [37de 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [37df 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [37e0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [37e1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [37e2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [37e3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [37e4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [37e5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [37e6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [37e7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [37e8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [37e9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [37ea 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [37eb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [37ec 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [37ed 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [37ee 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [37ef 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [37f0 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [37f1 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [37f2 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [37f3 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [37f4 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer1.org2.example.com | [37f5 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [37f6 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [37f7 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [37f8 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [37f9 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [37fa 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [37fb 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [37fc 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [37fd 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [37fe 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [37ff 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3800 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3801 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3802 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3803 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3804 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3805 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org2.example.com | [3806 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3807 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [3808 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3809 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [380a 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [380b 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [380c 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [380d 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [380e 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [380f 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 gate 1602702136477939500 evaluation starts +peer1.org2.example.com | [3810 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3773 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [3774 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 principal evaluation fails +peer0.org2.example.com | [3775 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f841f0 gate 1602702138922451600 evaluation fails +peer0.org2.example.com | [3776 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3777 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3778 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3779 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 gate 1602702138923063600 evaluation starts +peer0.org2.example.com | [377a 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [377b 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [377c 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [377d 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 principal evaluation fails +peer0.org2.example.com | [377e 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f85040 gate 1602702138923063600 evaluation fails +peer0.org2.example.com | [377f 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3780 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3781 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3782 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 gate 1602702138923466000 evaluation starts +peer0.org2.example.com | [3783 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3784 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3785 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [3786 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3787 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3788 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 principal matched by identity 0 +peer0.org2.example.com | [3789 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [378a 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | [3811 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3812 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3813 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 principal evaluation fails +peer1.org2.example.com | [3814 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003814c80 gate 1602702136477939500 evaluation fails +peer1.org2.example.com | [3815 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3816 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3817 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3818 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 gate 1602702136486421600 evaluation starts +peer1.org2.example.com | [3819 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [381a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [381b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 principal matched by identity 0 +peer1.org2.example.com | [381c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer1.org2.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer1.org2.example.com | [381d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer1.org2.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer1.org2.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer1.org2.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer1.org2.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer1.org2.example.com | [381e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [381f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038151f0 gate 1602702136486421600 evaluation succeeds +peer1.org2.example.com | [3820 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3821 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3822 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3823 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3824 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3825 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3826 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3827 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3828 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3829 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [382a 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 gate 1602702136488393600 evaluation starts +peer1.org2.example.com | [382b 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [353f 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d a5 3e 21 87 48 c2 48 9b 37 a1 9a |0D. ..>!.H.H.7..| +peer0.org1.example.com | 00000010 9c f9 1c 3f c5 cd 69 34 c2 2a ba ff b4 cd c7 fb |...?..i4.*......| +peer0.org1.example.com | 00000020 0a 93 a2 e7 02 20 0e f9 b1 89 f2 44 28 bd d4 8a |..... .....D(...| +peer0.org1.example.com | 00000030 22 09 29 cb 73 52 63 22 c6 89 15 93 d0 6b 39 1f |".).sRc".....k9.| +peer0.org1.example.com | 00000040 11 16 8c 23 b8 68 |...#.h| +peer0.org1.example.com | [3540 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3541 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3542 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3543 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3544 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3545 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3546 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3547 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3548 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3549 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [354a 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [354b 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [354c 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > alive: +peer0.org1.example.com | [354d 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [354e 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [354f 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3550 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3551 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3552 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3553 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3554 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3555 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3556 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3557 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [382c 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [382d 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [382e 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 principal evaluation fails +peer1.org2.example.com | [382f 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003815d30 gate 1602702136488393600 evaluation fails +peer1.org2.example.com | [3830 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3831 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3832 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3833 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 gate 1602702136489918100 evaluation starts +peer1.org2.example.com | [3834 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3835 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3836 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 principal matched by identity 0 +peer1.org2.example.com | [3837 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org2.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org2.example.com | [3838 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org2.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org2.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org2.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org2.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org2.example.com | [3839 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [383a 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382c2a0 gate 1602702136489918100 evaluation succeeds +peer1.org2.example.com | [383b 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [383c 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [383d 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [383e 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [383f 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3840 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3841 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3842 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3843 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3844 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 gate 1602702136492846100 evaluation starts +peer1.org2.example.com | [3845 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3846 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3847 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 principal matched by identity 0 +peer1.org2.example.com | [3848 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org2.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org2.example.com | [3849 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org2.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org2.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org2.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org2.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org2.example.com | [384a 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [384b 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382cd30 gate 1602702136492846100 evaluation succeeds +peer1.org2.example.com | [384c 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [384d 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [384e 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [384f 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3850 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org2.example.com | [3851 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org2.example.com | [3852 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [3853 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3854 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3855 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [3856 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3857 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3506 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [3507 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [3508 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [3509 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [350a 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004225bc0)} +peer1.org1.example.com | [350b 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [350c 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [350d 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [350e 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org1.example.com | [350f 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org1.example.com | [3510 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org1.example.com | [3511 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3512 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [3513 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [3514 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [3515 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org1.example.com | [3516 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org1.example.com | [351a 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [351b 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3517 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +peer1.org1.example.com | txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +peer1.org1.example.com | ] +peer1.org1.example.com | [3518 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [3519 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org1.example.com | [351c 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [351f 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [351d 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to txid-index +peer1.org1.example.com | [3520 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx number:[0] ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to blockNumTranNum index +peer1.org1.example.com | [351e 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [3521 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 48 12 58 71 1a c0 72 30 66 22 |0E.!..H.Xq..r0f"| +peer1.org1.example.com | 00000010 de ce ad 9f a8 b9 a8 03 6c 54 23 81 0f b5 28 5e |........lT#...(^| +peer1.org1.example.com | 00000020 97 d9 81 b2 4b 02 20 4a aa d3 70 d6 9a 9c 5d 35 |....K. J..p...]5| +peer1.org1.example.com | 00000030 3d 1b 62 57 fa b2 f7 12 94 2b 5d a9 ff 11 ce 57 |=.bW.....+]....W| +peer1.org1.example.com | 00000040 c9 9b 78 c4 09 1f e5 |..x....| +peer1.org1.example.com | [3522 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org1.example.com | [3523 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3524 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161039 +peer1.org1.example.com | [3525 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EB3AFCF4D568DB0732602F6B6ABD8D93D3ECC8C8431CE10F794205AE1AB44583 +peer1.org1.example.com | [3526 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3527 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3528 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3529 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7289679004569846692 tag:EMPTY mem_req:3{\266\255\211\375" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [352a 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7289679004569846692 tag:EMPTY mem_req:3{\266\255\211\375" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [352b 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [352c 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer1.org1.example.com | [352d 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [352e 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer1.org1.example.com | [352f 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org1.example.com | [3530 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3531 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [378b 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [378c 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f855d0 gate 1602702138923466000 evaluation succeeds +peer0.org2.example.com | [378d 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [378e 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [378f 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3790 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3791 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3792 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3793 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3794 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3795 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3796 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [3797 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3798 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3799 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379a 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379b 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379c 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [379d 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [379e 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [379f 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [37a0 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a1 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [37a2 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [37a3 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [37a4 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [37a5 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37a6 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [37a8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [37a9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [37aa 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [37ab 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ac 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37ad 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161033 +peer0.org2.example.com | [37ae 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 50F693996905E0EC05319B69E46AB08958434DB953C66938BD90D213781B1FD9 +peer0.org2.example.com | [37af 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37b0 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [37b1 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [37b2 10-14 19:02:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [37b3 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b4 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b5 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b6 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37b7 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b8 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37b9 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ba 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37bb 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37bc 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37bd 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37be 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37bf 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c0 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37c1 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37c2 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c3 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37c4 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [37c5 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 7c 5c e9 97 f2 cb c1 4f 81 a9 58 32 6d 12 82 |t|\.....O..X2m..| +peer0.org2.example.com | 00000010 09 f5 4b 2b e2 78 58 d5 cf c2 a9 c5 79 ae 9b a2 |..K+.xX.....y...| +peer1.org1.example.com | [3532 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3533 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138781], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org1.example.com | [3534 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org1.example.com | [3535 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org1.example.com | [3536 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org1.example.com | [3537 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [3538 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [3539 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [353a 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [353b 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [353c 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [353d 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org1.example.com | [353e 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org1.example.com | [353f 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org1.example.com | [3540 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3858 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3859 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [385a 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [385b 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [385c 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [385d 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [385e 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [385f 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3860 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [3861 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3862 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00385d910, CONNECTING +peer1.org2.example.com | [3863 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [3864 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3865 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [3866 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3867 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038930f0, CONNECTING +peer1.org2.example.com | [3868 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0038930f0, READY +peer1.org2.example.com | [3869 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [386a 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [386b 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [386c 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [386d 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [386e 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [386f 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00385d910, READY +peer1.org2.example.com | [3870 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [3871 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org2.example.com | [3872 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [3873 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [3874 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00282e200 env 0xc004a9f090 txn 0 +peer1.org2.example.com | [3875 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [3876 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 215ms +peer1.org2.example.com | [3877 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [3878 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [3879 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer1.org2.example.com | [387b 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [387c 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 83 b3 fa cc cd bd 50 3a 9a a9 22 |0D. b......P:.."| +peer1.org2.example.com | 00000010 a0 b5 20 e1 c4 ff 88 31 5b c8 e3 8f 9e f5 1a ad |.. ....1[.......| +peer1.org2.example.com | 00000020 72 d6 f8 b8 02 20 28 dc c6 11 b1 0b b0 e5 5d c4 |r.... (.......].| +peer1.org2.example.com | 00000030 30 f0 9d 3c 85 51 fc 5c e1 95 78 a0 31 bb 05 63 |0..<.Q.\..x.1..c| +peer1.org2.example.com | 00000040 5f 28 aa 32 61 da |_(.2a.| +peer1.org2.example.com | [387d 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [387e 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [387f 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161032 +peer1.org2.example.com | [3880 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 827F83D05328B7B308D5C49DD54BE5D469C7DF5EE3B5A8A31B975354C5C015E4 +peer1.org2.example.com | [3881 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3882 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3883 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3884 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:6608994303537141191 tag:EMPTY mem_req:\254c\324\242\262\205u\207\247,Vu\003}\260\r\234T\372|\251\235\306\027U'\"\021\034\237\002 gJ\"\206\341\323\245\2773(\245\273\241\364\233&\037\371M\346lB\335J\234\237C\336v\212\014\246" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3885 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:6608994303537141191 tag:EMPTY mem_req:\254c\324\242\262\205u\207\247,Vu\003}\260\r\234T\372|\251\235\306\027U'\"\021\034\237\002 gJ\"\206\341\323\245\2773(\245\273\241\364\233&\037\371M\346lB\335J\234\237C\336v\212\014\246" secret_envelope: > > , Envelope: 281 bytes, Signature: 0 bytes +peer1.org2.example.com | [3886 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3887 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3888 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3889 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [388a 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [387a 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [3558 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3559 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [355a 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [355b 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [355c 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [355d 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [355e 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [355f 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3560 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3561 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3562 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3563 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3564 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3565 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3566 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3567 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3568 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3569 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [356a 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102B +peer0.org1.example.com | [356b 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 879073F988B1A501800E65B2AC778038410BA4A41B1A2063301AFBA27F13D588 +peer0.org1.example.com | [356c 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [356d 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [356e 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [356f 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3570 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3571 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3572 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3573 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3574 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3575 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3576 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3577 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3578 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3579 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357a 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [357b 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [357c 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [357d 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [357e 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [357f 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer0.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer0.org1.example.com | [3580 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer0.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer0.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer0.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer0.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer0.org1.example.com | [3581 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3582 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37c6 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 59 8b 03 85 c3 cf c9 71 9c aa |0E.!..Y......q..| +peer0.org2.example.com | 00000010 e2 9c b6 70 68 f5 fb f8 18 fa 46 f9 ea 49 49 63 |...ph.....F..IIc| +peer0.org2.example.com | 00000020 07 99 0a 49 54 02 20 05 c9 85 a3 59 b7 af 1a 2c |...IT. ....Y...,| +peer0.org2.example.com | 00000030 a5 a8 e8 25 98 35 8f 33 bb ef a8 a9 eb 18 ac 89 |...%.5.3........| +peer0.org2.example.com | 00000040 58 fe 10 49 12 f3 01 |X..I...| +peer0.org2.example.com | [37c7 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37c8 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [37c9 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [37ca 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [37cb 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [37cc 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cd 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ce 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37cf 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37d0 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37d1 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37d2 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [37d3 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37d4 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [37d5 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37d6 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37d7 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37d8 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37d9 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37da 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37db 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37dc 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37dd 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37de 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37df 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37e0 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e1 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37e2 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e3 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37e4 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37e5 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e6 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [37e7 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [37e8 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e9 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [37ea 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37eb 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37ec 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37ed 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37ee 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [37ef 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 gate 1602702140380740100 evaluation starts +peer0.org2.example.com | [37f0 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37f1 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [37f2 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [3583 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3584 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [388b 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org2.example.com | [388c 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [388d 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer1.org2.example.com | [388e 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [388f 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [3890 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org2.example.com | [3891 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [3892 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [3893 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [3894 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [3895 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [3896 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [3898 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:7051 +peer1.org2.example.com | [3899 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [389a 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3897 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [3585 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3587 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3586 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3588 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [358a 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3589 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [358b 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [358c 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [358d 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [358e 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 gate 1602702126682776700 evaluation starts +peer0.org1.example.com | [358f 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3590 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3591 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 principal matched by identity 0 +peer0.org1.example.com | [3592 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +peer0.org1.example.com | 00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +peer0.org1.example.com | [3593 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +peer0.org1.example.com | 00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +peer0.org1.example.com | 00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +peer0.org1.example.com | 00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +peer0.org1.example.com | 00000040 21 82 24 ce c5 a0 |!.$...| +peer0.org1.example.com | [3594 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3595 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 gate 1602702126682776700 evaluation succeeds +peer0.org1.example.com | [3596 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3597 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3598 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3599 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [359a 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [359b 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [359c 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [359d 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer0.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer0.org1.example.com | [359e 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer0.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer0.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer0.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer0.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer0.org1.example.com | [359f 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35a0 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35a1 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a2 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [35a4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [35a5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [35a7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [35a8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35a9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35aa 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3542 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3543 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3544 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3545 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3546 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3547 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3548 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3549 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [354a 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [354b 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [354c 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 gate 1602702136701023300 evaluation starts +peer1.org1.example.com | [354d 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [354e 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [354f 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3550 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 principal evaluation fails +peer1.org1.example.com | [3551 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044520b0 gate 1602702136701023300 evaluation fails +peer1.org1.example.com | [3552 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3553 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3554 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3555 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 gate 1602702136701773100 evaluation starts +peer1.org1.example.com | [3556 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3557 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3558 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [3559 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [355a 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [355b 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 principal matched by identity 0 +peer1.org1.example.com | [355c 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [355d 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 69 b8 e3 aa 69 8f e6 da 92 60 |0E.!..i...i....`| +peer1.org1.example.com | 00000010 15 e9 67 1b fe 74 c6 0b 7f 5d 42 10 f8 a0 b9 e8 |..g..t...]B.....| +peer1.org1.example.com | 00000020 02 c3 61 e7 b1 02 20 4e 71 e2 13 d7 56 6c 3e 80 |..a... Nq...Vl>.| +peer1.org1.example.com | 00000030 59 f5 1f 86 2b 6a fd 2a 09 ea a7 87 a8 3b cc 26 |Y...+j.*.....;.&| +peer1.org1.example.com | 00000040 11 75 90 ec 24 ae 66 |.u..$.f| +peer1.org1.example.com | [355e 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [355f 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004452640 gate 1602702136701773100 evaluation succeeds +peer1.org1.example.com | [3560 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3541 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [3561 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org1.example.com | [3562 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org1.example.com | [3563 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [3564 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org1.example.com | [3565 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 46ms (state_validation=10ms block_and_pvtdata_commit=23ms state_commit=9ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org1.example.com | [3566 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org1.example.com | [3567 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3568 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [37f3 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 principal evaluation fails +peer0.org2.example.com | [37f4 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1c80 gate 1602702140380740100 evaluation fails +peer0.org2.example.com | [37f5 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37f6 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37f7 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [37f8 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 gate 1602702140382911100 evaluation starts +peer0.org2.example.com | [37f9 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37fa 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [37fb 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 principal matched by identity 0 +peer0.org2.example.com | [37fc 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 32 67 85 ff 47 af 20 ff 06 2c 2e 97 a3 f4 26 |.2g..G. ..,....&| +peer0.org2.example.com | 00000010 d2 36 9e bb 3d 43 7e 64 be 4d 75 0b 7b 29 28 ce |.6..=C~d.Mu.{)(.| +peer0.org2.example.com | [37fd 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 f7 1f 36 a6 82 14 b6 a3 06 2e |0E.!....6.......| +peer0.org2.example.com | 00000010 81 8e 2f b8 3d d2 43 41 5a cd 1b f4 f9 ba ad 8c |../.=.CAZ.......| +peer0.org2.example.com | 00000020 09 6a 45 ed 1d 02 20 2c e3 e7 51 be 84 a8 e1 5d |.jE... ,..Q....]| +peer0.org2.example.com | 00000030 fc 06 41 31 3b fc 07 82 c5 92 f4 77 1b 36 73 24 |..A1;......w.6s$| +peer0.org2.example.com | 00000040 be 1a e1 bb 6f 9e 2b |....o.+| +peer0.org2.example.com | [37fe 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [37ff 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040041f0 gate 1602702140382911100 evaluation succeeds +peer0.org2.example.com | [3800 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3801 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3802 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3803 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3804 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3805 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3806 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3809 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3807 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3808 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [380a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [380c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [380d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [380b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [380e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [380f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3810 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3812 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3811 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3813 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3814 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3815 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3816 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3817 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3818 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3819 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381a 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381b 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381c 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381d 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [381e 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381f 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3820 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3821 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3822 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3823 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3824 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3825 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3826 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3827 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3828 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3829 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [382a 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [382b 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [382c 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [382d 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [382e 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [382f 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3830 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 gate 1602702140567340300 evaluation starts +peer0.org2.example.com | [3831 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3832 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3833 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3834 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 principal evaluation fails +peer0.org2.example.com | [3835 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030890 gate 1602702140567340300 evaluation fails +peer0.org2.example.com | [3836 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3837 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3838 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3839 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 gate 1602702140570696800 evaluation starts +peer0.org2.example.com | [383a 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [383b 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [383c 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 principal matched by identity 0 +peer0.org2.example.com | [383d 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f5 06 de e8 3f bd a0 81 2f 79 2f a3 0b 2f 18 |N....?.../y/../.| +peer0.org2.example.com | 00000010 91 ea ba 0c d9 0b 46 f7 6f ee da be 65 10 ec 0c |......F.o...e...| +peer0.org2.example.com | [383e 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 10 f8 c9 eb 59 ae 86 e9 57 3f |0E.!......Y...W?| +peer0.org2.example.com | 00000010 a0 f7 dc 42 a0 dc e2 5c ee 2a 7b d3 fe 33 84 0f |...B...\.*{..3..| +peer0.org2.example.com | 00000020 4e d7 5b ad 97 02 20 7f 94 b5 34 8f ce 81 dc 07 |N.[... ...4.....| +peer0.org2.example.com | 00000030 3a 81 57 4f 17 a7 87 8c e3 bc 0d d4 7b 66 ab a7 |:.WO........{f..| +peer0.org2.example.com | 00000040 6d 42 1b fd 66 4a d6 |mB..fJ.| +peer0.org2.example.com | [383f 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3840 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004030e00 gate 1602702140570696800 evaluation succeeds +peer0.org2.example.com | [3841 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3842 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3843 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3844 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3845 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3846 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3847 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3848 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3849 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [384a 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [384b 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [384c 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [384d 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [384e 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [389b 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [389c 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [389f 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [38a0 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [389d 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [389e 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [38a1 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0038df500)} +peer1.org2.example.com | [38a2 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [38a3 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [38a4 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [38a5 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [38a6 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org2.example.com | [38a7 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org2.example.com | [38a8 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [38a9 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [38aa 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38ab 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38ac 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38ad 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35ab 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35ac 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [35ad 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [35ae 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [35af 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 gate 1602702126706502900 evaluation starts +peer0.org1.example.com | [35b0 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35b1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [35b2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 principal matched by identity 0 +peer0.org1.example.com | [35b3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +peer0.org1.example.com | 00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +peer0.org1.example.com | [35b4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +peer0.org1.example.com | 00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +peer0.org1.example.com | 00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +peer0.org1.example.com | 00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc004269a00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [35b6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 gate 1602702126706502900 evaluation succeeds +peer0.org1.example.com | [35b7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35b8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35b9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [35ba 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [35bb 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35bc 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35bd 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [35be 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +peer0.org1.example.com | 00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +peer0.org1.example.com | [35bf 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +peer0.org1.example.com | 00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +peer0.org1.example.com | 00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +peer0.org1.example.com | 00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +peer0.org1.example.com | 00000040 95 9d 30 8f b6 76 |..0..v| +peer0.org1.example.com | [35c0 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35c1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35c2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [35c3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer0.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer0.org1.example.com | [35c4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer0.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer0.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer0.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer0.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer0.org1.example.com | [35c5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35c6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35c7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35c8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35c9 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [35ca 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35cb 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [35cc 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [35cd 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +peer0.org1.example.com | 00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +peer0.org1.example.com | [35ce 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +peer0.org1.example.com | 00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +peer0.org1.example.com | 00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +peer0.org1.example.com | 00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +peer0.org1.example.com | 00000040 fe a0 44 eb 94 f6 1e |..D....| +peer0.org1.example.com | [35cf 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [35d0 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 57 e8 fc 01 ef e6 02 22 0c 81 7c |0D. 0W......"..|| +peer0.org1.example.com | 00000010 f5 1c 83 94 ac e5 b0 4c c0 0b e7 c2 dd 22 e7 09 |.......L....."..| +peer0.org1.example.com | 00000020 76 ea 9a a6 02 20 3c 23 52 78 cf ce b2 8f fb a2 |v.... <#Rx......| +peer0.org1.example.com | 00000030 8a 3a 5a 99 48 46 ca 76 52 18 7e 06 bd 79 93 25 |.:Z.HF.vR.~..y.%| +peer0.org1.example.com | 00000040 3d 20 2a 7c 68 06 |= *|h.| +peer0.org1.example.com | [35d1 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [35d2 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [35d3 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35d4 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35d5 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [35d6 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [35d7 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35d8 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35d9 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35da 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35db 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org1.example.com | [3569 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [356a 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [356b 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [356c 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [356d 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103A +peer1.org1.example.com | [356e 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31CBF5E7C98546ED5B04912BEC81CEA387FE2FF7B4BBE2801052BBCC4C10965E +peer1.org1.example.com | [356f 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3570 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3571 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3572 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3573 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3574 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:10912341937971802934 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3575 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:10912341937971802934 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [3576 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3577 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [3578 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.789Z grpc.peer_address=172.18.0.7:38708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=124.3µs +peer1.org1.example.com | [3579 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [357a 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [357b 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [357c 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:38708 +peer1.org1.example.com | [357d 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:38708 +peer1.org1.example.com | [357e 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [357f 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3580 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3581 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3582 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3583 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3584 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3585 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3586 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3587 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3588 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3589 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 gate 1602702136800498400 evaluation starts +peer1.org1.example.com | [358a 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [358b 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [358c 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [358d 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 principal evaluation fails +peer1.org1.example.com | [358e 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bb540 gate 1602702136800498400 evaluation fails +peer1.org1.example.com | [358f 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3590 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3591 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3592 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 gate 1602702136801199900 evaluation starts +peer1.org1.example.com | [3593 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3594 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3595 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 principal matched by identity 0 +peer1.org1.example.com | [3596 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [3597 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 14 7d 18 ce 92 ce 26 2a 1e 4f ff |0D. 9.}....&*.O.| +peer1.org1.example.com | 00000010 e5 d4 08 09 38 36 12 61 48 5c c2 ef a3 f1 d4 41 |....86.aH\.....A| +peer1.org1.example.com | 00000020 32 02 98 5d 02 20 0a 95 6e c5 af 6d 9c 87 04 eb |2..]. ..n..m....| +peer1.org1.example.com | 00000030 99 ad b9 22 69 88 cc 32 f5 c0 f6 bc d1 ca 0e b7 |..."i..2........| +peer1.org1.example.com | 00000040 09 b0 da 08 1e cd |......| +peer1.org1.example.com | [3598 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3599 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bbab0 gate 1602702136801199900 evaluation succeeds +peer1.org1.example.com | [359a 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [359b 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [359c 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [359d 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [359e 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:38708 +peer1.org1.example.com | [359f 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:38708 +peer1.org1.example.com | [35a0 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [35a1 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [35a2 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 10912341937971802934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a3 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35a4 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 10912341937971802934, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org1.example.com | [35a5 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [35a6 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +peer1.org1.example.com | 00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +peer1.org1.example.com | [35a7 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +peer1.org1.example.com | 00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +peer1.org1.example.com | 00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +peer1.org1.example.com | 00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +peer1.org1.example.com | 00000040 19 3c b2 fe e4 20 |.<... | +peer1.org1.example.com | [35a8 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35a9 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [35aa 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ab 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ac 10-14 19:02:17.25 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ]] +peer1.org1.example.com | [35ad 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:19.895Z grpc.peer_address=172.18.0.5:41816 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=166µs +peer1.org1.example.com | [35ae 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [35af 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [35b0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [35b1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 69 bytes to 172.18.0.5:41816 +peer1.org1.example.com | [35b2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:41816 +peer1.org1.example.com | [35b3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [35b4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb 01 a0 22 73 82 13 d5 88 66 05 |0E.!...."s....f.| +peer1.org1.example.com | 00000010 ca ef 97 d0 12 b6 20 66 5d 6f 1d a3 07 3f 7e e6 |...... f]o...?~.| +peer1.org1.example.com | 00000020 e9 ef 57 11 cf 02 20 19 3b cf 80 13 0f 1f 1a 72 |..W... .;......r| +peer1.org1.example.com | 00000030 66 98 80 ba 49 eb d9 4b 19 9f f2 5c 38 9f a2 b7 |f...I..K...\8...| +peer1.org1.example.com | 00000040 99 01 2a ae 3f 20 25 |..*.? %| +peer1.org1.example.com | [35b5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:41816 +peer1.org1.example.com | [35b6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:41816 +peer1.org1.example.com | [35b7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [35b8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35b9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ba 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35bb 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [384f 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3850 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3851 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3852 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3853 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3854 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3855 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3856 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3857 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3858 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3859 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [385a 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [385b 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [385c 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [385d 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [385e 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [385f 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3860 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3861 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3862 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3863 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3864 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3865 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3866 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3867 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3868 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3869 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [386a 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [386b 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [386c 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [386d 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [386e 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3870 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3871 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3872 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3873 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3874 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3875 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3876 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [386f 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3877 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3879 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [387a 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3878 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [387b 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [387c 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [387d 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [387e 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [387f 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3880 10-14 19:02:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3881 10-14 19:02:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3882 10-14 19:02:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3883 10-14 19:02:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3884 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161034 +peer0.org2.example.com | [3885 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ABE5C8BCD3B8ACB4704FEE1BF1B0D261830ED0A048329F6EABB23ED8B61C5E13 +peer0.org2.example.com | [3886 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3887 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3888 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3889 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [388a 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [38ae 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [38af 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38b0 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38b1 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38b2 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38b3 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [38b4 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | [38b5 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +peer1.org2.example.com | txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +peer1.org2.example.com | ] +peer1.org2.example.com | [38b6 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to txid-index +peer1.org2.example.com | [38b7 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 gate 1602702136630584700 evaluation starts +peer1.org2.example.com | [38b8 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38b9 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [38ba 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [38bb 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 principal evaluation fails +peer1.org2.example.com | [38bc 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e1ae0 gate 1602702136630584700 evaluation fails +peer1.org2.example.com | [38bd 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38be 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38bf 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [38c0 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 gate 1602702136640160700 evaluation starts +peer1.org2.example.com | [38c1 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38c2 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [38c3 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [38c4 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx number:[0] ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to blockNumTranNum index +peer1.org2.example.com | [38c5 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 principal evaluation fails +peer1.org2.example.com | [38c6 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2070 gate 1602702136640160700 evaluation fails +peer1.org2.example.com | [38c7 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [38c8 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [38c9 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38ca 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 gate 1602702136640587700 evaluation starts +peer1.org2.example.com | [38cb 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38cc 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [38cd 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [38ce 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [38cf 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [38d0 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 principal matched by identity 0 +peer1.org2.example.com | [38d1 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [38d2 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 4e be 40 f3 fd ad 7c f1 59 86 18 |0D. (N.@...|.Y..| +peer1.org2.example.com | 00000010 79 89 66 0d a0 2e af 70 1f 67 a9 ad dc c5 30 4c |y.f....p.g....0L| +peer1.org2.example.com | 00000020 40 f8 78 19 02 20 6b ac 90 f4 58 1a 6d 7b bb 4e |@.x.. k...X.m{.N| +peer1.org2.example.com | 00000030 d5 e2 d9 e9 37 8e 1d f3 90 27 ed a0 34 d8 ec 37 |....7....'..4..7| +peer1.org2.example.com | 00000040 bf 7d 92 d6 d8 2c |.}...,| +peer1.org2.example.com | [38d3 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38d4 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2600 gate 1602702136640587700 evaluation succeeds +peer1.org2.example.com | [38d5 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38d6 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38d7 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38d8 10-14 19:02:16.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38d9 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org2.example.com | [38da 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38db 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [38dd 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161033 +peer1.org2.example.com | [38de 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 21FA468C2019364AE3AEC2A4FBB2786DE75FA34B10BD0ABFC5AC6E2A6D57ABFE +peer1.org2.example.com | [38df 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [38dc 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [38e0 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [38e1 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [38e2 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38e3 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7454465162230153873 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [38e4 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7454465162230153873 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer1.org2.example.com | [38e5 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38e6 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138781], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [38e7 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [38e8 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | [38e9 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org2.example.com | [38ea 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [38eb 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [38ec 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [38ed 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [38ee 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [38ef 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [38f0 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | [38f1 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [38f2 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | [38f3 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org2.example.com | [38f4 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [38f5 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | [38f6 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org2.example.com | [38f7 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer1.org2.example.com | [38f8 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 75ms (state_validation=20ms block_and_pvtdata_commit=36ms state_commit=10ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer1.org2.example.com | [38f9 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org2.example.com | [38fa 10-14 19:02:16.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [38fb 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [38fc 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:45620 disconnected +peer1.org2.example.com | [38fd 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:45620 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m6.7761495s +peer1.org2.example.com | [38fe 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [38ff 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:19.884Z grpc.peer_address=172.18.0.5:45768 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.1µs +peer1.org2.example.com | [3900 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3901 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [3902 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer0.org2.example.com | [388b 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [388c 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [388e 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388d 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [388f 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3890 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3891 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3892 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3893 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3894 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3895 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3896 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3897 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3898 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3899 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer0.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer0.org2.example.com | [389a 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer0.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer0.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer0.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer0.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer0.org2.example.com | [389b 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [389c 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 9b 31 88 80 01 81 dc 4d fe 2d 91 |0D. i.1.....M.-.| +peer0.org2.example.com | 00000010 fe de a9 e4 a0 3b 73 07 10 fc 57 25 33 a4 cd 79 |.....;s...W%3..y| +peer0.org2.example.com | 00000020 a2 5f 54 94 02 20 6c c9 39 5d b6 9f 35 8f aa a0 |._T.. l.9]..5...| +peer0.org2.example.com | 00000030 28 52 ab c9 10 20 ce b0 e9 dd 88 9c 24 ff 92 58 |(R... ......$..X| +peer0.org2.example.com | 00000040 f7 57 0b aa dd 7c |.W...|| +peer0.org2.example.com | [389d 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [389e 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [389f 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38a0 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38a1 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38a2 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38a3 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38a4 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38a5 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [38a6 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer0.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer0.org2.example.com | [38a7 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer0.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer0.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer0.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer0.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer0.org2.example.com | [38a8 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [38a9 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [38aa 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38ab 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38ac 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38ad 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38ae 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38af 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [38b0 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [38b1 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer0.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer0.org2.example.com | [38b2 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer0.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer0.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer0.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer0.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer0.org2.example.com | [38b3 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [38b4 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [38b5 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38b6 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38b7 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [38b8 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [38b9 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [38ba 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [38bb 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38bc 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [38bd 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [38be 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38bf 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c0 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c1 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38c2 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [38c3 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [38c4 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35dc 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [35dd 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [35de 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [35df 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4f 71 f5 94 f7 a0 ad 68 8e 46 da df 09 0a 25 |.Oq.....h.F....%| +peer0.org1.example.com | 00000010 c8 60 68 89 dc ac 4d f2 91 7e 48 a5 ff 82 df 2c |.`h...M..~H....,| +peer0.org1.example.com | [35e0 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 0f 69 5a f8 b0 ec 8a af 14 b5 40 |0D. ..iZ.......@| +peer0.org1.example.com | 00000010 4a 67 19 56 e4 44 59 54 c7 03 df e6 e8 1c e1 7e |Jg.V.DYT.......~| +peer0.org1.example.com | 00000020 e4 f6 c2 f8 02 20 6b dd 9c f5 6c b4 28 f1 c9 20 |..... k...l.(.. | +peer0.org1.example.com | 00000030 2b 22 bd 09 2c c9 3c 46 bb f9 18 4c 65 37 48 4b |+"..,. DEBU Exiting +peer0.org1.example.com | [35e2 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35e3 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35e4 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [35e5 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [35e6 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35e7 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35e8 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [35e9 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [35ea 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35eb 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [35ec 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35ed 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [35ee 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35ef 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f0 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [35f1 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [35f2 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [35f3 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [35f4 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f5 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35f6 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35f7 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35f8 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f9 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35fa 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35fb 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [35fc 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [35fd 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [35fe 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 gate 1602702129902313200 evaluation starts +peer0.org1.example.com | [35ff 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3600 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3601 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 principal matched by identity 0 +peer0.org1.example.com | [3602 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3603 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3604 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3605 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 gate 1602702129902313200 evaluation succeeds +peer0.org1.example.com | [3606 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3607 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3608 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3609 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [360a 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360b 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360c 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [360d 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [360e 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [360f 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3610 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3611 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3612 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 gate 1602702129904603400 evaluation starts +peer0.org1.example.com | [3613 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3614 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3615 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 principal matched by identity 0 +peer0.org1.example.com | [3616 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3617 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3618 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3619 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 gate 1602702129904603400 evaluation succeeds +peer0.org1.example.com | [361a 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [361b 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [361c 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [361d 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [361e 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [361f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3620 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3621 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3622 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3623 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3624 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3625 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3626 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3627 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3628 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3629 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [362a 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [362b 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [362c 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [362d 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 gate 1602702129914338300 evaluation starts +peer0.org1.example.com | [362e 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [362f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3630 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 principal matched by identity 0 +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [35bc 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35bd 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [35be 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [35bf 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [35c0 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35c1 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35c2 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35c3 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35c4 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [35c5 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35c6 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [35c7 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 gate 1602702137913475800 evaluation starts +peer1.org1.example.com | [35c8 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35c9 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [35ca 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [35cb 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [35cc 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [35cd 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 principal matched by identity 0 +peer1.org1.example.com | [35ce 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [35cf 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [35d0 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [35d1 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045308f0 gate 1602702137913475800 evaluation succeeds +peer1.org1.example.com | [35d2 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [35d3 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [35d4 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [35d5 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [35d6 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35d7 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d8 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35d9 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [35da 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35db 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [35de 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35dc 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35dd 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [35df 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e0 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [35e1 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [35e2 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | [38c5 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [38c6 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [38c7 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer0.org2.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer0.org2.example.com | [38c8 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer0.org2.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer0.org2.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer0.org2.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer0.org2.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer0.org2.example.com | [38c9 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [38ca 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 c3 01 14 54 73 c1 39 d0 8e bf |0E.!.....Ts.9...| +peer0.org2.example.com | 00000010 1b 73 75 05 01 b6 0d 22 6c 49 4a c3 01 74 ce f7 |.su...."lIJ..t..| +peer0.org2.example.com | 00000020 6f bb d0 0a c5 02 20 20 c4 20 c8 b5 03 f0 22 27 |o..... . ...."'| +peer0.org2.example.com | 00000030 00 78 db cc d9 3e 5f 76 83 ab a9 07 01 1e 2d 06 |.x...>_v......-.| +peer0.org2.example.com | 00000040 f4 a0 c6 6c f5 57 e0 |...l.W.| +peer0.org2.example.com | [38cb 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [38cc 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [38cd 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [38ce 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [38cf 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [38d0 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38d1 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38d2 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38d3 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [38d4 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38d5 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38d6 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [38d7 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > alive:5\242\302\336\r2\354V\331\353\010r\273)\321\202lP:\267\366W\343\272\342w\325\002 ch\025\r\230A\277\244\354L\362\377K^\0312;W\270\245\350\207wgur\236\314\246\364\337>" > +peer0.org2.example.com | [38d8 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [38d9 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38da 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [38db 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [38dc 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [38dd 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38de 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38df 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38e0 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38e1 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38e2 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38e3 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [38e4 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38e5 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3903 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.5:45768 +peer1.org2.example.com | [3904 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.5:45768 +peer1.org2.example.com | [3905 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3906 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3907 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3908 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3909 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3631 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3632 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3633 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3634 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 gate 1602702129914338300 evaluation succeeds +peer0.org1.example.com | [3635 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3636 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3637 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3638 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3639 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [363a 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [363b 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [363c 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [363d 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [363e 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [363f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3640 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3641 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 gate 1602702129919183600 evaluation starts +peer0.org1.example.com | [3642 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3643 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3644 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 principal matched by identity 0 +peer0.org1.example.com | [3645 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3646 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3647 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3648 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 gate 1602702129919183600 evaluation succeeds +peer0.org1.example.com | [3649 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [364a 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [364b 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [364c 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [364d 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364e 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [364f 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3650 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3651 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3652 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3653 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3654 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3655 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3656 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3657 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3658 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3659 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [365a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [365b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [365c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 gate 1602702129932321500 evaluation starts +peer0.org1.example.com | [365d 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [365e 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [365f 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 principal matched by identity 0 +peer0.org1.example.com | [3660 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3661 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3662 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38e6 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [390a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [390b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3663 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 gate 1602702129932321500 evaluation succeeds +peer1.org2.example.com | [390c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [390d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | [3664 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | [38e7 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [390e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [390f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3665 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [38e8 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3910 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 gate 1602702137917365200 evaluation starts +peer0.org2.example.com | [38e9 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3666 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [38ea 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3667 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3911 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38eb 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3668 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3669 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38ec 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38ed 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [38ee 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [38ef 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [38f0 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [38f1 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 gate 1602702142514619900 evaluation starts +peer0.org2.example.com | [38f2 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38f3 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [38f4 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [366a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [366b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [366c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [366d 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35e3 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [366e 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35e4 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38f5 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 principal evaluation fails +peer1.org2.example.com | [3912 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [366f 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [35e5 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [35e6 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [35e7 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | [3670 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 gate 1602702129934297700 evaluation starts +peer0.org1.example.com | [3671 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | [3672 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3673 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 principal matched by identity 0 +peer0.org2.example.com | [38f6 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e4e40 gate 1602702142514619900 evaluation fails +peer0.org2.example.com | [38f7 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38f8 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38f9 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3674 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3675 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3676 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3677 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 gate 1602702129934297700 evaluation succeeds +peer0.org1.example.com | [3678 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3679 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [367a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [367b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [367c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [367d 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367e 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [367f 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3680 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3681 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3682 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3683 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3684 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3685 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3686 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3687 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3688 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3689 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [368a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [368b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [368c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [368d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [368e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [368f 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3690 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3691 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3692 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3693 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3694 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3695 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3696 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3697 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3698 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3699 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [369a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [369b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [369c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [369d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [369e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [369f 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 gate 1602702130145529700 evaluation starts +peer0.org1.example.com | [36a0 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36a1 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [36a2 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 principal matched by identity 0 +peer0.org1.example.com | [36a3 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 5d 3c c2 cc e2 10 84 6a ae 1f 66 b0 4f 61 38 |.]<.....j..f.Oa8| +peer0.org1.example.com | 00000010 0c 28 75 de f3 cc 5d 1a c4 b8 09 71 1c cf 80 7a |.(u...]....q...z| +peer0.org1.example.com | [36a4 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b3 01 ac b8 85 1e 71 e6 7a b2 |0E.!........q.z.| +peer0.org1.example.com | 00000010 50 e4 29 5c f1 cc 96 05 12 c0 11 82 f7 38 ee 08 |P.)\.........8..| +peer0.org1.example.com | 00000020 e1 b9 19 33 9f 02 20 43 94 8b 01 e7 df 5e 71 36 |...3.. C.....^q6| +peer0.org1.example.com | 00000030 8a 22 fd 4d 18 5f 45 e0 96 d2 7d b4 c6 d4 92 50 |.".M._E...}....P| +peer0.org1.example.com | 00000040 78 69 8c d9 43 3d d4 |xi..C=.| +peer0.org1.example.com | [36a5 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [36a6 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 gate 1602702130145529700 evaluation succeeds +peer0.org1.example.com | [36a7 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36a8 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36a9 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36aa 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36ab 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36ac 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [36ad 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [36ae 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [36af 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [36b0 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b1 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b2 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b3 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36b4 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36b5 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b6 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36b7 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b8 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [35e8 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35e9 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ea 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [35eb 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [35ec 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [35ed 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35ee 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [35ef 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f0 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f1 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f2 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f3 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f4 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f5 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35f6 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [35f7 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35f8 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [35f9 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35fa 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [35fb 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [35fc 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35fd 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35fe 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35ff 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3600 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3601 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3602 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3603 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 gate 1602702138155157300 evaluation starts +peer1.org1.example.com | [3604 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3605 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3606 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3607 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 principal evaluation fails +peer1.org1.example.com | [3608 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d300 gate 1602702138155157300 evaluation fails +peer1.org1.example.com | [3609 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [360a 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [360b 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [360c 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 gate 1602702138156078400 evaluation starts +peer1.org1.example.com | [360d 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [360e 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [360f 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 principal matched by identity 0 +peer1.org1.example.com | [3610 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer1.org1.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer1.org1.example.com | [3611 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer1.org1.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer1.org1.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer1.org1.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer1.org1.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer1.org1.example.com | [3612 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3613 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455d870 gate 1602702138156078400 evaluation succeeds +peer1.org1.example.com | [3614 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3615 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3616 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3617 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3618 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3619 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [361a 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [361b 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [361c 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [361d 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361e 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [361f 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3913 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3914 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 principal evaluation fails +peer1.org2.example.com | [3915 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54090 gate 1602702137917365200 evaluation fails +peer1.org2.example.com | [3916 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3917 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3918 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3919 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 gate 1602702137918917700 evaluation starts +peer1.org2.example.com | [391a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [391b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [391c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [391d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 principal evaluation fails +peer1.org2.example.com | [391e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54600 gate 1602702137918917700 evaluation fails +peer1.org2.example.com | [391f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3920 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3921 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3922 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 gate 1602702137919267800 evaluation starts +peer1.org2.example.com | [3923 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3924 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3925 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 principal matched by identity 0 +peer1.org2.example.com | [3926 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [3927 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 dd cf 52 2b 4d e4 71 e9 13 14 |0E.!....R+M.q...| +peer1.org2.example.com | 00000010 ce ee 45 ae e7 69 f6 55 34 7a af 45 f6 11 d9 7f |..E..i.U4z.E....| +peer1.org2.example.com | 00000020 58 97 e2 11 87 02 20 35 ff 76 57 0c 61 67 57 01 |X..... 5.vW.agW.| +peer1.org2.example.com | 00000030 c0 64 76 68 7c 71 ce 4a 39 cf 12 1c a1 af 5c 40 |.dvh|q.J9.....\@| +peer1.org2.example.com | 00000040 f0 9e 70 a8 e9 41 9a |..p..A.| +peer1.org2.example.com | [3928 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3929 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b54b70 gate 1602702137919267800 evaluation succeeds +peer1.org2.example.com | [392a 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [392b 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [392c 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [392d 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [392e 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:45768 +peer1.org2.example.com | [392f 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:45768 +peer1.org2.example.com | [3930 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3931 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3932 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36b9 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ba 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36bb 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36bc 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bd 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36be 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bf 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c0 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c1 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c2 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c3 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [36c4 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36c5 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [36c6 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36c7 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36c8 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36c9 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ca 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [36cb 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [36cc 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36cd 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [36ce 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [36cf 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36d0 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36d1 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36d2 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36d3 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36d4 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36d5 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [36d6 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 gate 1602702130188139800 evaluation starts +peer0.org1.example.com | [36d7 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36d8 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [36d9 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 principal matched by identity 0 +peer0.org1.example.com | [36da 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer0.org1.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer0.org1.example.com | [36db 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer0.org1.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer0.org1.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer0.org1.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer0.org1.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer0.org1.example.com | [36dc 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [36dd 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 gate 1602702130188139800 evaluation succeeds +peer0.org1.example.com | [36de 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36df 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36e0 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36e1 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3620 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3621 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3622 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3623 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3624 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > alive: dead: +peer1.org1.example.com | [3625 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3626 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3627 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3628 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3629 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [362a 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [362b 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [362c 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [362d 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [362e 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0D0DF898CA1FC9E16...08071A0C0A0565787030321203312E30 +peer1.org1.example.com | [362f 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3996CB4B66F4C65477DA753712B38277178E8B58810989EE753BBA46AABF6CE0 +peer1.org1.example.com | [3630 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3631 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3632 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3633 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3634 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3635 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3636 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3637 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU[0m Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3638 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3639 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [363a 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [363b 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [363c 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [363d 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [363e 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [363f 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [3640 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3641 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3642 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3644 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3645 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3646 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3647 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3648 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3649 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 gate 1602702138235462300 evaluation starts +peer1.org1.example.com | [364a 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3643 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364b 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [364c 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [364d 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 principal evaluation fails +peer1.org1.example.com | [364e 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1930 gate 1602702138235462300 evaluation fails +peer1.org1.example.com | [364f 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3651 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3652 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3653 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 gate 1602702138237324300 evaluation starts +peer1.org1.example.com | [3654 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3650 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3655 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3656 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [3657 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 principal matched by identity 0 +peer1.org1.example.com | [3659 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [365b 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [365a 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [365c 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [3658 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [365e 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [365f 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a1ea0 gate 1602702138237324300 evaluation succeeds +peer1.org1.example.com | [3660 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3661 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3662 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3663 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3664 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3665 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3666 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3667 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3669 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3668 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [365d 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [366b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [366a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [366c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [366d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [366e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [366f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3670 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 gate 1602702138245828300 evaluation starts +peer0.org1.example.com | [36e2 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [36e3 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [36e4 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [36e5 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [36e6 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [36e7 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e8 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e9 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ea 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [36eb 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ec 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ed 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36ee 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [36ef 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [36f0 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36f1 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +peer0.org1.example.com | [36f2 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36f3 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36f4 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36f5 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36f6 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [36f7 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38fa 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 gate 1602702142516058800 evaluation starts +peer0.org2.example.com | [38fb 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [38fc 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [38fd 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 principal matched by identity 0 +peer0.org2.example.com | [38fe 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer0.org2.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer0.org2.example.com | [38ff 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer0.org2.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer0.org2.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer0.org2.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer0.org2.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer0.org2.example.com | [3900 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3901 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e53b0 gate 1602702142516058800 evaluation succeeds +peer0.org2.example.com | [3902 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3903 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3904 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3905 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3906 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3907 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3908 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3909 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [390a 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [390b 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [390c 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [390d 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [390e 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [390f 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3910 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3911 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3912 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3913 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > alive: alive:5\242\302\336\r2\354V\331\353\010r\273)\321\202lP:\267\366W\343\272\342w\325\002 ch\025\r\230A\277\244\354L\362\377K^\0312;W\270\245\350\207wgur\236\314\246\364\337>" > +peer0.org2.example.com | [3914 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3915 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3916 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3917 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3918 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3919 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391a 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391b 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391c 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391d 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391e 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391f 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3920 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3921 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3922 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3923 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3924 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3925 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3926 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3927 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3928 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3929 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [392a 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [392b 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [392c 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392d 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392e 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [392f 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3930 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3931 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3932 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3933 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3934 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 gate 1602702142570764800 evaluation starts +peer0.org2.example.com | [3935 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3936 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3937 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3938 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 principal evaluation fails +peer0.org1.example.com | [36f8 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36f9 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36fa 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36fb 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36fc 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36fd 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [36fe 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 gate 1602702130243979300 evaluation starts +peer0.org1.example.com | [36ff 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3700 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3701 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 principal matched by identity 0 +peer0.org1.example.com | [3702 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 9f ac 79 45 4e 68 5c 24 72 a5 a8 2c 9c 4a c6 |...yENh\$r..,.J.| +peer0.org1.example.com | 00000010 d0 20 86 ca 47 fa ea 7e 9c 43 0b e3 1f 46 a6 a3 |. ..G..~.C...F..| +peer0.org1.example.com | [3703 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ec f8 74 d7 fc e8 83 63 55 9a c4 |0D. P..t....cU..| +peer0.org1.example.com | 00000010 9a b8 39 29 d1 0b bf cb 15 65 d2 e0 b1 c7 4c bf |..9).....e....L.| +peer0.org1.example.com | 00000020 a1 71 58 b0 02 20 42 b3 6d 3b 29 3a 64 5b 24 cf |.qX.. B.m;):d[$.| +peer0.org1.example.com | 00000030 94 e9 37 32 c6 33 c0 72 e0 55 87 25 b9 0c cd 71 |..72.3.r.U.%...q| +peer0.org1.example.com | 00000040 7d 19 0a 64 f7 c9 |}..d..| +peer0.org1.example.com | [3704 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3705 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 gate 1602702130243979300 evaluation succeeds +peer0.org1.example.com | [3706 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3707 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3708 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3709 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [370a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [370b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [370c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [370d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [370e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [370f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3710 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3711 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3712 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3713 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3714 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3715 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3716 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3717 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3718 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3719 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371a 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371b 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371c 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371d 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371e 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371f 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3720 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3721 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3722 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3723 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3724 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3725 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3726 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3727 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3728 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3729 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [372c 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [372d 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [372e 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [372a 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [372f 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [372b 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3730 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3731 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3732 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3733 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3734 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3735 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3736 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3737 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3738 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3739 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [373a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [373b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [373c 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [373d 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3939 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf410 gate 1602702142570764800 evaluation fails +peer0.org2.example.com | [393a 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [393b 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [393c 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [393d 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 gate 1602702142581868300 evaluation starts +peer0.org2.example.com | [393e 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [393f 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3940 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 principal matched by identity 0 +peer0.org2.example.com | [3941 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3942 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3943 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3944 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3945 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040cf980 gate 1602702142581868300 evaluation succeeds +peer0.org2.example.com | [3946 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3947 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3948 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3949 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [394a 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [394b 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [394c 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [394d 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [394e 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [394f 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3950 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3951 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3952 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 gate 1602702142605504800 evaluation starts +peer0.org2.example.com | [3953 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3954 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3955 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3956 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 principal evaluation fails +peer0.org2.example.com | [3957 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004132b80 gate 1602702142605504800 evaluation fails +peer0.org2.example.com | [3958 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3959 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [395a 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [395b 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 gate 1602702142607601800 evaluation starts +peer0.org2.example.com | [395c 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [395d 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [395e 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 principal matched by identity 0 +peer0.org2.example.com | [395f 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3960 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3961 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3962 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041330f0 gate 1602702142607601800 evaluation succeeds +peer0.org2.example.com | [3963 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3964 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3965 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3966 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3967 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3968 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3969 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [396a 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [396b 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [396c 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [396d 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [396e 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [396f 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3970 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3971 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3972 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3973 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3974 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3975 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3976 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 gate 1602702142609336700 evaluation starts +peer0.org2.example.com | [3977 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3978 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3979 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [397a 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [397b 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 principal evaluation fails +peer0.org2.example.com | [397c 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155320 gate 1602702142609336700 evaluation fails +peer0.org2.example.com | [397d 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [397e 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [397f 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3980 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 gate 1602702142634565600 evaluation starts +peer0.org2.example.com | [3981 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3982 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3983 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 principal matched by identity 0 +peer0.org2.example.com | [3984 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3985 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3986 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3987 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004155890 gate 1602702142634565600 evaluation succeeds +peer0.org2.example.com | [3988 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3989 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [398a 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [398b 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [398c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [398d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [398e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [398f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3990 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3991 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3992 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3993 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3994 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 gate 1602702142652869000 evaluation starts +peer0.org2.example.com | [3995 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3996 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3933 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3934 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3935 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3936 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3937 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3938 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3939 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [393a 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [393b 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [393c 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [393d 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [393e 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [393f 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 gate 1602702137924855500 evaluation starts +peer1.org2.example.com | [3940 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3941 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3942 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3943 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 principal evaluation fails +peer1.org2.example.com | [3944 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72b80 gate 1602702137924855500 evaluation fails +peer1.org2.example.com | [3945 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3946 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3947 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3948 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 gate 1602702137925131800 evaluation starts +peer1.org2.example.com | [3949 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [394a 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [394b 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [394c 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 principal evaluation fails +peer1.org2.example.com | [394d 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b730f0 gate 1602702137925131800 evaluation fails +peer1.org2.example.com | [394e 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [394f 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3950 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3951 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 gate 1602702137925383700 evaluation starts +peer0.org1.example.com | [373e 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [373f 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3740 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3741 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3742 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3743 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3744 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 gate 1602702130314635500 evaluation starts +peer0.org1.example.com | [3745 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3746 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3747 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 principal matched by identity 0 +peer0.org1.example.com | [3748 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer0.org1.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer0.org1.example.com | [3749 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer0.org1.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer0.org1.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer0.org1.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer0.org1.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer0.org1.example.com | [374a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [374b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 gate 1602702130314635500 evaluation succeeds +peer0.org1.example.com | [374c 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [374d 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [374e 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [374f 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3750 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3751 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3752 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3753 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3754 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3755 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3756 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3757 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3758 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3759 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375a 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375b 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375c 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3997 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3998 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 principal evaluation fails +peer0.org2.example.com | [3999 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004174a90 gate 1602702142652869000 evaluation fails +peer0.org2.example.com | [399a 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3671 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3672 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3673 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3674 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 principal evaluation fails +peer1.org1.example.com | [3675 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b310 gate 1602702138245828300 evaluation fails +peer1.org1.example.com | [3676 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3677 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3678 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3679 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 gate 1602702138250857600 evaluation starts +peer1.org1.example.com | [367a 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [367b 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [367c 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [367d 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [367e 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [367f 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 principal matched by identity 0 +peer1.org1.example.com | [3680 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [3681 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [3682 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3683 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458b8a0 gate 1602702138250857600 evaluation succeeds +peer1.org1.example.com | [3684 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3685 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3686 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3687 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3688 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3689 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [368a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [368b 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [368c 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [368d 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer1.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer1.org1.example.com | [368e 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer1.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer1.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer1.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer1.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer1.org1.example.com | [368f 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3690 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3691 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3692 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3693 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3694 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3695 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3696 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3697 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 gate 1602702138277178900 evaluation starts +peer1.org1.example.com | [3698 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3699 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [369a 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [369b 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 principal evaluation fails +peer1.org1.example.com | [369c 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e9d60 gate 1602702138277178900 evaluation fails +peer1.org1.example.com | [369d 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [369e 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [369f 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36a0 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 gate 1602702138285097200 evaluation starts +peer1.org1.example.com | [36a1 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36a2 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [36a3 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 principal matched by identity 0 +peer1.org1.example.com | [36a4 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer1.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer1.org1.example.com | [36a5 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer1.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer1.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer1.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer1.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer1.org1.example.com | [36a6 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36a7 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c9460 gate 1602702138285097200 evaluation succeeds +peer1.org1.example.com | [36a8 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36a9 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36aa 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36ab 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36ac 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ad 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36ae 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36af 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36b0 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36b1 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36b2 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36b3 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [36b4 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 gate 1602702138298717700 evaluation starts +peer1.org1.example.com | [36b5 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36b6 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [36b7 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [36b8 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 principal evaluation fails +peer1.org1.example.com | [36b9 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614660 gate 1602702138298717700 evaluation fails +peer1.org1.example.com | [36ba 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36bb 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36bc 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36bd 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 gate 1602702138301522600 evaluation starts +peer1.org1.example.com | [36be 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36bf 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [36c0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 principal matched by identity 0 +peer1.org1.example.com | [36c1 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org1.example.com | [36c2 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org1.example.com | [36c3 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36c4 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614bd0 gate 1602702138301522600 evaluation succeeds +peer1.org1.example.com | [36c5 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36c6 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36c7 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36c8 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36c9 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [375d 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +peer0.org1.example.com | [375e 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [375f 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3760 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3761 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3762 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3763 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3764 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3765 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3766 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3767 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3768 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3769 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 e0 96 01 24 0a 44 d8 43 d6 45 e4 d8 bc 00 1f |....$.D.C.E.....| +peer0.org1.example.com | 00000010 97 d8 77 cb 20 dc 01 ee 7d 9b bd 67 df 19 cd dd |..w. ...}..g....| +peer0.org1.example.com | [376a 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 d9 34 ad ac c8 1b 6c 67 ab 1a |0E.!...4....lg..| +peer0.org1.example.com | 00000010 98 48 8b 7a 08 f8 8c 25 50 ce d2 14 3b 0b 3a b0 |.H.z...%P...;.:.| +peer0.org1.example.com | 00000020 03 a3 0d 12 dc 02 20 48 e7 23 f3 5d e0 ea 88 03 |...... H.#.]....| +peer0.org1.example.com | 00000030 f3 be 38 9e ab 2c ef 54 33 0f d3 f2 54 60 04 60 |..8..,.T3...T`.`| +peer0.org1.example.com | 00000040 7a 74 2c cc 42 42 79 |zt,.BBy| +peer0.org1.example.com | [376b 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [376c 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [376d 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [376e 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [376f 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3770 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3771 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3772 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3773 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3774 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3775 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3776 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3777 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [399b 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [399c 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [399d 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 gate 1602702142653117300 evaluation starts +peer0.org2.example.com | [399e 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [399f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39a0 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 principal matched by identity 0 +peer0.org2.example.com | [39a1 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [39a2 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [39a3 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39a4 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004175000 gate 1602702142653117300 evaluation succeeds +peer0.org2.example.com | [39a5 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39a6 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39a7 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39a8 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39a9 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [39aa 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [39ab 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [39ac 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [39ad 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [39ae 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39af 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [39b0 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39b1 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [39b2 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39b3 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39b4 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39b5 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [39b6 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [39b7 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39b8 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39ba 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39bb 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39bc 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39b9 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39bd 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39be 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39bf 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39c0 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39c1 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [39c2 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 gate 1602702142671360200 evaluation starts +peer0.org2.example.com | [39c3 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39c4 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39c5 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [39c6 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 principal evaluation fails +peer0.org2.example.com | [39c7 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d3a0 gate 1602702142671360200 evaluation fails +peer0.org2.example.com | [39c8 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39c9 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39ca 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39cb 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 gate 1602702142672220700 evaluation starts +peer0.org2.example.com | [39cc 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39cd 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39ce 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 principal matched by identity 0 +peer0.org2.example.com | [39cf 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [39d0 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [39d1 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39d2 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [39d3 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 gate 1602702142672756900 evaluation starts +peer0.org2.example.com | [39d4 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3778 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3779 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [377a 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [377b 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [377c 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [377d 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [377e 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [377f 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3780 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3781 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3782 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3783 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3784 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3785 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3786 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3787 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3788 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3789 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [378a 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [378b 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [378c 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [378d 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer0.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer0.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer0.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer0.org1.example.com | [378f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3790 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 4f 1a ce 76 e2 e2 e4 cb 16 7d |0E.!..O..v.....}| +peer0.org1.example.com | 00000010 b7 b6 b7 23 7d d4 82 13 6d 80 69 be 8b a0 db 7f |...#}...m.i.....| +peer0.org1.example.com | 00000020 c7 00 06 87 92 02 20 5c bf 0b af 8e db e5 f9 87 |...... \........| +peer0.org1.example.com | 00000030 40 7c cf 27 4f 1d 25 1b e4 22 d3 ff 01 b7 81 0b |@|.'O.%.."......| +peer0.org1.example.com | 00000040 df 41 46 2a 13 26 9e |.AF*.&.| +peer0.org1.example.com | [3791 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3792 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3793 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3794 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3795 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3796 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3797 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3798 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3799 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [379a 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379b 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379c 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [379d 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [379e 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [379f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a0 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [37a1 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37a2 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [37a3 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37a4 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [37a5 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37a6 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [37a7 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a8 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [37a9 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37aa 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ab 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ac 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [37ad 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102C +peer0.org1.example.com | [37ae 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1CAB21DAC8D81F4E729A2EDC15C70092A2C02B81F2ABFB3CCB03D6BACE458B77 +peer0.org1.example.com | [37af 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [37b0 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [37b1 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [37b2 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [37b3 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [39d5 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39d6 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [39d7 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 principal evaluation fails +peer0.org2.example.com | [39d8 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2170 gate 1602702142672756900 evaluation fails +peer0.org2.example.com | [39da 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39db 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39dc 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39dd 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 gate 1602702142685225900 evaluation starts +peer0.org2.example.com | [39de 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39df 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39e0 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 principal matched by identity 0 +peer0.org2.example.com | [39e1 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer0.org2.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer0.org2.example.com | [39e2 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer0.org2.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer0.org2.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer0.org2.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer0.org2.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU Obtaining identity +peer0.org2.example.com | [39e4 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39e5 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [39e6 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39e7 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39e8 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [39e9 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [39ea 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39d9 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39eb 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418d910 gate 1602702142672220700 evaluation succeeds +peer0.org2.example.com | [39ec 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39ed 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39ee 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [39ef 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [39f0 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39f1 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39f2 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39f3 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39f4 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39f5 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39f6 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39f7 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [39f8 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 gate 1602702142692588200 evaluation starts +peer1.org2.example.com | [3952 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3953 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3954 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 principal matched by identity 0 +peer1.org2.example.com | [3955 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3956 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3957 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3958 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b73660 gate 1602702137925383700 evaluation succeeds +peer1.org2.example.com | [3959 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [395a 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [395b 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [395c 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [395d 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [395e 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [395f 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3960 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3961 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3962 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3963 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3964 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 gate 1602702137928472400 evaluation starts +peer1.org2.example.com | [3965 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3966 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3967 10-14 19:02:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3968 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 principal evaluation fails +peer1.org2.example.com | [3969 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92250 gate 1602702137928472400 evaluation fails +peer1.org2.example.com | [396a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [396b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [396c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [396d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [396e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 gate 1602702137931670300 evaluation starts +peer1.org2.example.com | [396f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3970 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3971 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3972 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 principal evaluation fails +peer1.org2.example.com | [3973 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b927c0 gate 1602702137931670300 evaluation fails +peer1.org2.example.com | [3974 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3975 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3976 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3977 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 gate 1602702137934316100 evaluation starts +peer1.org2.example.com | [3978 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3979 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [397a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 principal matched by identity 0 +peer1.org2.example.com | [397b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [397c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [397d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [397e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b92d30 gate 1602702137934316100 evaluation succeeds +peer1.org2.example.com | [397f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3980 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [37b4 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b5 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b6 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37b7 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b8 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [37b9 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ba 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37bb 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [37bc 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [37bd 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37be 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bf 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37c0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37c1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [37c2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37c3 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [37c4 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [37c5 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37c6 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c7 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37c8 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c9 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37ca 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39f9 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39fa 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [39fb 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [39fc 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 principal evaluation fails +peer0.org2.example.com | [39fd 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3960 gate 1602702142692588200 evaluation fails +peer0.org2.example.com | [39ff 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a00 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418df70 gate 1602702142685225900 evaluation succeeds +peer0.org2.example.com | [3a01 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a02 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a03 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a04 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a05 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a06 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3a07 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3a08 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3a09 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3a0a 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a0b 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a0c 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a0d 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3a0e 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39fe 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a0f 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a10 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a11 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a12 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a13 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 gate 1602702142694048100 evaluation starts +peer0.org2.example.com | [3a14 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a15 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a16 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > alive:5\242\302\336\r2\354V\331\353\010r\273)\321\202lP:\267\366W\343\272\342w\325\002 ch\025\r\230A\277\244\354L\362\377K^\0312;W\270\245\350\207wgur\236\314\246\364\337>" > +peer0.org2.example.com | [3a17 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a18 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3a19 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a1a 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 principal matched by identity 0 +peer0.org2.example.com | [3a1b 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3a1c 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [36ca 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [36cb 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36cc 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [36cd 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [36ce 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [36cf 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36d0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [36d1 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36d2 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [36d3 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [36d4 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36d5 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36d6 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36d7 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36d8 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36d9 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36da 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [36db 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 gate 1602702138312857600 evaluation starts +peer1.org1.example.com | [36dc 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36dd 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [36de 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [36df 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 principal evaluation fails +peer1.org1.example.com | [36e0 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004632fa0 gate 1602702138312857600 evaluation fails +peer1.org1.example.com | [36e1 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36e2 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36e3 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37cb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37cc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37cd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37ce 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37cf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37d0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d1 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37d2 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d3 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37d4 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [37d5 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c ab 21 da c8 d8 1f 4e 72 9a 2e dc 15 c7 00 92 |..!....Nr.......| +peer0.org1.example.com | 00000010 a2 c0 2b 81 f2 ab fb 3c cb 03 d6 ba ce 45 8b 77 |..+....<.....E.w| +peer0.org1.example.com | [37d6 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 00 4f 74 45 5d c1 d7 a8 7e 53 |0E.!...OtE]...~S| +peer0.org1.example.com | 00000010 23 8e d4 39 88 35 b5 bf bc d3 ea a3 7a bd 2b 60 |#..9.5......z.+`| +peer0.org1.example.com | 00000020 81 0a d8 b3 31 02 20 0d 91 f4 94 02 61 14 eb 32 |....1. .....a..2| +peer0.org1.example.com | 00000030 92 92 0d 3b 35 ea be 7c 92 55 1b d4 b9 f5 bf de |...;5..|.U......| +peer0.org1.example.com | 00000040 19 bf d6 15 e7 c6 f7 |.......| +peer0.org1.example.com | [37d7 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [37d8 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [37da 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102D +peer0.org1.example.com | [37db 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1AA1E1CFC3DCAD916A39CC740FEBB7332D538B66C82A6DE15964548078C3FD3 +peer0.org1.example.com | [37dc 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [37dd 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [37de 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [37df 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37e0 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37e1 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37e2 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37e3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [37e4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [37e5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37e6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [37e7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37e8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [37e9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ea 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [37eb 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ec 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ed 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [37ee 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [37ef 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f0 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37f1 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37f2 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37f3 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37f4 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37f5 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37f6 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 gate 1602702130641376500 evaluation starts +peer0.org1.example.com | [37f7 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37f8 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [37f9 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 principal matched by identity 0 +peer0.org1.example.com | [37fa 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +peer0.org1.example.com | 00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +peer0.org1.example.com | [37fb 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +peer1.org2.example.com | [3981 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3982 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3983 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3984 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3985 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3986 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3987 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3988 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3989 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [398a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [398b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [398c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 gate 1602702137938343600 evaluation starts +peer1.org2.example.com | [398d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [398e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [398f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3990 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 principal evaluation fails +peer1.org2.example.com | [3991 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b93fe0 gate 1602702137938343600 evaluation fails +peer1.org2.example.com | [3992 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3993 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3994 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3995 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 gate 1602702137938854600 evaluation starts +peer1.org2.example.com | [3996 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3997 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3998 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3999 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 principal evaluation fails +peer1.org2.example.com | [399a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0550 gate 1602702137938854600 evaluation fails +peer1.org2.example.com | [399b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [399c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [399d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [399e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 gate 1602702137939418400 evaluation starts +peer1.org2.example.com | [399f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39a0 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [39a1 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 principal matched by identity 0 +peer1.org2.example.com | [39a2 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [39a3 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [39a4 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39a5 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb0ac0 gate 1602702137939418400 evaluation succeeds +peer1.org2.example.com | [39a6 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39a7 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39a8 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39a9 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39aa 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ab 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ac 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ad 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ae 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [39af 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39b0 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39b1 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [39b2 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [39b5 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39b3 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39b4 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 isn't responsive: EOF +peer1.org2.example.com | [39b6 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> WARN Entering [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] +peer1.org2.example.com | [39b7 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer1.org2.example.com | [39b8 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [39b9 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [39ba 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [39bb 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:19.954Z grpc.peer_address=172.18.0.7:37098 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=233.2µs +peer1.org2.example.com | [39bc 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [39bd 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [39be 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [39bf 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:37098 +peer1.org2.example.com | [39c0 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:37098 +peer1.org2.example.com | [39c1 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [39c2 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 7d 91 09 8e 25 d7 bc 69 f8 e8 0f |0D. T}...%..i...| +peer1.org2.example.com | 00000010 05 eb 35 78 0b a8 ac 9b fe 13 2a b9 54 66 00 13 |..5x......*.Tf..| +peer1.org2.example.com | 00000020 35 37 59 83 02 20 73 64 ba 5b 5a 05 37 14 eb 79 |57Y.. sd.[Z.7..y| +peer1.org2.example.com | 00000030 23 eb f0 b6 62 82 c4 ad 46 2e ba 5a 67 36 0b cd |#...b...F..Zg6..| +peer1.org2.example.com | 00000040 6c 0d 01 3f 52 a8 |l..?R.| +peer1.org2.example.com | [39c3 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:37098 +peer1.org2.example.com | [39c4 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:37098 +peer1.org2.example.com | [39c5 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [39c6 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39c7 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39c8 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39c9 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39ca 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36e4 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 gate 1602702138313109200 evaluation starts +peer1.org1.example.com | [36e5 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36e6 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [36e7 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 principal matched by identity 0 +peer1.org1.example.com | [36e8 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org1.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer1.org1.example.com | [36e9 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer1.org1.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer1.org1.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer1.org1.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer1.org1.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer1.org1.example.com | [36ea 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36eb 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633510 gate 1602702138313109200 evaluation succeeds +peer1.org1.example.com | [36ec 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36ed 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36ee 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36ef 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36f0 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [36f1 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [36f2 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [36f3 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [36f4 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [36f5 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36f6 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36f7 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [36f8 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36f9 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fa 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36fb 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [36fc 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: dead: +peer1.org1.example.com | [36fd 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [36fe 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [36ff 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [3700 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [3701 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3702 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610101801 +peer1.org1.example.com | [3703 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6A201B3F1F499E12908DA3CC8EA661707570786EBFDD8C85CF0CDDBE6ED3A7C9 +peer1.org1.example.com | [3704 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [3705 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3706 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3707 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3708 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3709 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370a 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370b 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [370c 10-14 19:02:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370d 10-14 19:02:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [370e 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [370f 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3710 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3712 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3711 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3713 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3714 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3715 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3716 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3717 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3718 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3719 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [371a 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [371b 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [371c 10-14 19:02:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [371d 10-14 19:02:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103B +peer1.org1.example.com | [371e 10-14 19:02:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 19E48B9313C43A9AC8B19A9BAB0A2073D87B3EEB436293162B74DE0EF2577C70 +peer1.org1.example.com | [371f 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3720 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3721 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3722 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3723 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3724 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3725 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3726 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3727 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3728 10-14 19:02:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3729 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372a 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [372b 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [372d 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [372e 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372f 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3730 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3731 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3732 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3733 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3734 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3735 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 gate 1602702138505038400 evaluation starts +peer1.org1.example.com | [3736 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3737 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3738 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3739 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 principal evaluation fails +peer1.org1.example.com | [373a 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046902a0 gate 1602702138505038400 evaluation fails +peer1.org1.example.com | [373b 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [373c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [373d 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [373e 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 gate 1602702138505575000 evaluation starts +peer1.org1.example.com | [373f 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a1d 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a1e 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3ed0 gate 1602702142694048100 evaluation succeeds +peer0.org2.example.com | [3a1f 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a20 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a21 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a22 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a23 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3a24 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3a25 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3a26 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3a27 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a28 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a29 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2a 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2b 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a2c 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2d 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a2e 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a2f 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a30 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a31 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a32 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a33 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a34 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3a35 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a36 10-14 19:02:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3a37 10-14 19:02:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3a38 10-14 19:02:23.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3a39 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a3a 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a3b 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 9c 43 ad ab 90 b3 08 33 29 42 40 46 fb d6 f0 |..C.....3)B@F...| +peer0.org2.example.com | 00000010 21 ae c4 88 7e 8b 47 4d 38 3b 5e c7 aa 2d 0b 3e |!...~.GM8;^..-.>| +peer0.org2.example.com | [3a3c 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 f6 0c 39 fa ae b3 65 e0 67 40 de |0D. c..9...e.g@.| +peer0.org2.example.com | 00000010 6e 68 0c ae 68 8f 53 36 00 8c 59 20 0c 9f 8b 57 |nh..h.S6..Y ...W| +peer0.org2.example.com | 00000020 7e 6c e4 ee 02 20 48 65 18 15 1b 7a db e1 d2 05 |~l... He...z....| +peer0.org2.example.com | 00000030 34 6a 3b cc a7 44 90 98 1e 8d b7 0d 28 db 7c ba |4j;..D......(.|.| +peer0.org2.example.com | 00000040 2e 49 ca 6d 41 e0 |.I.mA.| +peer0.org2.example.com | [3a3d 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a3e 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a3f 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +peer0.org1.example.com | 00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +peer0.org1.example.com | 00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +peer0.org1.example.com | 00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +peer0.org1.example.com | [37fc 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [37fd 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [37fe 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37ff 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 gate 1602702130641376500 evaluation succeeds +peer0.org1.example.com | [3800 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3801 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3802 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3803 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3804 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3805 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3806 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3807 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer0.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer0.org1.example.com | [3808 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer0.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer0.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer0.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer0.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer0.org1.example.com | [3809 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [380a 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [380b 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [380c 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [380d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer0.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer0.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer0.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer0.org1.example.com | [380f 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3810 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3811 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3813 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3814 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3812 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3815 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3816 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer0.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer0.org1.example.com | [3817 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer0.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer0.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer0.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer0.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer0.org1.example.com | [3818 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3819 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 01 7f be 54 a1 0f fd 37 d8 94 b5 |0D. ?...T...7...| +peer0.org1.example.com | 00000010 2a 7f a5 f1 ed 40 11 b7 dc 8f 57 fd 48 6b 09 62 |*....@....W.Hk.b| +peer0.org1.example.com | 00000020 5f b6 d0 7e 02 20 20 7b c6 27 30 03 ea 54 58 2a |_..~. {.'0..TX*| +peer0.org1.example.com | 00000030 cf 14 71 42 3f a9 4a 06 6f 62 50 78 76 f6 c8 30 |..qB?.J.obPxv..0| +peer0.org1.example.com | 00000040 0e 0b 7b 8e 50 b5 |..{.P.| +peer0.org1.example.com | [381a 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [381b 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [381c 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381e 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381f 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3820 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3821 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3822 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3823 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3824 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3825 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3826 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3827 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3828 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 gate 1602702130659649300 evaluation starts +peer0.org1.example.com | [3829 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [382a 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [382b 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 principal matched by identity 0 +peer0.org1.example.com | [382c 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +peer0.org1.example.com | 00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +peer0.org1.example.com | [382d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +peer0.org1.example.com | 00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +peer0.org1.example.com | 00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +peer0.org1.example.com | 00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +peer0.org1.example.com | 00000040 58 a9 ac 57 01 0e ce |X..W...| +peer0.org1.example.com | [382e 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [382f 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 gate 1602702130659649300 evaluation succeeds +peer0.org1.example.com | [3830 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3831 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3832 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3833 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3834 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3835 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3836 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3837 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +peer0.org1.example.com | 00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +peer0.org1.example.com | 00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +peer0.org1.example.com | 00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +peer0.org1.example.com | 00000040 52 05 ce 66 95 2e |R..f..| +peer0.org1.example.com | [3839 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [383a 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [383b 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [383c 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +peer0.org1.example.com | 00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +peer0.org1.example.com | [383d 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +peer0.org1.example.com | 00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +peer0.org1.example.com | 00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +peer0.org1.example.com | 00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +peer0.org1.example.com | 00000040 50 32 87 1f 30 da |P2..0.| +peer0.org1.example.com | [383e 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [383f 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3840 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3841 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3842 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3843 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3844 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3845 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3846 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3847 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3848 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [3849 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 ec ae 06 3c e9 1f b6 df 07 c6 73 56 2d 57 59 |....<......sV-WY| +peer0.org1.example.com | 00000010 5b 5b c0 18 02 76 7d c3 e5 4a ea 7a 95 0e 41 41 |[[...v}..J.z..AA| +peer0.org1.example.com | [384a 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 3b 86 3d 6a 5e d2 50 0a 63 75 9d |0D. .;.=j^.P.cu.| +peer0.org1.example.com | 00000010 5c fb dd ca 50 98 d5 be ba e3 3c e8 28 d7 64 46 |\...P.....<.(.dF| +peer0.org1.example.com | 00000020 f0 79 fa 64 02 20 1d 0c 89 2f 99 51 50 f0 79 5a |.y.d. .../.QP.yZ| +peer0.org1.example.com | 00000030 e5 43 ac e9 a7 ff 90 92 f5 0b a9 df 69 86 46 fb |.C..........i.F.| +peer0.org1.example.com | 00000040 57 27 80 e6 76 ce |W'..v.| +peer0.org1.example.com | [384b 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [384c 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384d 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384e 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [384f 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [3850 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3851 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3852 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3853 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3854 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3855 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3856 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3857 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3858 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3859 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [385a 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [39cb 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39cc 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [39cd 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 gate 1602702137968315200 evaluation starts +peer1.org2.example.com | [39ce 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39cf 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [39d0 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [39d1 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 principal evaluation fails +peer1.org2.example.com | [39d2 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c225f0 gate 1602702137968315200 evaluation fails +peer1.org2.example.com | [39d3 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39d4 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [39d5 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [39d6 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 gate 1602702137969119000 evaluation starts +peer1.org2.example.com | [39d7 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39d8 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [39d9 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [39da 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 principal evaluation fails +peer1.org2.example.com | [39db 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c22b60 gate 1602702137969119000 evaluation fails +peer1.org2.example.com | [39dc 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [39dd 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [39de 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [39df 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 gate 1602702137970091700 evaluation starts +peer1.org2.example.com | [39e0 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [39e1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [39e2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 principal matched by identity 0 +peer1.org2.example.com | [39e3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | [3740 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3741 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 principal matched by identity 0 +peer1.org1.example.com | [3742 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org1.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer1.org1.example.com | [3743 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer1.org1.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer1.org1.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer1.org1.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer1.org1.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer1.org1.example.com | [3744 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3745 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690810 gate 1602702138505575000 evaluation succeeds +peer1.org1.example.com | [3746 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3747 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3748 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3749 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [374a 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [374b 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [374c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [374d 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer1.org1.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer1.org1.example.com | [374e 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer1.org1.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer1.org1.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer1.org1.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer1.org1.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer1.org1.example.com | [374f 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3750 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3751 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3752 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3753 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 83 b4 04 89 f2 2e b1 a7 3a dd fc db f3 46 47 |"........:....FG| +peer1.org1.example.com | 00000010 c6 2b b3 26 ff d2 ec d2 65 7d 3f 04 d4 97 74 ab |.+.&....e}?...t.| +peer1.org1.example.com | [3754 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 d0 5b 66 88 33 8f 4d 7e dc d7 3c |0D. ..[f.3.M~..<| +peer1.org1.example.com | 00000010 fc 47 a2 e4 61 45 b5 ad 14 0f d9 5b 83 3b c3 d6 |.G..aE.....[.;..| +peer1.org1.example.com | 00000020 79 d5 a6 de 02 20 71 5d c8 14 40 b5 f1 9f 61 63 |y.... q]..@...ac| +peer1.org1.example.com | 00000030 a3 dc 76 bb b5 b2 f2 4d d4 8d 7b 13 b0 10 14 f3 |..v....M..{.....| +peer1.org1.example.com | 00000040 f5 cd 77 64 bc fe |..wd..| +peer1.org1.example.com | [3755 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3756 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1602702050573832200 52 {} [] 0} +peer1.org1.example.com | [3757 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3758 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3759 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [375a 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [375b 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [375c 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [375d 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [375e 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [375f 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [39e4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [39e5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39e6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c230d0 gate 1602702137970091700 evaluation succeeds +peer1.org2.example.com | [39e7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39e8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [39e9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [39ea 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [39eb 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ec 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39ed 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [39ee 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [39ef 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39f0 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\005t3\266<\262Y\306\240G\253\034X\320 $\241\020\374\211Ih\002 \010\213\034*(\245l\330U\301\350a\353\355\235\007\236\317\347E\351w\014\224Y\325\336\244\242\277\245\302" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [39f1 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39f2 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005t3\266<\262Y\306\240G\253\034X\320 $\241\020\374\211Ih\002 \010\213\034*(\245l\330U\301\350a\353\355\235\007\236\317\347E\351w\014\224Y\325\336\244\242\277\245\302" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [39f3 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [39f4 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer1.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer1.org2.example.com | [39f5 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer1.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer1.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer1.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer1.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer1.org2.example.com | [39f6 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [39f7 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 4e 1a fb bb 9f 17 a6 3f 3e 05 74 |0D. 'N......?>.t| +peer1.org2.example.com | 00000010 33 b6 3c b2 59 c6 a0 47 ab 1c 58 d0 20 24 a1 10 |3.<.Y..G..X. $..| +peer1.org2.example.com | 00000020 fc 89 49 68 02 20 08 8b 1c 2a 28 a5 6c d8 55 c1 |..Ih. ...*(.l.U.| +peer1.org2.example.com | 00000030 e8 61 eb ed 9d 07 9e cf e7 45 e9 77 0c 94 59 d5 |.a.......E.w..Y.| +peer1.org2.example.com | 00000040 de a4 a2 bf a5 c2 |......| +peer1.org2.example.com | [39f8 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [39f9 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes t: {1602702050129543600 50 {} [] 0} +peer1.org2.example.com | [39fa 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39fb 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39fc 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39fd 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [39fe 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ff 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a00 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [385b 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [385c 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [385d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [385e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [385f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3860 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3861 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3862 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3863 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3864 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3865 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3866 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3867 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3868 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3869 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 gate 1602702133903254500 evaluation starts +peer0.org1.example.com | [386a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [386b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [386c 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 principal matched by identity 0 +peer0.org1.example.com | [386d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [386e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [386f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3870 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 gate 1602702133903254500 evaluation succeeds +peer0.org1.example.com | [3871 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3872 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3873 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3874 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3875 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3876 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3760 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3761 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3762 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3763 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3764 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3765 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 gate 1602702138519289000 evaluation starts +peer1.org1.example.com | [3766 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3767 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3768 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3769 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 principal evaluation fails +peer1.org1.example.com | [376a 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004657e00 gate 1602702138519289000 evaluation fails +peer1.org1.example.com | [376b 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [376c 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [376d 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [376e 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 gate 1602702138520224000 evaluation starts +peer1.org1.example.com | [376f 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3770 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3771 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 principal matched by identity 0 +peer1.org1.example.com | [3772 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer1.org1.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer1.org1.example.com | [3773 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer1.org1.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer1.org1.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer1.org1.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer1.org1.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer1.org1.example.com | [3774 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3775 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c6370 gate 1602702138520224000 evaluation succeeds +peer1.org1.example.com | [3776 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3777 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3778 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3779 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [377a 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [377b 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [377c 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [377d 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer1.org1.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer1.org1.example.com | [377e 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer1.org1.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer1.org1.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer1.org1.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer1.org1.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer1.org1.example.com | [377f 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3780 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3781 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3782 10-14 19:02:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3783 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3784 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3785 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3786 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3877 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3878 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3879 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [387a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [387b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [387c 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [387d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 gate 1602702133906138500 evaluation starts +peer0.org1.example.com | [387e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [387f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3880 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 principal matched by identity 0 +peer0.org1.example.com | [3881 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3882 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3883 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3884 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 gate 1602702133906138500 evaluation succeeds +peer0.org1.example.com | [3885 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3886 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3887 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3888 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3889 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [388a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [388b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [388c 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [388d 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [388e 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [388f 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3890 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3891 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a01 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005t3\266<\262Y\306\240G\253\034X\320 $\241\020\374\211Ih\002 \010\213\034*(\245l\330U\301\350a\353\355\235\007\236\317\347E\351w\014\224Y\325\336\244\242\277\245\302" > > alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > +peer1.org2.example.com | [3a02 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a03 10-14 19:02:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a04 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3a05 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a06 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3a07 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a08 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3a09 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a0a 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a0b 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0c 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a0d 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a0e 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a0f 10-14 19:02:18.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a10 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a11 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a12 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a13 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a14 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a15 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a16 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a17 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a18 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a19 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a1a 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1b 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1c 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a1d 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1e 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a1f 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a20 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a21 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a22 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a23 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3a24 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3a25 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a26 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a27 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a28 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a29 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a2a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a2b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 gate 1602702138245076800 evaluation starts +peer1.org2.example.com | [3a2c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a2d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a2e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3a2f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 principal evaluation fails +peer1.org2.example.com | [3a30 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72110 gate 1602702138245076800 evaluation fails +peer1.org2.example.com | [3a31 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a32 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a33 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3a34 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 gate 1602702138247753700 evaluation starts +peer1.org2.example.com | [3a35 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3787 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3788 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3789 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [378c 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [378d 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378e 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [378f 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3790 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3791 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3792 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3793 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3794 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 gate 1602702138599951400 evaluation starts +peer1.org1.example.com | [3795 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3796 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3797 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3798 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 principal evaluation fails +peer1.org1.example.com | [3799 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fa880 gate 1602702138599951400 evaluation fails +peer1.org1.example.com | [379a 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [379b 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [379c 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [379d 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 gate 1602702138602076900 evaluation starts +peer1.org1.example.com | [379e 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [379f 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37a0 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 principal matched by identity 0 +peer1.org1.example.com | [37a1 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [37a2 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [37a3 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37a4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fadf0 gate 1602702138602076900 evaluation succeeds +peer1.org1.example.com | [37a5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37a6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37a7 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37a8 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37a9 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3892 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3893 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3894 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3895 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3896 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3897 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3898 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 gate 1602702133913831500 evaluation starts +peer0.org1.example.com | [3899 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [389a 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [389b 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 principal matched by identity 0 +peer0.org1.example.com | [389c 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [389d 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [389e 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [389f 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 gate 1602702133913831500 evaluation succeeds +peer0.org1.example.com | [38a0 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38a1 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38a2 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38a3 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38a4 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38a5 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38a6 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38a7 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38a8 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38a9 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38aa 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38ab 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38ac 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 gate 1602702133920232400 evaluation starts +peer0.org1.example.com | [38ad 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38ae 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [38af 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 principal matched by identity 0 +peer0.org1.example.com | [38b0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [38b1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [38b2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38b3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 gate 1602702133920232400 evaluation succeeds +peer0.org1.example.com | [38b4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38b5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38b6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38b7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38b8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ba 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [38bb 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [38bc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [38bd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [38be 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38bf 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38c0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38c1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38c2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38c3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38c4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38c5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38c6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 gate 1602702133924794000 evaluation starts +peer0.org1.example.com | [38c7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a40 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3a41 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3a42 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a43 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161035 +peer0.org2.example.com | [3a44 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0F5A9807DC3C5132384EDBD4E09EA7301A9E45375C574D426AAED6E508CDBE84 +peer0.org2.example.com | [3a45 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a46 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3a47 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3a48 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3a49 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a4a 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a4b 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a4c 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3a4d 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3a4e 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a4f 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3a50 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a51 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a52 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a53 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a54 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3a55 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a56 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a57 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a58 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a59 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3a5a 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 48 82 5a 01 18 1d 54 84 c1 05 96 cf e2 1c 74 |.H.Z...T.......t| +peer0.org2.example.com | 00000010 10 51 01 59 ca ee 6b f5 6a 1e 98 f6 51 fd 6c 42 |.Q.Y..k.j...Q.lB| +peer0.org2.example.com | [3a5b 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 2d 9e b8 8b fd cf 63 62 c1 |0E.!...-.....cb.| +peer0.org2.example.com | 00000010 23 da 96 9a 1e 72 d3 95 fb 60 78 04 6a 04 fe f6 |#....r...`x.j...| +peer0.org2.example.com | 00000020 3b 49 5c 50 2e 02 20 10 38 7f 7b bc 9e cb fd 4e |;I\P.. .8.{....N| +peer0.org2.example.com | 00000030 f6 57 fc db a3 43 39 d3 77 49 a8 4f f5 49 d5 64 |.W...C9.wI.O.I.d| +peer0.org2.example.com | 00000040 d4 8b 5e a4 3f e2 ff |..^.?..| +peer0.org2.example.com | [3a5c 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a5d 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3a5e 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3a5f 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3a60 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3a61 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a62 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a63 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a64 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a65 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a66 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a67 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a68 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3a69 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a6a 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3a6b 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a6c 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a6d 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a6e 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a6f 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a70 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a71 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a72 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a73 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a74 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a75 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a76 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a77 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a78 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3a79 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a7a 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a7b 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a7c 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a7d 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a7e 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a7f 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3a80 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 gate 1602702145387180100 evaluation starts +peer0.org2.example.com | [3a81 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a82 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3a83 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3a84 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 principal evaluation fails +peer0.org2.example.com | [3a85 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004223e00 gate 1602702145387180100 evaluation fails +peer0.org2.example.com | [3a86 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a87 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a88 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a89 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 gate 1602702145387433100 evaluation starts +peer0.org2.example.com | [3a8a 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a8b 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3a8c 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 principal matched by identity 0 +peer0.org2.example.com | [3a8d 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 15 a2 c3 03 13 3d 4d fb 4d 83 0d 01 e1 ce fc |b.....=M.M......| +peer0.org2.example.com | 00000010 48 25 1d 1c f9 29 f4 08 6e 05 91 df 4a 10 99 72 |H%...)..n...J..r| +peer0.org2.example.com | [3a8e 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 af 8e 67 61 c6 0a 88 43 e4 f0 |0E.!....ga...C..| +peer0.org2.example.com | 00000010 2b 5a 46 76 77 73 50 8b 0e 20 92 15 15 b0 36 cb |+ZFvwsP.. ....6.| +peer0.org2.example.com | 00000020 48 24 95 27 34 02 20 7f 96 c3 29 6a d7 13 fd 48 |H$.'4. ...)j...H| +peer0.org2.example.com | 00000030 df 5d c5 11 9d 48 5f 9e fd cb ee b3 b5 60 0a 4c |.]...H_......`.L| +peer0.org2.example.com | 00000040 25 bd a8 01 2e e7 ea |%......| +peer0.org2.example.com | [3a8f 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a90 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004248370 gate 1602702145387433100 evaluation succeeds +peer0.org2.example.com | [3a91 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a92 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a93 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a94 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a95 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a96 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3a97 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3a98 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3a99 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3a9a 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9b 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9c 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9d 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a9e 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a9f 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa0 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa1 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa2 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa3 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa4 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3aa5 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37aa 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37ab 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37ac 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37ad 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [37ae 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [37af 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 gate 1602702138617788000 evaluation starts +peer1.org1.example.com | [37b0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37b1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37b2 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [37b3 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 principal evaluation fails +peer1.org1.example.com | [37b4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fb930 gate 1602702138617788000 evaluation fails +peer1.org1.example.com | [37b5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37b6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37b7 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [37b8 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 gate 1602702138619374500 evaluation starts +peer1.org1.example.com | [37b9 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37ba 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37bb 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 principal matched by identity 0 +peer1.org1.example.com | [37bc 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [37bd 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [37be 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37bf 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fbea0 gate 1602702138619374500 evaluation succeeds +peer1.org1.example.com | [37c0 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37c1 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37c2 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37c3 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37c4 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c5 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [37c6 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37c7 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37c8 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37c9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37ca 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37cb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [37cc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [37cd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 gate 1602702138633221800 evaluation starts +peer1.org1.example.com | [37ce 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37cf 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37d0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [37d1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 principal evaluation fails +peer1.org1.example.com | [37d2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004715150 gate 1602702138633221800 evaluation fails +peer1.org1.example.com | [37d3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37d4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37d5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [37d6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 gate 1602702138634306500 evaluation starts +peer1.org1.example.com | [37d7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37d8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37d9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 principal matched by identity 0 +peer1.org1.example.com | [37da 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [37db 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [37dc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37dd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047156c0 gate 1602702138634306500 evaluation succeeds +peer1.org1.example.com | [37de 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37df 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37e0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37e1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37e2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37e3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37e4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [37e5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37e6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37e7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37ea 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [37eb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [37ec 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 gate 1602702138635194000 evaluation starts +peer1.org1.example.com | [37ed 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37ee 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37ef 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [37f0 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 principal evaluation fails +peer1.org1.example.com | [37f1 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730a10 gate 1602702138635194000 evaluation fails +peer1.org1.example.com | [37f2 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37f3 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37f4 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [37f5 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 gate 1602702138635455000 evaluation starts +peer1.org1.example.com | [37f6 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37f7 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [37f8 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 principal matched by identity 0 +peer1.org1.example.com | [37f9 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [37fa 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [37fb 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37fc 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730f80 gate 1602702138635455000 evaluation succeeds +peer1.org1.example.com | [37fd 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37fe 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [37ff 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3800 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3801 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3802 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3803 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3804 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3805 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [3806 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3807 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3808 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3809 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a36 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a37 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3a38 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 principal evaluation fails +peer1.org2.example.com | [3a39 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c726a0 gate 1602702138247753700 evaluation fails +peer1.org2.example.com | [3a3a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a3b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a3c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a3d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 gate 1602702138248011500 evaluation starts +peer1.org2.example.com | [3a3e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a3f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a40 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [3a41 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3a42 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [3a43 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 principal matched by identity 0 +peer1.org2.example.com | [3a44 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3a45 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3a46 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a47 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72c30 gate 1602702138248011500 evaluation succeeds +peer1.org2.example.com | [3a48 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a49 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a4a 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a4b 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a4c 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a4d 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a4e 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a4f 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a50 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a51 10-14 19:02:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a52 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a53 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 gate 1602702138253989500 evaluation starts +peer1.org2.example.com | [3a54 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a55 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a56 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3a57 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 principal evaluation fails +peer1.org2.example.com | [3a58 10-14 19:02:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c73ab0 gate 1602702138253989500 evaluation fails +peer1.org2.example.com | [3a59 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a5a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a5b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3a5c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 gate 1602702138261860100 evaluation starts +peer1.org2.example.com | [3a5d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a5e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a5f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3a60 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 principal evaluation fails +peer1.org2.example.com | [3a61 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a020 gate 1602702138261860100 evaluation fails +peer1.org2.example.com | [3a62 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a63 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a64 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a65 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 gate 1602702138262734500 evaluation starts +peer1.org2.example.com | [3a66 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a67 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a68 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 principal matched by identity 0 +peer1.org2.example.com | [3a69 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3a6a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3a6b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a6c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8a590 gate 1602702138262734500 evaluation succeeds +peer1.org2.example.com | [3a6d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a6e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a6f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a70 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a71 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a72 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a73 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a74 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a75 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a76 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a77 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a78 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a79 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a7a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a7b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a7c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [3a7d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a7e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a7f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a80 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a81 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3a82 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a83 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 gate 1602702138263720200 evaluation starts +peer1.org2.example.com | [3a84 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [380a 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [380b 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [380c 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [380d 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [380e 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [380f 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3810 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer1.org1.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer1.org1.example.com | [3811 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer1.org1.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer1.org1.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer1.org1.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer1.org1.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer1.org1.example.com | [3812 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3813 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d3 e7 f3 ed 51 49 52 b6 94 7c 23 |0D. w....QIR..|#| +peer1.org1.example.com | 00000010 e2 b6 6e d7 e6 f3 f0 74 5d 1f c2 f9 18 ad 87 dc |..n....t].......| +peer1.org1.example.com | 00000020 07 7d cd 95 02 20 22 1e 0f 03 99 71 c5 5b da 82 |.}... "....q.[..| +peer1.org1.example.com | 00000030 36 32 6d f2 0b 0f 04 e4 1e 6d 4e 7f de 2d 25 70 |62m......mN..-%p| +peer1.org1.example.com | 00000040 3f 84 3f 9d 16 de |?.?...| +peer1.org1.example.com | [3814 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3815 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3816 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3817 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3818 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3819 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [381a 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [381b 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [381c 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [381d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [381e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [381f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3820 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [3821 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3822 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3823 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3824 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3825 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3826 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3827 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3828 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3829 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3aa6 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3aa7 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aa8 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aa9 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aaa 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aab 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aac 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aad 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aae 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aaf 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ab0 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ab1 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ab2 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ab3 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ab4 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3ab5 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ab6 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ab7 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ab8 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ab9 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3aba 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3abb 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3abc 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 gate 1602702145561547300 evaluation starts +peer0.org2.example.com | [3abd 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3abe 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3abf 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3a85 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a86 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3a87 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 principal evaluation fails +peer1.org2.example.com | [3a88 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b840 gate 1602702138263720200 evaluation fails +peer1.org2.example.com | [3a89 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a8a 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a8b 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3a8c 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 gate 1602702138274587500 evaluation starts +peer1.org2.example.com | [3a8d 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a8e 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3a8f 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3a90 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 principal evaluation fails +peer1.org2.example.com | [3a91 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c62d80 gate 1602702138274587500 evaluation fails +peer1.org2.example.com | [3a92 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a94 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a95 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a93 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3a96 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161034 +peer1.org2.example.com | [3a97 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BE4AFDC6C2DCC6C5BAF32E8E723319E7937799587FEC2B3F7873F45390C8E6F +peer1.org2.example.com | [3a98 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3a99 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3a9a 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3a9b 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a9c 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a9d 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3a9e 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a9f 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3aa0 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aa1 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aa2 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:,\327?:7\305q\240\354B\346+\007\207F\021\342\tw" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aa3 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3aa4 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 gate 1602702138279007000 evaluation starts +peer1.org2.example.com | [3aa5 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3aa6 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3aa7 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 principal matched by identity 0 +peer1.org2.example.com | [3aa8 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [382a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [382b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [382c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [382d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [382e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [382f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3830 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 gate 1602702138913554300 evaluation starts +peer1.org1.example.com | [3831 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3832 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3833 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3834 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 principal evaluation fails +peer1.org1.example.com | [3835 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dcf0 gate 1602702138913554300 evaluation fails +peer1.org1.example.com | [3836 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3837 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3838 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3839 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 gate 1602702138913946100 evaluation starts +peer1.org1.example.com | [383a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [383b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [383c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 principal matched by identity 0 +peer1.org1.example.com | [383d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [383e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [383f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3840 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780260 gate 1602702138913946100 evaluation succeeds +peer1.org1.example.com | [3841 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3842 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3843 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3844 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3845 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3846 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3847 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3848 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3849 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [384a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [384b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [384c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 gate 1602702138914888100 evaluation starts +peer1.org1.example.com | [384d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [384e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [384f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3850 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 principal evaluation fails +peer1.org1.example.com | [3851 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004780e50 gate 1602702138914888100 evaluation fails +peer1.org1.example.com | [3852 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ac0 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 principal evaluation fails +peer0.org2.example.com | [3ac1 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004272430 gate 1602702145561547300 evaluation fails +peer0.org2.example.com | [3ac2 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ac3 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ac4 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3ac5 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 gate 1602702145562135700 evaluation starts +peer0.org2.example.com | [3ac6 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ac7 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3ac8 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 principal matched by identity 0 +peer0.org2.example.com | [3ac9 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 47 c8 4b d9 30 6a 57 88 af 25 ab c7 2a f5 78 | G.K.0jW..%..*.x| +peer0.org2.example.com | 00000010 39 e6 08 05 be 6a 36 da e7 ea 88 e0 c5 62 59 65 |9....j6......bYe| +peer0.org2.example.com | [3aca 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 87 ce e4 cf ff 2d d5 91 73 46 |0E.!.......-..sF| +peer0.org2.example.com | 00000010 53 92 74 eb 6e 2b 7f 02 ea a7 9b 09 4a 21 c0 8a |S.t.n+......J!..| +peer0.org2.example.com | 00000020 ff b0 99 a2 30 02 20 6c 54 16 94 4e 60 54 03 7a |....0. lT..N`T.z| +peer0.org2.example.com | 00000030 c0 70 c9 29 60 bc fd cd 27 de 2d 62 a0 93 86 4e |.p.)`...'.-b...N| +peer0.org2.example.com | 00000040 59 61 1f 7c 24 53 f9 |Ya.|$S.| +peer0.org2.example.com | [3acb 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3acc 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042729a0 gate 1602702145562135700 evaluation succeeds +peer0.org2.example.com | [3acd 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ace 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3acf 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ad0 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ad1 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ad2 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3ad3 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3ad4 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3ad5 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3ad6 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad7 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad8 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ad9 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ada 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3adb 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3adc 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3add 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ade 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3adf 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3ae0 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ae1 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ae2 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3853 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3854 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3855 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 gate 1602702138915270300 evaluation starts +peer1.org1.example.com | [3856 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3857 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3858 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 principal matched by identity 0 +peer1.org1.example.com | [3859 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [385a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [385b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [385c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047813c0 gate 1602702138915270300 evaluation succeeds +peer1.org1.example.com | [385d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [385e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [385f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3860 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3861 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3862 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3863 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3864 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [3865 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3866 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3867 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3868 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3869 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [386a 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [386b 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [386c 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [386d 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [386e 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aaa 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3aab 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3aac 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c632f0 gate 1602702138279007000 evaluation succeeds +peer1.org2.example.com | [3aad 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3aa9 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aae 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ab0 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ab1 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ab2 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ab3 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ab4 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ab5 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3aaf 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ab6 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab7 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ab8 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ab9 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3aba 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3abb 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 gate 1602702138296575600 evaluation starts +peer1.org2.example.com | [3abc 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3abd 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3abe 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3abf 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 principal evaluation fails +peer1.org2.example.com | [3ac0 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf2b0 gate 1602702138296575600 evaluation fails +peer1.org2.example.com | [3ac1 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ac2 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ac3 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3ac4 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 gate 1602702138299623700 evaluation starts +peer1.org2.example.com | [3ac5 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ac6 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ac7 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3ac8 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 principal evaluation fails +peer1.org2.example.com | [3ac9 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbf820 gate 1602702138299623700 evaluation fails +peer1.org2.example.com | [3aca 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3acb 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3acc 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3acd 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 gate 1602702138301741400 evaluation starts +peer1.org2.example.com | [3ace 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3acf 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ad0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 principal matched by identity 0 +peer1.org2.example.com | [3ad1 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3ad2 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3ad3 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ad4 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd90 gate 1602702138301741400 evaluation succeeds +peer1.org2.example.com | [3ad5 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ad6 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ad7 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ad8 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ad9 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ada 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3adb 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3adc 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae3 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ae4 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae5 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ae6 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae7 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ae8 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ae9 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aea 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aeb 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aec 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aed 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3aee 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aef 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3af0 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3af1 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3af2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3af3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3af7 10-14 19:02:26.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3af8 10-14 19:02:26.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3af9 10-14 19:02:26.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3afa 10-14 19:02:26.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3afb 10-14 19:02:26.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3afe 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3aff 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b00 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afd 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b01 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afc 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b04 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b02 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b05 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b06 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b07 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b03 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b08 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [38c9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 principal matched by identity 0 +peer0.org1.example.com | [38ca 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [38cb 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [38cc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38cd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 gate 1602702133924794000 evaluation succeeds +peer0.org1.example.com | [38ce 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38cf 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38d0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38d1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38d2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38d3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38d4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38d5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38d6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38d7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38d8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38d9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38da 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 gate 1602702133927104100 evaluation starts +peer0.org1.example.com | [38db 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38dc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [38dd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 principal matched by identity 0 +peer0.org1.example.com | [38de 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [38df 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [38e0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38e1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 gate 1602702133927104100 evaluation succeeds +peer0.org1.example.com | [38e2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38e3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38e4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38e5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38e6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38e7 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38e8 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38e9 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [38ea 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [386f 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3870 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3871 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3872 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3873 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 gate 1602702138943243900 evaluation starts +peer1.org1.example.com | [3874 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3875 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3876 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3877 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 principal evaluation fails +peer1.org1.example.com | [3878 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046afdf0 gate 1602702138943243900 evaluation fails +peer1.org1.example.com | [3879 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [387a 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [387b 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [387c 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 gate 1602702138943664500 evaluation starts +peer1.org1.example.com | [387d 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [387e 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [387f 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 principal matched by identity 0 +peer1.org1.example.com | [3880 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3881 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3882 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3883 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047be360 gate 1602702138943664500 evaluation succeeds +peer1.org1.example.com | [3884 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3885 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3886 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3887 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3888 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3889 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [388a 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [388b 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [388c 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [388d 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [388e 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38eb 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38ec 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38ed 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ee 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38ef 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f0 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f1 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38f2 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f3 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f4 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f5 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38f6 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38f7 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38f8 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38f9 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38fa 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38fb 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [38fc 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38fd 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [38fe 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ff 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3900 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3901 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3902 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3add 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ade 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3adf 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer1.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer1.org2.example.com | [3ae0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer1.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer1.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer1.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer1.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer1.org2.example.com | [3ae1 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ae2 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae3 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3ae4 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org2.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer1.org2.example.com | [3ae5 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer1.org2.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer1.org2.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer1.org2.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer1.org2.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer1.org2.example.com | [3ae6 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ae7 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ae8 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ae9 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3aea 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b09 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b0a 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b0b 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b0c 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b0d 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b0e 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b0f 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3b10 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161036 +peer0.org2.example.com | [3b11 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 22ABDECDE02B65C98E30CD83526C14753466FA6F2336603D1CD9AEE00B180DB0 +peer0.org2.example.com | [3b12 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3b13 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3b14 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3b15 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b16 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b17 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b18 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b19 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1a 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b1b 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b1c 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1e 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b1d 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1f 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b20 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b21 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b22 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b23 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b24 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b25 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer0.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer0.org2.example.com | [3b26 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer0.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer0.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer0.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer0.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org2.example.com | [3b27 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b28 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b29 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b2a 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b2b 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b2c 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b2d 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b2e 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b2f 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer0.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer0.org2.example.com | [3b30 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer0.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer0.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org1.example.com | [388f 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3890 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3891 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 gate 1602702138947890200 evaluation starts +peer1.org1.example.com | [3892 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3893 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3894 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3895 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 principal evaluation fails +peer1.org1.example.com | [3896 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b0bb0 gate 1602702138947890200 evaluation fails +peer1.org1.example.com | [3897 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3898 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3899 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [389a 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 gate 1602702138948133200 evaluation starts +peer1.org1.example.com | [389b 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [389c 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [389d 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 principal matched by identity 0 +peer1.org1.example.com | [389e 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [389f 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [38a0 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38a1 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047b1120 gate 1602702138948133200 evaluation succeeds +peer1.org1.example.com | [38a2 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38a3 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38a4 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38a5 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38a6 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a7 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38a8 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38a9 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38aa 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38ab 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [38ac 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ad 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38ae 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38af 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38b0 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38b1 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38b2 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [38b3 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 gate 1602702140112088000 evaluation starts +peer1.org1.example.com | [38b4 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3903 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3904 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3905 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3906 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3907 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3908 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3909 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 gate 1602702134182537200 evaluation starts +peer0.org1.example.com | [390a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [390b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [390c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 principal matched by identity 0 +peer0.org1.example.com | [390d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer0.org1.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer0.org1.example.com | [390e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer0.org1.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer0.org1.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer0.org1.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer0.org1.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer0.org1.example.com | [390f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3910 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 gate 1602702134182537200 evaluation succeeds +peer0.org1.example.com | [3911 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3912 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3913 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3914 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3915 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3916 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3917 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3918 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3919 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [391a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [391e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [391f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3920 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3921 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3922 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3923 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3aeb 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3aec 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aed 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aee 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3aef 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3af0 10-14 19:02:18.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3af1 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 gate 1602702138310066400 evaluation starts +peer1.org2.example.com | [3af2 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3af4 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3af5 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3af6 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 principal evaluation fails +peer1.org2.example.com | [3af7 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00580 gate 1602702138310066400 evaluation fails +peer1.org2.example.com | [3af8 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3af9 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3afa 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3afb 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 gate 1602702138313680800 evaluation starts +peer1.org2.example.com | [3af3 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3afc 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3afd 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3aff 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3b00 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 principal evaluation fails +peer1.org2.example.com | [3b01 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00af0 gate 1602702138313680800 evaluation fails +peer1.org2.example.com | [3b02 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3afe 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b03 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3b04 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b05 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 gate 1602702138319745900 evaluation starts +peer1.org2.example.com | [3b06 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b07 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3b08 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 principal matched by identity 0 +peer1.org2.example.com | [3b09 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +peer1.org2.example.com | 00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +peer1.org2.example.com | [3b0a 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +peer1.org2.example.com | 00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +peer1.org2.example.com | 00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +peer1.org2.example.com | 00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +peer1.org2.example.com | 00000040 19 3c b2 fe e4 20 |.<... | +peer1.org2.example.com | [3b0b 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b0c 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01060 gate 1602702138319745900 evaluation succeeds +peer1.org2.example.com | [3b0d 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b0e 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b0f 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b10 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3924 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3925 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3926 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3927 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3928 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3929 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392a 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392b 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392c 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392d 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392e 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [392f 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3930 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3931 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3932 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3933 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3934 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3935 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3936 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3937 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3938 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3939 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [393a 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [393b 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [393c 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [393d 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [393e 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer0.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org2.example.com | [3b31 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b32 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b33 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b34 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38b5 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [38b6 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [38b7 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 principal evaluation fails +peer1.org1.example.com | [38b8 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6680 gate 1602702140112088000 evaluation fails +peer1.org1.example.com | [38b9 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38ba 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38bb 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38bc 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 gate 1602702140114787700 evaluation starts +peer1.org1.example.com | [38bd 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38be 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [38bf 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 principal matched by identity 0 +peer1.org1.example.com | [38c0 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 f6 93 99 69 05 e0 ec 05 31 9b 69 e4 6a b0 89 |P...i....1.i.j..| +peer1.org1.example.com | 00000010 58 43 4d b9 53 c6 69 38 bd 90 d2 13 78 1b 1f d9 |XCM.S.i8....x...| +peer1.org1.example.com | [38c1 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 01 6b 5d 3e 35 a2 c2 de 0d 32 ec |0D. p.k]>5....2.| +peer1.org1.example.com | 00000010 56 d9 eb 08 72 bb 29 d1 82 6c 50 3a b7 f6 57 e3 |V...r.)..lP:..W.| +peer1.org1.example.com | 00000020 ba e2 77 d5 02 20 63 68 15 0d 98 41 bf a4 ec 4c |..w.. ch...A...L| +peer1.org1.example.com | 00000030 f2 ff 4b 5e 19 32 3b 57 b8 a5 e8 87 77 67 75 72 |..K^.2;W....wgur| +peer1.org1.example.com | 00000040 9e cc a6 f4 df 3e |.....>| +peer1.org1.example.com | [38c2 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38c3 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6bf0 gate 1602702140114787700 evaluation succeeds +peer1.org1.example.com | [38c4 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38c5 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38c6 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38c7 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38c8 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38c9 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [38ca 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [38cb 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [38cc 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [38cd 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38ce 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38cf 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38d0 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d1 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d2 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d3 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d4 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b11 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b12 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3b13 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b14 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b15 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b16 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b17 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b18 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b19 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b1a 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1b 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b1c 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3b1d 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org2.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer1.org2.example.com | [3b1e 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer1.org2.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer1.org2.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer1.org2.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer1.org2.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer1.org2.example.com | [3b1f 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3b20 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 b1 c3 b4 54 dc 65 d2 0f dd ed 78 |0D. )...T.e....x| +peer1.org2.example.com | 00000010 8a 39 c8 4b 12 81 9a 3c 4f 83 8d 6b 0a d2 fa 20 |.9.K...,.?:7.q..B.+.| +peer1.org2.example.com | 00000040 87 46 11 e2 09 77 |.F...w| +peer1.org2.example.com | [3b21 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3b22 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3b23 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b24 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b25 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b26 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b27 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3b28 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer1.org2.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer1.org2.example.com | [3b29 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer1.org2.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer1.org2.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer1.org2.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer1.org2.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer1.org2.example.com | [3b2a 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [393f 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3940 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 gate 1602702134317281500 evaluation starts +peer0.org1.example.com | [3941 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3942 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3943 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 principal matched by identity 0 +peer0.org1.example.com | [3944 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer0.org1.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer0.org1.example.com | [3945 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer0.org1.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer0.org1.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer0.org1.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer0.org1.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer0.org1.example.com | [3946 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3947 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 gate 1602702134317281500 evaluation succeeds +peer0.org1.example.com | [3948 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3949 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [394a 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [394b 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [394c 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [394d 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [394e 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [394f 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3950 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3951 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3952 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3953 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3954 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3955 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3956 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3957 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3958 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3959 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > alive: +peer0.org1.example.com | [395a 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [395b 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [395c 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [395d 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [395e 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [395f 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38d5 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d6 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [38d7 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d8 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d9 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [38db 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38dc 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38da 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38dd 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38de 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38df 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e0 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38e1 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e2 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38e3 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e4 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [38e5 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e6 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [38e7 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38e8 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [38e9 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [38ea 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38eb 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38ec 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38ed 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38ee 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38ef 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38f0 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [38f1 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 gate 1602702140218860900 evaluation starts +peer1.org1.example.com | [38f2 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38f3 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [38f4 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [38f5 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 principal evaluation fails +peer1.org1.example.com | [38f6 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004809280 gate 1602702140218860900 evaluation fails +peer1.org1.example.com | [38f7 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38f8 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38f9 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38fa 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 gate 1602702140219277900 evaluation starts +peer1.org1.example.com | [38fb 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38fc 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [38fd 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 principal matched by identity 0 +peer1.org1.example.com | [38fe 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 7c 5c e9 97 f2 cb c1 4f 81 a9 58 32 6d 12 82 |t|\.....O..X2m..| +peer1.org1.example.com | 00000010 09 f5 4b 2b e2 78 58 d5 cf c2 a9 c5 79 ae 9b a2 |..K+.xX.....y...| +peer1.org1.example.com | [38ff 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 59 8b 03 85 c3 cf c9 71 9c aa |0E.!..Y......q..| +peer1.org1.example.com | 00000010 e2 9c b6 70 68 f5 fb f8 18 fa 46 f9 ea 49 49 63 |...ph.....F..IIc| +peer1.org1.example.com | 00000020 07 99 0a 49 54 02 20 05 c9 85 a3 59 b7 af 1a 2c |...IT. ....Y...,| +peer1.org1.example.com | 00000030 a5 a8 e8 25 98 35 8f 33 bb ef a8 a9 eb 18 ac 89 |...%.5.3........| +peer1.org1.example.com | 00000040 58 fe 10 49 12 f3 01 |X..I...| +peer1.org1.example.com | [3900 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3901 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048097f0 gate 1602702140219277900 evaluation succeeds +peer1.org1.example.com | [3902 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3903 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3904 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3905 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3906 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3907 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3908 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3909 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [390a 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [390b 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [390c 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [390d 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [390e 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [390f 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3910 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3911 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3912 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3913 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3914 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3915 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3916 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3917 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3918 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b35 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b36 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b37 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b38 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b39 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b3a 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b3b 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer0.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer0.org2.example.com | [3b3c 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer0.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer0.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer0.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer0.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org2.example.com | [3b3d 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3b3e 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 19 6e 59 b4 de 4b 34 e0 f8 e9 64 |0D. ".nY..K4...d| +peer0.org2.example.com | 00000010 57 2f 3a 70 34 af be a4 4e 1f d1 dd b5 4f 2e 70 |W/:p4...N....O.p| +peer0.org2.example.com | 00000020 87 4a 87 16 02 20 2a 86 63 f5 02 e7 f1 04 67 59 |.J... *.c.....gY| +peer0.org2.example.com | 00000030 1c 06 c7 c6 d0 a9 91 73 cf fd 96 e7 19 2a e1 c2 |.......s.....*..| +peer0.org2.example.com | 00000040 4c 46 c1 2b bd 16 |LF.+..| +peer0.org2.example.com | [3b3f 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3b40 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3b41 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b42 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b43 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b44 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b45 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b46 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3b47 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b48 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b49 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b4a 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4b 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4c 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4d 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b4e 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b4f 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b50 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b51 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b52 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3b53 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer0.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer0.org2.example.com | [3b54 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer0.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer0.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer0.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer0.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer0.org2.example.com | [3b55 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3b56 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 94 5b 7f 6d 67 56 fe 7c d5 60 a2 |0D. l.[.mgV.|.`.| +peer0.org2.example.com | 00000010 97 99 9c e9 a6 a7 f3 67 df 3a b5 06 25 91 21 2d |.......g.:..%.!-| +peer0.org2.example.com | 00000020 18 30 14 9d 02 20 09 79 e0 54 ef 12 9e b4 a1 e2 |.0... .y.T......| +peer0.org2.example.com | 00000030 73 f2 88 38 9a b9 87 37 c6 1c 0d 4c 00 b4 6e 31 |s..8...7...L..n1| +peer0.org2.example.com | 00000040 ea f4 8d 08 f8 61 |.....a| +peer0.org2.example.com | [3b57 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3b58 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [3b59 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3b5a 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3b5b 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3b5c 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5d 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b5e 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3b5f 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b60 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b61 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b62 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > alive:\323\001\272\024\344)p\034oQ'\360\316Z\235@\237\304J\246\024\334\251\302\020\342g_\024s\002 K\212\260\256\305\254\211~P\221\377\205\240Ze\022\226\306\020\231HY\364I\367\304Bi%\001\n\350" > +peer0.org2.example.com | [3b63 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b64 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b65 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b66 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b67 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b68 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b69 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6a 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6b 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6c 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6d 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6e 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b6f 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3b70 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b71 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b72 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b73 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b74 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b75 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3b76 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b77 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b78 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b79 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b7a 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b7b 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b7c 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3b7d 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 gate 1602702146529466400 evaluation starts +peer0.org2.example.com | [3b7e 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b7f 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3b80 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3b81 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 principal evaluation fails +peer0.org2.example.com | [3b82 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3980 gate 1602702146529466400 evaluation fails +peer0.org2.example.com | [3b83 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b84 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3b85 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3b86 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 gate 1602702146531996600 evaluation starts +peer0.org2.example.com | [3b87 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b88 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3b89 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 principal matched by identity 0 +peer0.org2.example.com | [3b8a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer0.org2.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer0.org2.example.com | [3b8b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer0.org2.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer0.org2.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer0.org2.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer0.org2.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer0.org2.example.com | [3b8c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b8d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3ef0 gate 1602702146531996600 evaluation succeeds +peer0.org2.example.com | [3b8e 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b8f 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b90 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b91 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b92 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b93 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3b94 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3b95 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3b96 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3b97 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b98 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b99 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b9a 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3b9b 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9c 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9d 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9e 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3b9f 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba0 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3919 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [391a 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [391b 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [391c 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [391d 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [391e 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [391f 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3920 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3921 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3922 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3923 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3924 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3925 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103C +peer1.org1.example.com | [3926 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1B326785FF47AF20FF062C2E97A3F426D2369EBB3D437E64BE4D750B7B2928CE +peer1.org1.example.com | [3927 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3928 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3929 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [392a 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [392b 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [392c 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [392d 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org1.example.com | [392e 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [392f 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3930 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3931 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3932 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3933 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3935 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3934 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3936 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3937 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3938 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3939 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [393a 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [393b 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3960 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3961 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3962 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3963 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3964 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3965 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3966 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3967 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3968 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer0.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer0.org1.example.com | [3969 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer0.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer0.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer0.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer0.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer0.org1.example.com | [396a 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [396b 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 35 18 69 f4 15 ff f0 ee 8b 57 91 |0D. .5.i......W.| +peer0.org1.example.com | 00000010 4f c7 7e 97 f5 12 da 4b dd 14 e9 a7 de cf f1 d9 |O.~....K........| +peer0.org1.example.com | 00000020 eb 9c b2 13 02 20 32 10 01 49 3a 33 e9 4e 00 b2 |..... 2..I:3.N..| +peer0.org1.example.com | 00000030 f3 b6 6e af 78 cc 38 e6 9a 94 33 ef 01 35 0c 20 |..n.x.8...3..5. | +peer0.org1.example.com | 00000040 c8 6d 79 f8 15 f9 |.my...| +peer0.org1.example.com | [396c 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [396d 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [396e 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [396f 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3970 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3971 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3972 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3973 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3974 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3975 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3976 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3977 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3978 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3979 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b2b 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b2c 10-14 19:02:18.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3b2d 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer1.org2.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer1.org2.example.com | [3b2e 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer1.org2.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer1.org2.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer1.org2.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer1.org2.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer1.org2.example.com | [3b2f 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b30 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b31 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b32 10-14 19:02:18.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b33 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b34 10-14 19:02:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b35 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b36 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b37 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b38 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b39 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3a 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3b 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b3c 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3b3d 10-14 19:02:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b3e 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b3f 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b40 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b41 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b42 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3b43 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b44 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b45 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b46 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b47 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b48 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b49 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b4a 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 gate 1602702138499354700 evaluation starts +peer1.org2.example.com | [3b4b 10-14 19:02:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b4c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3b4d 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3b4e 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 principal evaluation fails +peer1.org2.example.com | [3b4f 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41290 gate 1602702138499354700 evaluation fails +peer1.org2.example.com | [3b50 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b51 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b52 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3b53 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 gate 1602702138504437500 evaluation starts +peer1.org2.example.com | [3b54 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b55 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3b56 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3b57 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 principal evaluation fails +peer1.org2.example.com | [3b58 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41800 gate 1602702138504437500 evaluation fails +peer1.org2.example.com | [3b59 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3b5a 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3b5b 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3b5c 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 gate 1602702138509541400 evaluation starts +peer1.org2.example.com | [3b5d 10-14 19:02:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b5e 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3b5f 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 principal matched by identity 0 +peer1.org2.example.com | [3b60 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer1.org2.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer1.org2.example.com | [3b61 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer1.org2.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer1.org2.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer1.org2.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer1.org2.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer1.org2.example.com | [3b62 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b63 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41d70 gate 1602702138509541400 evaluation succeeds +peer1.org2.example.com | [3b64 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b65 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b66 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b67 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b68 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b69 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3b6a 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b6b 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b6c 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3b6d 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [397a 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > alive: +peer0.org1.example.com | [397b 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [397c 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [397d 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [397e 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [397f 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3980 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3982 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3981 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3983 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3984 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3985 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3986 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3987 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3988 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3989 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [398a 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [398b 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [398c 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [398d 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [398e 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [398f 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3990 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3991 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3992 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3993 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3994 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3995 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3996 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3997 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3998 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3999 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102E +peer0.org1.example.com | [399a 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D8639C09C2598EEA7413FF50A9826FEF415E799032A18E31FDF9CA97F6C70E8D +peer0.org1.example.com | [399b 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [399c 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [399d 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [399e 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [399f 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39a0 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39a1 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39a2 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39a3 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [39a4 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39a5 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [39a6 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39a7 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [39a8 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39a9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [39aa 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [39ab 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ac 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [393c 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f5 06 de e8 3f bd a0 81 2f 79 2f a3 0b 2f 18 |N....?.../y/../.| +peer1.org1.example.com | 00000010 91 ea ba 0c d9 0b 46 f7 6f ee da be 65 10 ec 0c |......F.o...e...| +peer1.org1.example.com | [393d 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 10 f8 c9 eb 59 ae 86 e9 57 3f |0E.!......Y...W?| +peer1.org1.example.com | 00000010 a0 f7 dc 42 a0 dc e2 5c ee 2a 7b d3 fe 33 84 0f |...B...\.*{..3..| +peer1.org1.example.com | 00000020 4e d7 5b ad 97 02 20 7f 94 b5 34 8f ce 81 dc 07 |N.[... ...4.....| +peer1.org1.example.com | 00000030 3a 81 57 4f 17 a7 87 8c e3 bc 0d d4 7b 66 ab a7 |:.WO........{f..| +peer1.org1.example.com | 00000040 6d 42 1b fd 66 4a d6 |mB..fJ.| +peer1.org1.example.com | [393e 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [393f 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3940 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3941 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3942 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3943 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3944 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3945 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3946 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3947 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3948 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3949 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [394a 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [394b 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [394c 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [394d 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394e 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [394f 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3950 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3951 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3952 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3953 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3954 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3955 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3956 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3957 10-14 19:02:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3958 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3959 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [395a 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [395b 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [395c 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [395d 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [395e 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [395f 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b6e 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b6f 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3b70 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b71 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b72 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b73 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b74 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > +peer1.org2.example.com | [3b75 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b76 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b77 10-14 19:02:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b78 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b79 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b7a 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7b 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7c 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7d 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7e 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b7f 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b80 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3b81 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b82 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b83 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b84 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b85 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b86 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b87 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3b88 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3b89 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b8a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b8b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b8c 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b8d 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b8e 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8f 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [3ba1 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: alive: alive:\323\001\272\024\344)p\034oQ'\360\316Z\235@\237\304J\246\024\334\251\302\020\342g_\024s\002 K\212\260\256\305\254\211~P\221\377\205\240Ze\022\226\306\020\231HY\364I\367\304Bi%\001\n\350" > +peer0.org2.example.com | [3ba2 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ba3 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ba4 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3ba5 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba6 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ba7 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba8 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ad 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [39ae 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39af 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39b0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39b1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39b2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39b3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39b4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39b5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 gate 1602702134645390900 evaluation starts +peer0.org1.example.com | [39b6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39b7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [39b8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 principal matched by identity 0 +peer0.org1.example.com | [39b9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +peer0.org1.example.com | 00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +peer0.org1.example.com | [39ba 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +peer0.org1.example.com | 00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +peer0.org1.example.com | 00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +peer0.org1.example.com | 00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +peer0.org1.example.com | 00000040 df a6 74 15 19 4b c3 |..t..K.| +peer0.org1.example.com | [39bb 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39bc 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 gate 1602702134645390900 evaluation succeeds +peer0.org1.example.com | [39bd 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39be 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39bf 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39c0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39c1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39c2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [39c4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer0.org1.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer0.org1.example.com | [39c5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer0.org1.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer0.org1.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer0.org1.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer0.org1.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer0.org1.example.com | [39c6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39c7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3960 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3961 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3962 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3963 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3964 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3965 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3966 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3967 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3968 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3969 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [396a 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [396b 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [396c 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [396d 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [396e 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [396f 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3970 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3971 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3972 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3973 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3974 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3975 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 gate 1602702142166575300 evaluation starts +peer1.org1.example.com | [3976 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3977 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3978 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3979 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 principal evaluation fails +peer1.org1.example.com | [397a 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891690 gate 1602702142166575300 evaluation fails +peer1.org1.example.com | [397b 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ba9 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3baa 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bab 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bac 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bad 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bae 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3baf 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bb0 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bb1 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bb2 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bb3 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bb4 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3bb5 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 gate 1602702146566547600 evaluation starts +peer0.org2.example.com | [3bb6 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bb7 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3bb8 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3bb9 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 principal evaluation fails +peer0.org2.example.com | [3bba 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004364ca0 gate 1602702146566547600 evaluation fails +peer0.org2.example.com | [3bbb 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bbc 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bbd 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bbe 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 gate 1602702146567912100 evaluation starts +peer0.org2.example.com | [3bbf 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bc0 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3bc1 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 principal matched by identity 0 +peer0.org2.example.com | [3bc2 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3bc3 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3bc4 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bc5 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bc6 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3bc7 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004365210 gate 1602702146567912100 evaluation succeeds +peer0.org2.example.com | [3bc8 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bc9 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bca 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [397c 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [397d 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [397e 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 gate 1602702142167493800 evaluation starts +peer1.org1.example.com | [397f 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3980 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3981 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 principal matched by identity 0 +peer1.org1.example.com | [3982 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer1.org1.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer1.org1.example.com | [3983 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer1.org1.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer1.org1.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer1.org1.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer1.org1.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer1.org1.example.com | [3984 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3985 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004891c00 gate 1602702142167493800 evaluation succeeds +peer1.org1.example.com | [3986 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3987 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3988 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3989 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [398a 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [398b 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [398c 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [398d 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [398e 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [398f 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3990 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3991 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3992 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3993 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3994 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3995 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3996 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: alive: +peer1.org1.example.com | [3997 10-14 19:02:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3998 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3999 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [399a 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [39ca 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer0.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer0.org1.example.com | [39cb 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer0.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer0.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer0.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer0.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer0.org1.example.com | [39cc 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39cd 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ce 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39cf 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39d2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [39d4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39d5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39d6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39d7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39d8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39d9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [39da 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39db 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39dc 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 gate 1602702134652666400 evaluation starts +peer0.org1.example.com | [39dd 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39de 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [39df 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 principal matched by identity 0 +peer0.org1.example.com | [39e0 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3b90 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 gate 1602702138579469800 evaluation starts +peer1.org2.example.com | [3b91 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b92 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3b93 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [3b94 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [3b95 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3b96 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 principal matched by identity 0 +peer1.org2.example.com | [3b97 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3b98 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3b99 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3b9a 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d5d4e0 gate 1602702138579469800 evaluation succeeds +peer1.org2.example.com | [3b9b 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b9c 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b9d 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b9e 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b9f 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ba0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3ba1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3ba2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3ba3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ba5 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba6 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba7 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [3ba8 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ba9 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3baa 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bab 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bac 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bad 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bae 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3baf 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [399b 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [399c 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [399d 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [399e 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [399f 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a0 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39a2 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +peer1.org1.example.com | [39a1 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a3 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39a4 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a5 10-14 19:02:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a6 10-14 19:02:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a7 10-14 19:02:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a8 10-14 19:02:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a9 10-14 19:02:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39aa 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ab 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ac 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [39ad 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ae 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [39af 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39b0 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [39b1 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [39b2 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [39b3 10-14 19:02:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [39b4 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39b5 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39b6 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39b7 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b8 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b9 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39ba 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39bb 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [39bc 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 gate 1602702142263504500 evaluation starts +peer1.org1.example.com | [39bd 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39be 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [39bf 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [39c0 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 principal evaluation fails +peer1.org1.example.com | [39c1 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901a60 gate 1602702142263504500 evaluation fails +peer1.org1.example.com | [39c2 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39c3 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39c4 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [39c5 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 gate 1602702142276434600 evaluation starts +peer1.org1.example.com | [39c6 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39c7 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [39c8 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 principal matched by identity 0 +peer1.org1.example.com | [39c9 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [39ca 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [39cb 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39cc 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004901fd0 gate 1602702142276434600 evaluation succeeds +peer1.org1.example.com | [39cd 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39ce 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39cf 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [39d0 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [39d1 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d2 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d3 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39d4 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39d5 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39d6 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39d7 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39d8 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3bb0 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bb1 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3bb2 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bb3 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3bb4 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bb5 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bb6 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3bb7 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3bb8 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3bb9 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 gate 1602702138610004400 evaluation starts +peer1.org2.example.com | [3bba 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bbb 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3bbc 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3bbd 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 principal evaluation fails +peer1.org2.example.com | [3bbe 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99750 gate 1602702138610004400 evaluation fails +peer1.org2.example.com | [3bbf 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bc0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bc1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3bc2 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 gate 1602702138610263600 evaluation starts +peer1.org2.example.com | [3bc3 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bc4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3bc5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3bc6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 principal evaluation fails +peer1.org2.example.com | [3bc7 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d99cc0 gate 1602702138610263600 evaluation fails +peer1.org2.example.com | [3bc8 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3bc9 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3bca 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3bcb 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 gate 1602702138610502300 evaluation starts +peer1.org2.example.com | [3bcc 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bcd 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3bce 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 principal matched by identity 0 +peer1.org2.example.com | [3bcf 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer1.org2.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer1.org2.example.com | [3bd0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer1.org2.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer1.org2.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer1.org2.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer1.org2.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer1.org2.example.com | [3bd1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39d9 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 gate 1602702142317084500 evaluation starts +peer1.org1.example.com | [39da 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39db 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [39dc 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [39dd 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 principal evaluation fails +peer1.org1.example.com | [39de 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049291d0 gate 1602702142317084500 evaluation fails +peer1.org1.example.com | [39df 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39e0 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39e1 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [39e2 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 gate 1602702142317672700 evaluation starts +peer1.org1.example.com | [39e3 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39e4 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [39e5 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 principal matched by identity 0 +peer1.org1.example.com | [39e6 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [39e7 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [39e8 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39e9 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004929740 gate 1602702142317672700 evaluation succeeds +peer1.org1.example.com | [39ea 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39eb 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39ec 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [39ed 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [39ee 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ef 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [39f0 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39f1 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [39f2 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [39f3 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [39f4 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [39f5 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39f6 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39f7 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39f8 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39f9 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39fa 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39fb 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39fc 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [39fd 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 gate 1602702142321423900 evaluation starts +peer1.org1.example.com | [39fe 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39ff 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a00 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a01 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 principal evaluation fails +peer1.org1.example.com | [3a02 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955970 gate 1602702142321423900 evaluation fails +peer1.org1.example.com | [3a03 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a04 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a05 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a06 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 gate 1602702142322296800 evaluation starts +peer1.org1.example.com | [3a07 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a08 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a09 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 principal matched by identity 0 +peer1.org1.example.com | [3a0a 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3a0b 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | [3bcb 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3bcc 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bcd 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bce 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bcf 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bd0 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bd1 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bd2 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bd3 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3bd4 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 gate 1602702146587951000 evaluation starts +peer0.org2.example.com | [3bd5 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bd6 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3bd7 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3bd8 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 principal evaluation fails +peer0.org2.example.com | [3bd9 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378410 gate 1602702146587951000 evaluation fails +peer0.org2.example.com | [3bda 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bdb 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bdc 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bdd 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bde 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 gate 1602702146606448900 evaluation starts +peer0.org2.example.com | [3bdf 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3be0 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3be1 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 principal matched by identity 0 +peer0.org2.example.com | [3be2 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3be3 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3be4 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3be5 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004378980 gate 1602702146606448900 evaluation succeeds +peer0.org2.example.com | [3be6 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3be7 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3be8 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3be9 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bea 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3beb 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3bec 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3bed 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3bee 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3bef 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bf0 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bf1 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bf2 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bf3 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bf4 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bf5 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bf6 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bf7 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bf8 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bf9 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3bfa 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 gate 1602702146676883900 evaluation starts +peer0.org2.example.com | [3bfb 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bfc 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3bfd 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3bfe 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 principal evaluation fails +peer0.org2.example.com | [3bff 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004394bb0 gate 1602702146676883900 evaluation fails +peer0.org2.example.com | [3c00 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c01 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c02 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c03 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 gate 1602702146681221400 evaluation starts +peer0.org2.example.com | [3c04 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c05 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c06 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 principal matched by identity 0 +peer0.org2.example.com | [3c07 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3c08 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3bd2 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc4230 gate 1602702138610502300 evaluation succeeds +peer1.org2.example.com | [3bd3 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bd4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bd5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3bd6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3bd7 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bd8 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3bd9 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3bda 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3bdb 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3bdc 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bdd 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bde 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bdf 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3be0 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be1 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be2 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3be3 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3be4 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\255\247\002 5j+F\342\272BJ\216\204\221.\364\027u|\320LK\261\256[Q'\030\217alc\2569\350" > alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > +peer1.org2.example.com | [3be5 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3be6 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3be7 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be8 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3be9 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3bea 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3beb 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bec 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bed 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [3bee 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3bef 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3bf0 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610101801 +peer1.org2.example.com | [3bf1 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97DC5FCC1EC57F5FBA269233B90C48CA26C22E796232F04ABC6C43ACB50C051E +peer1.org2.example.com | [3bf2 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3bf3 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf4 10-14 19:02:18.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf5 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf6 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf7 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3bf8 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bf9 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bfa 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [3bfb 10-14 19:02:18.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bfc 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfd 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bfe 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3bff 10-14 19:02:18.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c00 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c01 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c02 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3c03 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c04 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c05 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3c07 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c08 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c09 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4F3E4C58EA1FC9E16...08071A0C0A0565787030321203312E30 +peer1.org2.example.com | [3c0a 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A65F551892DE277A129E842D67A871B7035A50D08E432D2921DA89B260C6349C +peer1.org2.example.com | [3c06 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0b 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c0c 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0d 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c0e 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [3c0f 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [3c10 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c11 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c12 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c13 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c14 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c15 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c16 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c17 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c18 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 gate 1602702138892810400 evaluation starts +peer1.org2.example.com | [3c19 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c1a 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c1b 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c1c 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 principal evaluation fails +peer1.org2.example.com | [3c1d 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de19e0 gate 1602702138892810400 evaluation fails +peer1.org2.example.com | [3c1e 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +peer0.org1.example.com | [39e1 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +peer0.org1.example.com | 00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +peer0.org1.example.com | 00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +peer0.org1.example.com | 00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +peer0.org1.example.com | 00000040 09 a8 87 8a be a4 58 |......X| +peer0.org1.example.com | [39e2 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39e3 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 gate 1602702134652666400 evaluation succeeds +peer0.org1.example.com | [39e4 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39e5 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39e6 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39e7 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39e8 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39e9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ea 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [39eb 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +peer0.org1.example.com | 00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +peer0.org1.example.com | [39ec 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +peer0.org1.example.com | 00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +peer0.org1.example.com | 00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +peer0.org1.example.com | 00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +peer0.org1.example.com | 00000040 9e f4 98 25 6e 7a fd |...%nz.| +peer0.org1.example.com | [39ed 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39ee 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ef 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [39f0 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer0.org1.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer0.org1.example.com | [39f1 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer0.org1.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer0.org1.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer0.org1.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer0.org1.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer0.org1.example.com | [39f2 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39f3 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39f4 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39f5 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39f6 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [39f7 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [39f8 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +peer0.org1.example.com | 00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +peer0.org1.example.com | [39f9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +peer0.org1.example.com | 00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +peer0.org1.example.com | 00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +peer0.org1.example.com | 00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +peer0.org1.example.com | 00000040 f1 97 46 30 66 62 ed |..F0fb.| +peer0.org1.example.com | [39fa 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [39fb 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 27 7c 94 2e 63 38 23 34 2d 55 68 |0D. &'|..c8#4-Uh| +peer0.org1.example.com | 00000010 72 d8 9e ac 27 48 86 9a c3 5a 04 78 34 84 a1 08 |r...'H...Z.x4...| +peer0.org1.example.com | 00000020 66 75 b8 3e 02 20 77 25 70 f6 db 1d 9f ab 08 15 |fu.>. w%p.......| +peer0.org1.example.com | 00000030 82 21 16 d2 cd 0c ab cf 03 2c 7a f2 ba b4 26 65 |.!.......,z...&e| +peer0.org1.example.com | 00000040 66 c5 e6 6b d3 33 |f..k.3| +peer0.org1.example.com | [39fc 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3c09 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c0a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395120 gate 1602702146681221400 evaluation succeeds +peer0.org2.example.com | [3c0b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c0c 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c0d 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c0e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c0f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c10 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c11 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c12 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c13 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c14 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c15 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c16 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3c17 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 gate 1602702146683076000 evaluation starts +peer0.org2.example.com | [3c18 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c19 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c1a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c1b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 principal evaluation fails +peer0.org2.example.com | [3c1c 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4320 gate 1602702146683076000 evaluation fails +peer0.org2.example.com | [3c1d 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c1e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c1f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c20 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 gate 1602702146683352600 evaluation starts +peer0.org2.example.com | [3c21 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c22 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c23 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 principal matched by identity 0 +peer0.org2.example.com | [3c24 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3c25 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3c26 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c27 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043b4890 gate 1602702146683352600 evaluation succeeds +peer0.org2.example.com | [3c28 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c29 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c2a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c2b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c2c 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3c1f 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c20 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3c21 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 gate 1602702138895174700 evaluation starts +peer1.org2.example.com | [3c22 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c23 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c24 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c25 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3c26 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 principal evaluation fails +peer1.org2.example.com | [3c27 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de1f50 gate 1602702138895174700 evaluation fails +peer1.org2.example.com | [3c28 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c29 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c2a 10-14 19:02:18.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c2b 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 gate 1602702138900062400 evaluation starts +peer1.org2.example.com | [3c2c 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c2d 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c2e 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 principal matched by identity 0 +peer1.org2.example.com | [3c30 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3c31 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3c32 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c33 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e124c0 gate 1602702138900062400 evaluation succeeds +peer1.org2.example.com | [3c34 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c35 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c2f 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c36 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c38 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c39 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c37 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c3a 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c3b 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3a0c 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a0d 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004955ee0 gate 1602702142322296800 evaluation succeeds +peer1.org1.example.com | [3a0e 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a0f 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a10 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a11 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a12 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a13 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a14 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a15 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a16 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a17 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a18 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a19 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3a1a 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 gate 1602702142324223000 evaluation starts +peer0.org2.example.com | [3c2d 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3c2e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3c2f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3c30 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c31 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c32 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c33 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c34 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c35 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c36 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c37 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c38 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c39 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3c3a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c3b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c3c 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3d 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c3f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c40 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c41 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c42 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c43 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c44 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3c45 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c46 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 gate 1602702146689411800 evaluation starts +peer0.org2.example.com | [3c47 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c48 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3c49 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4a 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4b 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c3c 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c3d 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c3e 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c40 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c41 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c42 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c43 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 gate 1602702138904499100 evaluation starts +peer1.org2.example.com | [3c45 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c46 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c47 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c48 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 principal evaluation fails +peer1.org2.example.com | [3c49 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13780 gate 1602702138904499100 evaluation fails +peer1.org2.example.com | [3c4a 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c4c 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c4d 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3c4e 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 gate 1602702138905260600 evaluation starts +peer1.org2.example.com | [3c4f 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c51 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c52 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3c53 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 principal evaluation fails +peer1.org2.example.com | [3c54 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e13cf0 gate 1602702138905260600 evaluation fails +peer1.org2.example.com | [3c55 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c56 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c57 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c58 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 gate 1602702138906023100 evaluation starts +peer1.org2.example.com | [3c59 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c5a 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c5b 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 principal matched by identity 0 +peer1.org2.example.com | [3c5c 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3c5d 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3c4b 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3c5e 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c5f 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39fd 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [39fe 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ff 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a00 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a01 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a02 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a03 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a04 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a05 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a06 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a07 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a08 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a09 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a0a 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a0b 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3a0c 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0d 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a0e 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a0f 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a10 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a11 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a12 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a13 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 gate 1602702135148137600 evaluation starts +peer0.org1.example.com | [3a14 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a15 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3a16 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 principal matched by identity 0 +peer0.org1.example.com | [3a17 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 82 54 dd a3 45 86 1d 4f f3 56 2e eb 28 87 aa |S.T..E..O.V..(..| +peer0.org1.example.com | 00000010 92 cc 18 d7 a4 1d f1 a6 7c e5 1e c2 76 42 3b 86 |........|...vB;.| +peer0.org1.example.com | [3a18 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 bb 34 42 61 48 0e fd 06 c9 cf |0E.!...4BaH.....| +peer0.org1.example.com | 00000010 b8 c9 59 3c 07 5a 2e 18 2c c8 ce c7 b2 26 88 eb |..Y<.Z..,....&..| +peer0.org1.example.com | 00000020 20 e0 53 80 61 02 20 21 f1 84 0b 8c 2e 63 df 4e | .S.a. !.....c.N| +peer0.org1.example.com | 00000030 d4 40 a4 45 c5 f8 9d bf 83 62 ee c3 92 33 ec e8 |.@.E.....b...3..| +peer0.org1.example.com | 00000040 e7 85 99 c8 97 03 d4 |.......| +peer0.org1.example.com | [3a19 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a1a 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 gate 1602702135148137600 evaluation succeeds +peer0.org1.example.com | [3a1b 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a1c 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a1d 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a1e 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a1f 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a20 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3a21 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a22 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3a23 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3a24 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a25 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a26 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a27 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a28 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a29 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2a 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2b 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2c 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2d 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a2e 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a2f 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a30 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a31 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a32 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a33 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a34 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a35 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a36 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a37 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a38 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a39 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3a 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a3b 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3c 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a3d 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3c44 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3c60 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c50 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3c61 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c62 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e38260 gate 1602702138906023100 evaluation succeeds +peer1.org2.example.com | [3c3f 10-14 19:02:18.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c63 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c65 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c66 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c67 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c68 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3c69 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3c6a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c64 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c6b 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c6c 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [3c6d 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [3c6e 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c6f 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c70 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c71 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c72 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c73 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c74 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c75 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c76 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 gate 1602702138953026400 evaluation starts +peer1.org2.example.com | [3c77 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c78 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c79 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c7a 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 principal evaluation fails +peer1.org2.example.com | [3c7b 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e564c0 gate 1602702138953026400 evaluation fails +peer1.org2.example.com | [3c7c 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c7d 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c7e 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3c7f 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 gate 1602702138956537600 evaluation starts +peer1.org2.example.com | [3c80 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c81 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c82 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3c83 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 principal evaluation fails +peer1.org2.example.com | [3c84 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56a30 gate 1602702138956537600 evaluation fails +peer1.org2.example.com | [3c85 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c86 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c87 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c89 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c88 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c8a 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3c8b 10-14 19:02:18.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 gate 1602702138959842700 evaluation starts +peer1.org1.example.com | [3a1b 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a1c 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a1d 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a1e 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 principal evaluation fails +peer1.org1.example.com | [3a1f 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049670e0 gate 1602702142324223000 evaluation fails +peer1.org1.example.com | [3a20 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a21 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a22 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a23 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 gate 1602702142324875300 evaluation starts +peer1.org1.example.com | [3a24 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a25 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a26 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 principal matched by identity 0 +peer1.org1.example.com | [3a27 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3a28 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3a29 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a2a 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004967650 gate 1602702142324875300 evaluation succeeds +peer1.org1.example.com | [3a2b 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a2c 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a2d 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a2e 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a2f 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a30 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a31 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3a32 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3a33 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3a34 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3a35 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a36 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a37 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c4c 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c4d 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c4e 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c4f 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c50 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c51 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c52 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 principal evaluation fails +peer0.org2.example.com | [3c53 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb210 gate 1602702146689411800 evaluation fails +peer0.org2.example.com | [3c54 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c55 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c56 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c57 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 gate 1602702146699106400 evaluation starts +peer0.org2.example.com | [3c58 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c59 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c5a 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 principal matched by identity 0 +peer0.org2.example.com | [3c5b 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3c5c 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3c5d 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c5e 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cb780 gate 1602702146699106400 evaluation succeeds +peer0.org2.example.com | [3c5f 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c60 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c61 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c62 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c63 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c64 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c65 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c66 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c67 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c68 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c69 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c6a 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3c6b 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 gate 1602702146704704200 evaluation starts +peer0.org2.example.com | [3c6c 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c6d 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c6e 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c6f 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 principal evaluation fails +peer1.org2.example.com | [3c8c 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c8d 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c8e 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c8f 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c91 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c92 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c90 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3c93 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 principal matched by identity 0 +peer1.org2.example.com | [3c94 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3c95 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3c96 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c97 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e56fa0 gate 1602702138959842700 evaluation succeeds +peer1.org2.example.com | [3c98 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c99 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c9a 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c9b 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c9c 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c9d 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a38 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a39 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a3a 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a3b 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a3c 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3a3d 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 gate 1602702142328552100 evaluation starts +peer1.org1.example.com | [3a3e 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a3f 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a40 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a41 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 principal evaluation fails +peer1.org1.example.com | [3a42 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049857d0 gate 1602702142328552100 evaluation fails +peer1.org1.example.com | [3a43 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a44 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a45 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a46 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 gate 1602702142329278600 evaluation starts +peer1.org1.example.com | [3a47 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a48 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a49 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 principal matched by identity 0 +peer1.org1.example.com | [3a4a 10-14 19:02:22.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3a4b 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3a4c 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a4d 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004985d40 gate 1602702142329278600 evaluation succeeds +peer1.org1.example.com | [3a4e 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a4f 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a50 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a51 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a52 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a53 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a54 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a55 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a56 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a57 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a58 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a59 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3a5a 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 gate 1602702142336198300 evaluation starts +peer1.org1.example.com | [3a5b 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a5c 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a5d 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a5e 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 principal evaluation fails +peer1.org1.example.com | [3a5f 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a0f40 gate 1602702142336198300 evaluation fails +peer1.org1.example.com | [3a60 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a61 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a62 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a63 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 gate 1602702142336450200 evaluation starts +peer1.org1.example.com | [3a64 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a65 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a66 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 principal matched by identity 0 +peer1.org1.example.com | [3a67 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3a68 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3a69 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a6a 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049a14b0 gate 1602702142336450200 evaluation succeeds +peer1.org1.example.com | [3a6b 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a6c 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a6d 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a6e 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a6f 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a70 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a71 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a72 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a73 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3a74 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c9e 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c9f 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ca0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ca1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ca2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ca3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3ca4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 gate 1602702138961950600 evaluation starts +peer1.org2.example.com | [3ca5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ca6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ca7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3ca8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 principal evaluation fails +peer1.org2.example.com | [3ca9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6ef40 gate 1602702138961950600 evaluation fails +peer1.org2.example.com | [3caa 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cab 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cac 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3cad 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 gate 1602702138962516100 evaluation starts +peer1.org2.example.com | [3cae 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3caf 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3cb0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3cb1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 principal evaluation fails +peer1.org2.example.com | [3cb2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6f4b0 gate 1602702138962516100 evaluation fails +peer1.org2.example.com | [3cb3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3cb4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3cb5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3cb6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 gate 1602702138963195600 evaluation starts +peer1.org2.example.com | [3cb7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cb8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3cb9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 principal matched by identity 0 +peer1.org2.example.com | [3cba 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3cbb 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3cbc 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cbd 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e6fa20 gate 1602702138963195600 evaluation succeeds +peer1.org2.example.com | [3cbe 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cbf 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cc0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3cc1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cc2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3cc3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3cc4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cc5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cc6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cc7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer1.org2.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer1.org2.example.com | [3cc8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer1.org2.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer1.org2.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer1.org2.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer1.org2.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer1.org2.example.com | [3cc9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cca 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ccb 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ccc 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ccd 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cce 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ccf 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cd0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3cd1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 gate 1602702138966411600 evaluation starts +peer1.org2.example.com | [3cd2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cd3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3cd4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3cd5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 principal evaluation fails +peer1.org2.example.com | [3cd6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e89c50 gate 1602702138966411600 evaluation fails +peer1.org2.example.com | [3cd7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cd8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cd9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3cda 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 gate 1602702138967272500 evaluation starts +peer1.org2.example.com | [3cdb 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cdc 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3cdd 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3cde 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 principal evaluation fails +peer1.org2.example.com | [3cdf 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea41c0 gate 1602702138967272500 evaluation fails +peer1.org2.example.com | [3ce0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ce1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ce2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ce3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 gate 1602702138967969100 evaluation starts +peer1.org2.example.com | [3ce4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ce5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ce6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 principal matched by identity 0 +peer1.org2.example.com | [3ce7 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3ce8 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3ce9 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cea 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4730 gate 1602702138967969100 evaluation succeeds +peer1.org2.example.com | [3ceb 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3cec 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ced 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3cee 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3cef 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf0 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cf1 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3cf2 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cf3 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cf4 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cf5 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cf6 10-14 19:02:18.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3cf7 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 gate 1602702138969987600 evaluation starts +peer1.org2.example.com | [3cf8 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cf9 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3cfa 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3cfb 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 principal evaluation fails +peer1.org2.example.com | [3cfc 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5930 gate 1602702138969987600 evaluation fails +peer1.org2.example.com | [3cfd 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cfe 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3cff 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3d00 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 gate 1602702138970790200 evaluation starts +peer1.org2.example.com | [3d01 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d02 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3d03 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3d04 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 principal evaluation fails +peer1.org2.example.com | [3d05 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea5ea0 gate 1602702138970790200 evaluation fails +peer0.org1.example.com | [3a3f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a40 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a41 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a42 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3a43 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a44 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a45 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a46 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a47 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a48 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a49 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a4a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 gate 1602702135241425600 evaluation starts +peer0.org1.example.com | [3a4b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a4c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3a4d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 principal matched by identity 0 +peer0.org1.example.com | [3a4e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 2c ae 75 56 83 98 80 d0 bb d1 b4 0a 55 59 d7 |1,.uV........UY.| +peer0.org1.example.com | 00000010 bd b1 41 b1 d0 62 c7 69 a3 41 f9 a2 1e 9d 82 93 |..A..b.i.A......| +peer0.org1.example.com | [3a4f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 98 ed b9 86 ae e1 66 89 52 03 |0E.!........f.R.| +peer0.org1.example.com | 00000010 de 32 8e 15 87 10 7c 65 c2 7c eb f0 a2 8c 50 6b |.2....|e.|....Pk| +peer0.org1.example.com | 00000020 d9 4c ad 94 3e 02 20 07 b7 a5 a9 93 25 1b c9 41 |.L..>. .....%..A| +peer0.org1.example.com | 00000030 b8 15 62 46 e8 44 12 a5 b0 f1 8f 59 3e f7 ad d6 |..bF.D.....Y>...| +peer0.org1.example.com | 00000040 4f 69 f0 8d 3b d0 aa |Oi..;..| +peer0.org1.example.com | [3a50 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a51 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 gate 1602702135241425600 evaluation succeeds +peer0.org1.example.com | [3a52 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a53 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a54 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a55 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a56 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a57 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3a58 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a59 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3c70 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4980 gate 1602702146704704200 evaluation fails +peer0.org2.example.com | [3c71 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c72 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c73 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c74 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 gate 1602702146707139200 evaluation starts +peer0.org2.example.com | [3c75 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c76 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c77 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 principal matched by identity 0 +peer0.org2.example.com | [3c78 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3c79 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3c7a 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c7b 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f4ef0 gate 1602702146707139200 evaluation succeeds +peer0.org2.example.com | [3c7c 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c7d 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c7e 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c7f 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c80 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3c81 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3c82 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3c83 10-14 19:02:26.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3c84 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c85 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c86 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c87 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c88 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c89 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c8a 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3c8b 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c8c 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c8d 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c8e 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c8f 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c90 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c91 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c92 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3c93 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 gate 1602702146717249300 evaluation starts +peer0.org2.example.com | [3c94 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c95 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c96 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3c97 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 principal evaluation fails +peer0.org2.example.com | [3c98 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442c620 gate 1602702146717249300 evaluation fails +peer0.org2.example.com | [3c99 10-14 19:02:26.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c9a 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3c9b 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c9c 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 gate 1602702146727238200 evaluation starts +peer0.org2.example.com | [3c9d 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c9e 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3c9f 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 principal matched by identity 0 +peer0.org2.example.com | [3ca0 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org2.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer0.org2.example.com | [3ca1 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer0.org2.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer0.org2.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer0.org2.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer0.org2.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer0.org2.example.com | [3ca2 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ca3 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442cb90 gate 1602702146727238200 evaluation succeeds +peer0.org2.example.com | [3ca4 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ca5 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ca6 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ca7 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ca8 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ca9 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3caa 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3cab 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3cac 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3cad 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cae 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3caf 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb0 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3cb1 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cb2 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cb3 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d06 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d07 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d08 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d09 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 gate 1602702138971174900 evaluation starts +peer1.org2.example.com | [3d0a 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a5a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3a5b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a5f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a60 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a61 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a62 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a63 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a64 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a65 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a66 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a67 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a68 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a69 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a6a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a6b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a6c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a6d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a6e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a6f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a70 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a71 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a72 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a73 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a74 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a75 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a76 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a77 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a78 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3a79 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 f7 53 cb 14 25 7b a3 a7 6b 37 e8 19 a1 a3 93 |G.S..%{..k7.....| +peer0.org2.example.com | [3cb4 10-14 19:02:26.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3cb5 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: alive:\323\001\272\024\344)p\034oQ'\360\316Z\235@\237\304J\246\024\334\251\302\020\342g_\024s\002 K\212\260\256\305\254\211~P\221\377\205\240Ze\022\226\306\020\231HY\364I\367\304Bi%\001\n\350" > +peer0.org2.example.com | [3cb6 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cb7 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cb8 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cb9 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cba 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cbb 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cbc 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cbd 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbe 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cbf 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cc0 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3cc1 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3cc2 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53166 +peer0.org2.example.com | [3cc3 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0043fad20 +peer0.org2.example.com | [3cc4 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [3cc5 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3cc6 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [3cc7 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3cc8 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 4d 16 02 ca b1 e2 7a 5c 33 be e0 81 6b 1c a3 |.M.....z\3...k..| +peer0.org2.example.com | 00000010 26 52 06 4c cb 97 07 0a f3 df 5a 2e 2d 1d 4e 3d |&R.L......Z.-.N=| +peer0.org2.example.com | [3cc9 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 82 86 b7 5e 9f 75 f5 d9 1d 12 |0E.!.....^.u....| +peer0.org2.example.com | 00000010 c4 5c b5 e1 9c cc 5d fc cf 64 75 68 97 39 ba 32 |.\....]..duh.9.2| +peer0.org2.example.com | 00000020 2d 3f 5f 1a 8e 02 20 6c 9a 9e a7 80 b9 41 59 18 |-?_... l.....AY.| +peer0.org2.example.com | 00000030 d1 ad 04 d1 11 4b 36 e1 85 3c 9b 8f 12 55 ab f6 |.....K6..<...U..| +peer0.org2.example.com | 00000040 6e 75 3f 36 f1 c8 9f |nu?6...| +peer0.org2.example.com | [3cca 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3ccb 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0042fed90, header 0xc0043fb130 +peer0.org2.example.com | [3ccc 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [3ccd 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][ef5cc667] processing txid: ef5cc667d03bfb20078bead16676e4d359789bfddc73ebecb6ef867e64264360 +peer0.org2.example.com | [3cce 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][ef5cc667] Entry chaincode: name:"cscc" +peer0.org2.example.com | [3ccf 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> INFO [][ef5cc667] Entry chaincode: name:"cscc" +peer0.org2.example.com | [3cd0 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [3cd1 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [3cd2 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 4d 16 02 ca b1 e2 7a 5c 33 be e0 81 6b 1c a3 |.M.....z\3...k..| +peer0.org2.example.com | 00000010 26 52 06 4c cb 97 07 0a f3 df 5a 2e 2d 1d 4e 3d |&R.L......Z.-.N=| +peer0.org2.example.com | [3cd3 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 82 86 b7 5e 9f 75 f5 d9 1d 12 |0E.!.....^.u....| +peer0.org2.example.com | 00000010 c4 5c b5 e1 9c cc 5d fc cf 64 75 68 97 39 ba 32 |.\....]..duh.9.2| +peer0.org2.example.com | 00000020 2d 3f 5f 1a 8e 02 20 6c 9a 9e a7 80 b9 41 59 18 |-?_... l.....AY.| +peer0.org2.example.com | 00000030 d1 ad 04 d1 11 4b 36 e1 85 3c 9b 8f 12 55 ab f6 |.....K6..<...U..| +peer0.org2.example.com | 00000040 6e 75 3f 36 f1 c8 9f |nu?6...| +peer0.org2.example.com | [3cd4 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU [ef5cc667] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [3d0b 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3d0c 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 principal matched by identity 0 +peer1.org2.example.com | [3d0d 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3d0e 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3d0f 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d10 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec0410 gate 1602702138971174900 evaluation succeeds +peer1.org2.example.com | [3d11 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d12 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d13 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d14 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d15 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3d16 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3d17 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d18 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d19 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d1a 10-14 19:02:18.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1b 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d1c 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1d 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d1e 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3d1f 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 f6 93 99 69 05 e0 ec 05 31 9b 69 e4 6a b0 89 |P...i....1.i.j..| +peer1.org2.example.com | 00000010 58 43 4d b9 53 c6 69 38 bd 90 d2 13 78 1b 1f d9 |XCM.S.i8....x...| +peer1.org2.example.com | [3d20 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 01 6b 5d 3e 35 a2 c2 de 0d 32 ec |0D. p.k]>5....2.| +peer1.org2.example.com | 00000010 56 d9 eb 08 72 bb 29 d1 82 6c 50 3a b7 f6 57 e3 |V...r.)..lP:..W.| +peer1.org2.example.com | 00000020 ba e2 77 d5 02 20 63 68 15 0d 98 41 bf a4 ec 4c |..w.. ch...A...L| +peer1.org2.example.com | 00000030 f2 ff 4b 5e 19 32 3b 57 b8 a5 e8 87 77 67 75 72 |..K^.2;W....wgur| +peer1.org2.example.com | 00000040 9e cc a6 f4 df 3e |.....>| +peer1.org2.example.com | [3d21 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d22 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3d23 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d24 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d25 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d26 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d27 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d28 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d29 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d2a 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d2b 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d2c 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d2d 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d2e 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d2f 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3d30 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d31 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d32 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d33 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d34 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d35 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d36 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d37 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d38 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d39 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d3a 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3d3b 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d3c 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d3d 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161035 +peer1.org2.example.com | [3d3e 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 747C5CE997F2CBC14F81A958326D128209F54B2BE27858D5CFC2A9C579AE9BA2 +peer1.org2.example.com | [3d3f 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d40 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3d41 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3d42 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3d43 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d44 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d45 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d46 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d47 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d48 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d49 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d4a 10-14 19:02:20.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d4b 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d4c 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d4d 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d4e 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d4f 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d50 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d51 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d52 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d53 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d54 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3d55 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d56 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d57 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d58 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d59 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3d5a 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3d5b 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3d5c 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 gate 1602702140388925200 evaluation starts +peer1.org2.example.com | [3d5d 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d5e 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3d5f 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3d60 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 principal evaluation fails +peer1.org2.example.com | [3d61 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06110 gate 1602702140388925200 evaluation fails +peer1.org2.example.com | [3d62 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d63 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3d64 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3d65 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 gate 1602702140389622500 evaluation starts +peer1.org2.example.com | [3d66 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d67 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3d68 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3d69 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 principal evaluation fails +peer1.org2.example.com | [3d6a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06680 gate 1602702140389622500 evaluation fails +peer1.org2.example.com | [3d6b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d6c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d6d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d6e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 gate 1602702140390428400 evaluation starts +peer1.org2.example.com | [3d6f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a75 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a76 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a77 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a78 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a79 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a7a 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3a7b 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 gate 1602702142337566800 evaluation starts +peer1.org1.example.com | [3a7c 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a7d 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a7e 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a7f 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 principal evaluation fails +peer1.org1.example.com | [3a80 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ba950 gate 1602702142337566800 evaluation fails +peer1.org1.example.com | [3a81 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a82 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a83 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a84 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 gate 1602702142341924600 evaluation starts +peer1.org1.example.com | [3a85 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a86 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3a87 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 principal matched by identity 0 +peer1.org1.example.com | [3a88 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer1.org1.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer1.org1.example.com | [3a89 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer1.org1.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer1.org1.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer1.org1.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer1.org1.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer1.org1.example.com | [3a8a 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a8b 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049baec0 gate 1602702142341924600 evaluation succeeds +peer1.org1.example.com | [3a8c 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a8d 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a8e 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a8f 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a90 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3a91 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3a92 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3a93 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3a94 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3a95 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a96 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a97 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3a98 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a99 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a9a 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a9b 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a9c 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: alive: +peer1.org1.example.com | [3a9d 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a9e 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a9f 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aa0 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aa1 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aa2 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3aa3 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aa4 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aa5 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3aa6 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa7 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aa8 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa9 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aaa 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aab 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3aac 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3aad 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3aae 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ab0 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3ab1 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ab2 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab4 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aaf 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab5 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ab3 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab6 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ab7 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab8 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab9 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aba 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3abb 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3abc 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3abd 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3abe 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3abf 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ac0 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ac1 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103D +peer1.org1.example.com | [3ac2 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0A422AA3CD70937C474E2D11F6FDE1373000E6805551D6543A9858376106F019 +peer1.org1.example.com | [3ac3 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3ac4 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3ac5 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000010 be fb 11 4b 98 78 f7 e6 fb 1b 9f b1 a6 1b 68 b2 |...K.x........h.| +peer0.org1.example.com | [3a7a 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 e6 ae b2 bb 9b ff db 19 46 8c |0E.!..........F.| +peer0.org1.example.com | 00000010 eb 5a ee de 03 6c 24 3f 8d 92 59 67 37 a6 d6 9e |.Z...l$?..Yg7...| +peer0.org1.example.com | 00000020 1a 97 ee c5 1c 02 20 20 4f c5 9d 88 70 dc 47 ca |...... O...p.G.| +peer0.org1.example.com | 00000030 c6 9b cf 6d 80 2d da f9 e0 29 f5 67 2a 43 fc ee |...m.-...).g*C..| +peer0.org1.example.com | 00000040 95 27 a7 29 f9 e3 a7 |.'.)...| +peer0.org1.example.com | [3a7b 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a7c 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3a7d 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a7e 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3a7f 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3a80 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a81 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a82 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a83 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a84 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a85 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a86 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a87 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a88 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a89 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a8a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a8b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a8c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a8d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a8e 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a8f 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a90 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a91 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a92 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a93 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a94 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a95 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a96 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a97 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a98 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102F +peer0.org1.example.com | [3a99 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08AAE7D48DFDE78A71308E0C0B4FE7ED4E7975E7058D85208F3BF5CCC1B2AAFB +peer0.org1.example.com | [3a9a 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a9b 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3a9c 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3a9d 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3a9e 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a9f 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa0 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa1 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3aa2 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3aa3 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3aa4 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3aa5 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3aa6 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3aa7 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aa8 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aa9 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3aaa 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3aab 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aac 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aad 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aae 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [3aaf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ab0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [3ab1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 gate 1602702136431690200 evaluation starts +peer0.org1.example.com | [3ab2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ab3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ab4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 principal matched by identity 0 +peer0.org1.example.com | [3ab5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 50 1f 2e e7 76 f5 a9 11 7a fe a4 7e f4 c7 a9 |.P...v...z..~...| +peer0.org1.example.com | 00000010 f1 58 d6 02 80 14 cd 2e 63 80 da f9 b5 af 7b 79 |.X......c.....{y| +peer0.org1.example.com | [3ab6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 46 c6 88 8d e7 a1 94 8b ef 79 |0E.!..F........y| +peer0.org1.example.com | 00000010 56 b0 df 5f af f1 64 26 2d 54 98 d1 74 bc 02 dd |V.._..d&-T..t...| +peer0.org1.example.com | 00000020 f2 01 49 9e f2 02 20 72 4e df 95 74 87 86 7e 1f |..I... rN..t..~.| +peer0.org1.example.com | 00000030 af e7 75 b3 66 23 d2 1c 9b 78 0b ac a8 25 74 d8 |..u.f#...x...%t.| +peer0.org1.example.com | 00000040 c4 e8 8f bf dc 56 9c |.....V.| +peer0.org1.example.com | [3ab7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ab8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 gate 1602702136431690200 evaluation succeeds +peer0.org1.example.com | [3ab9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3aba 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3abb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3abc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3abd 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [3abe 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org1.example.com | [3abf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ac0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org1.example.com | [3ac1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [3ac2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [3ac3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org1.example.com | [3ac4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org1.example.com | [3ac5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org1.example.com | [3ac6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org1.example.com | [3ac7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org1.example.com | [3ac8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [3ac9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00463d100 env 0xc004731ae0 txn 0 +peer0.org1.example.com | [3aca 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004731ae0 +peer0.org1.example.com | [3acb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer0.org1.example.com | [3acc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [3acd 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [3ace 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3acf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cd5 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU [ef5cc667] notifying Txid:ef5cc667d03bfb20078bead16676e4d359789bfddc73ebecb6ef867e64264360, channelID: +peer0.org2.example.com | [3cd6 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3d70 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3d71 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 principal matched by identity 0 +peer1.org2.example.com | [3d72 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 32 67 85 ff 47 af 20 ff 06 2c 2e 97 a3 f4 26 |.2g..G. ..,....&| +peer1.org2.example.com | 00000010 d2 36 9e bb 3d 43 7e 64 be 4d 75 0b 7b 29 28 ce |.6..=C~d.Mu.{)(.| +peer1.org2.example.com | [3d73 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 f7 1f 36 a6 82 14 b6 a3 06 2e |0E.!....6.......| +peer1.org2.example.com | 00000010 81 8e 2f b8 3d d2 43 41 5a cd 1b f4 f9 ba ad 8c |../.=.CAZ.......| +peer1.org2.example.com | 00000020 09 6a 45 ed 1d 02 20 2c e3 e7 51 be 84 a8 e1 5d |.jE... ,..Q....]| +peer1.org2.example.com | 00000030 fc 06 41 31 3b fc 07 82 c5 92 f4 77 1b 36 73 24 |..A1;......w.6s$| +peer1.org2.example.com | 00000040 be 1a e1 bb 6f 9e 2b |....o.+| +peer1.org2.example.com | [3d74 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d75 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f06bf0 gate 1602702140390428400 evaluation succeeds +peer1.org2.example.com | [3d76 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d77 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d78 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d79 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d7a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d7b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3d7c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d7d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d7e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3d7f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d80 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d81 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d82 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d83 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d84 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d85 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d86 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d87 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d88 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d89 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d8e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d8f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d90 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d91 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d92 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d93 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d94 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d95 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ac6 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ac7 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ac8 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ac9 10-14 19:02:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aca 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3acc 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3acd 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ace 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3acf 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ad0 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad1 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3acb 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ad0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3ad1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [3ad2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [3ad3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [3ad4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3ad5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +peer0.org1.example.com | 00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.| +peer0.org1.example.com | [3ad6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +peer0.org1.example.com | 00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +peer0.org1.example.com | 00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +peer0.org1.example.com | 00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +peer0.org1.example.com | 00000040 4d 58 92 4e a4 4a df |MX.N.J.| +peer0.org1.example.com | [3ad7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3ad8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc004866000, header channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +peer0.org1.example.com | [3ad9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [3ada 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3add 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ade 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ae0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3ae1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3ae2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3ae3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3ae4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3ae5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3ae6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3ae7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3ae8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3ae9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [3cd7 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> INFO [][ef5cc667] Exit chaincode: name:"cscc" (2ms) +peer0.org2.example.com | [3cd8 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU [][ef5cc667] Exit +peer0.org2.example.com | [3cd9 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53166 +peer0.org2.example.com | [3cda 10-14 19:02:28.57 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53166 grpc.code=OK grpc.call_duration=8.7838ms +peer0.org2.example.com | [3cdb 10-14 19:02:28.58 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3cdc 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cdd 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3cde 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 1d c0 75 b6 3d 19 c9 d5 5e d5 7b 13 7c c0 47 |...u.=...^.{.|.G| +peer0.org2.example.com | 00000010 df 25 17 26 ee fb bf 81 fb 89 23 c6 d2 1b c9 62 |.%.&......#....b| +peer0.org2.example.com | [3cdf 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 96 3f 2c 41 15 50 0e 82 b8 11 |0E.!...?,A.P....| +peer0.org2.example.com | 00000010 48 d1 85 ce 85 47 fc 7e 26 b2 7c 13 a0 c2 60 48 |H....G.~&.|...`H| +peer0.org2.example.com | 00000020 95 65 2a 1f d5 02 20 5a 1c 4b f4 82 24 67 b7 bc |.e*... Z.K..$g..| +peer0.org2.example.com | 00000030 45 56 62 2b 9c 06 d9 fe 9f 2b 67 cd 49 44 82 02 |EVb+.....+g.ID..| +peer0.org2.example.com | 00000040 a4 de b2 c4 7c c7 68 |....|.h| +peer0.org2.example.com | [3ce0 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ce1 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ce2 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ce3 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3ce4 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3ce5 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53174 +peer0.org2.example.com | [3ce6 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0043fbc20 +peer0.org2.example.com | [3ce7 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [3ce8 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3ce9 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [3cea 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3ceb 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 4e 7b f6 76 bb 24 64 b4 be ab 6e 7d f4 dc 67 |.N{.v.$d...n}..g| +peer0.org2.example.com | 00000010 e0 72 be 63 89 c2 5e 4b 62 df 14 d9 96 ee c1 bb |.r.c..^Kb.......| +peer0.org2.example.com | [3cec 10-14 19:02:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 11 79 ba 67 b8 ee be 1f e7 38 |0E.!...y.g.....8| +peer0.org2.example.com | 00000010 b7 cf c1 e8 99 8d 77 9a 5b f5 a7 af 86 dd a6 7d |......w.[......}| +peer0.org2.example.com | 00000020 dd 29 32 a6 d4 02 20 3c 57 e0 f2 81 68 8b 83 a2 |.)2... DEBU exits successfully +peer0.org2.example.com | [3cee 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0042ff110, header 0xc0044ba050 +peer0.org2.example.com | [3cef 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [3cf0 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU [][1d6c5b1c] processing txid: 1d6c5b1c554ef841fa6ef21ece050ed12f2693f5891c5067912112dea83f06f5 +peer0.org2.example.com | [3cf1 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU [][1d6c5b1c] Entry chaincode: name:"qscc" +peer0.org2.example.com | [3cf2 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> INFO [][1d6c5b1c] Entry chaincode: name:"qscc" +peer0.org2.example.com | [3cf3 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [3cf4 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [3cf5 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [3cf6 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [3cf7 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3cf8 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3cf9 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3cfa 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cfb 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3cfc 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 gate 1602702149655708000 evaluation starts +peer0.org2.example.com | [3cfd 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3cfe 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3cff 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [3d96 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d97 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d98 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d99 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d9a 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d9b 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3d9c 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d9d 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d9e 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d9f 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3da0 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3da1 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3da2 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3da3 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 gate 1602702140577267000 evaluation starts +peer1.org2.example.com | [3da4 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3da5 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3da6 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3da7 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 principal evaluation fails +peer1.org2.example.com | [3da8 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3cc40 gate 1602702140577267000 evaluation fails +peer1.org2.example.com | [3da9 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3daa 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3dab 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3dac 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 gate 1602702140577914200 evaluation starts +peer1.org2.example.com | [3dad 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3dae 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3daf 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3db0 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 principal evaluation fails +peer1.org2.example.com | [3db1 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d1b0 gate 1602702140577914200 evaluation fails +peer1.org2.example.com | [3db2 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3db3 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3db4 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3db5 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 gate 1602702140578167800 evaluation starts +peer1.org2.example.com | [3db6 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3db7 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3aea 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3aeb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3aec 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3aed 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3aee 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3aef 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3af0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3af1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3af2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3af3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3af4 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3af5 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3af6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3af7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3af8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3af9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3afa 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3afb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3afc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3afd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3afe 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3aff 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3b00 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3b01 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org1.example.com | [3b02 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org1.example.com | [3b03 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org1.example.com | [3b04 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3b05 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3b06 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3b07 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3b08 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3b09 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3b0a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [3b0b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [3b0c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org1.example.com | [3b0d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b0e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [3b0f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org1.example.com | [3b10 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 gate 1602702136443053800 evaluation starts +peer0.org1.example.com | [3b11 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [3b12 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3b13 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3b14 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 processing identity 1 with bytes of 115a6c0 +peer0.org1.example.com | [3b15 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [3b16 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [3b17 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3b18 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3b19 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [3b1a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3b1b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 principal matched by identity 1 +peer0.org1.example.com | [3b1c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +peer0.org1.example.com | 00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.| +peer0.org1.example.com | [3b1d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +peer0.org1.example.com | 00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +peer0.org1.example.com | 00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +peer0.org1.example.com | 00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +peer0.org1.example.com | 00000040 3e 72 c3 c7 24 c8 e9 |>r..$..| +peer0.org1.example.com | [3b1e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 principal evaluation succeeds for identity 1 +peer0.org1.example.com | [3b1f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 gate 1602702136443053800 evaluation succeeds +peer0.org1.example.com | [3b20 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3d00 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 principal evaluation fails +peer0.org2.example.com | [3d01 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004489860 gate 1602702149655708000 evaluation fails +peer0.org2.example.com | [3d02 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d03 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d04 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d05 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 gate 1602702149658073500 evaluation starts +peer0.org2.example.com | [3d06 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d07 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3d08 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [3d09 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 principal evaluation fails +peer0.org2.example.com | [3d0a 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d46b0 gate 1602702149658073500 evaluation fails +peer0.org2.example.com | [3d0b 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d0c 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d0d 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3d0e 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d4c40 gate 1602702149659866900 evaluation starts +peer0.org2.example.com | [3d0f 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d4c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d10 10-14 19:02:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d4c40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3d11 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [3d12 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3d13 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3d14 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d4c40 principal matched by identity 0 +peer0.org2.example.com | [3d15 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f9 4e 7b f6 76 bb 24 64 b4 be ab 6e 7d f4 dc 67 |.N{.v.$d...n}..g| +peer0.org2.example.com | 00000010 e0 72 be 63 89 c2 5e 4b 62 df 14 d9 96 ee c1 bb |.r.c..^Kb.......| +peer0.org2.example.com | [3d16 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 11 79 ba 67 b8 ee be 1f e7 38 |0E.!...y.g.....8| +peer0.org2.example.com | 00000010 b7 cf c1 e8 99 8d 77 9a 5b f5 a7 af 86 dd a6 7d |......w.[......}| +peer0.org2.example.com | 00000020 dd 29 32 a6 d4 02 20 3c 57 e0 f2 81 68 8b 83 a2 |.)2... DEBU 0xc0044d4c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d18 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d4c40 gate 1602702149659866900 evaluation succeeds +peer0.org2.example.com | [3d19 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d1a 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3d1b 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d1c 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d1d 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU [1d6c5b1c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [3d1e 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU [1d6c5b1c] notifying Txid:1d6c5b1c554ef841fa6ef21ece050ed12f2693f5891c5067912112dea83f06f5, channelID: +peer0.org2.example.com | [3d1f 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [3d20 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> INFO [][1d6c5b1c] Exit chaincode: name:"qscc" (14ms) +peer0.org2.example.com | [3d21 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU [][1d6c5b1c] Exit +peer0.org2.example.com | [3d22 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53174 +peer0.org2.example.com | [3d23 10-14 19:02:29.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53174 grpc.code=OK grpc.call_duration=19.5ms +peer0.org2.example.com | [3d24 10-14 19:02:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:53174: read: connection reset by peer +peer0.org2.example.com | [3d25 10-14 19:02:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3d26 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d27 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d28 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d29 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d2a 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d2b 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d2c 10-14 19:02:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [3d2d 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3d2e 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d2f 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [3d30 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d31 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [3d32 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d33 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d34 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d35 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d36 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d37 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d38 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d39 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d3a 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161037 +peer0.org2.example.com | [3d3b 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d3c 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A3C38A1BE38C282E9303D9F7E603C64E61844283E26BE93AA9899B25B1A40F5F +peer0.org2.example.com | [3d3d 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d3e 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d3f 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d40 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d41 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3d42 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3d43 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d44 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d45 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3d46 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d47 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d48 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad3 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ad4 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad5 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ad2 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer1.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer1.org1.example.com | [3ad6 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer1.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer1.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer1.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer1.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer1.org1.example.com | [3ad7 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ad8 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3ad9 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 66 6a 22 e4 2a 3f 43 f6 12 83 30 |0D. .fj".*?C...0| +peer1.org1.example.com | 00000010 02 1a 30 4c 0a db 85 48 5b 9c 6c 8b 58 97 3c 02 |..0L...H[.l.X.<.| +peer1.org1.example.com | 00000020 b1 7d 81 a3 02 20 3d a8 6a fb 9d 08 9b 29 a9 33 |.}... =.j....).3| +peer1.org1.example.com | 00000030 93 6b de 95 e0 55 9b 3a f4 a6 d8 d4 58 64 1a ea |.k...U.:....Xd..| +peer1.org1.example.com | 00000040 b8 49 3d a8 8d bd |.I=...| +peer1.org1.example.com | [3ada 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3adb 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3adc 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3add 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ade 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3adf 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3ae0 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ae1 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ae2 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ae3 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae4 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ae5 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ae6 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ae7 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ae8 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42770 gate 1602702142541546400 evaluation starts +peer1.org1.example.com | [3ae9 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d49 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d4a 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d4b 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d4c 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d4d 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d4e 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d4f 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3d50 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3d51 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d52 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3d53 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3d54 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d55 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3d57 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d56 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3d58 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d59 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d5a 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161038 +peer0.org2.example.com | [3d5b 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5AF3DAE02DC63A783F507975D54B0A84FB847675A99137C65787A86F3A4CF8D4 +peer0.org2.example.com | [3d5c 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3d5d 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3d5e 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3d5f 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\333\\5\t\362\002 s > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d60 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d61 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d62 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d64 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\333\\5\t\362\002 s > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d65 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d63 10-14 19:02:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3d66 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d67 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d68 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d69 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d6a 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d6b 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d6c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d6d 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d6e 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3d6f 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer0.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer0.org2.example.com | [3d70 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer0.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer0.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer0.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer0.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer0.org2.example.com | [3d71 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3d72 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3d73 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d74 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3d75 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer0.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer0.org2.example.com | [3d76 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer0.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer0.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer0.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer0.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer0.org2.example.com | [3d77 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3d78 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d79 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3d7a 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b21 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3b22 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [3b23 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org1.example.com | [3b24 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 gate 1602702136444682300 evaluation starts +peer0.org1.example.com | [3b25 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [3b26 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3b27 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 principal matched by identity 0 +peer0.org1.example.com | [3b28 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +peer0.org1.example.com | 00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o| +peer0.org1.example.com | [3b29 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +peer0.org1.example.com | 00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +peer0.org1.example.com | 00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +peer0.org1.example.com | 00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +peer0.org1.example.com | 00000040 44 52 2f 24 7d 8c |DR/$}.| +peer0.org1.example.com | [3b2a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3b2b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 gate 1602702136444682300 evaluation succeeds +peer0.org1.example.com | [3b2c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3b2d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3b2e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org1.example.com | [3b2f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org1.example.com | [3b30 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3b31 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b32 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b33 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b34 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b35 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b36 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b37 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b38 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b39 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b3a 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b3b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [3b3c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [3b3d 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org1.example.com | [3b3e 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org1.example.com | [3b3f 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [3b40 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b41 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b42 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b43 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b44 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b45 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b46 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b47 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b48 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b49 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3b4a 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [3b4b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [3b4c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [3b4d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [3b4e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [3db8 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 principal matched by identity 0 +peer1.org2.example.com | [3db9 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f5 06 de e8 3f bd a0 81 2f 79 2f a3 0b 2f 18 |N....?.../y/../.| +peer1.org2.example.com | 00000010 91 ea ba 0c d9 0b 46 f7 6f ee da be 65 10 ec 0c |......F.o...e...| +peer1.org2.example.com | [3dba 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 10 f8 c9 eb 59 ae 86 e9 57 3f |0E.!......Y...W?| +peer1.org2.example.com | 00000010 a0 f7 dc 42 a0 dc e2 5c ee 2a 7b d3 fe 33 84 0f |...B...\.*{..3..| +peer1.org2.example.com | 00000020 4e d7 5b ad 97 02 20 7f 94 b5 34 8f ce 81 dc 07 |N.[... ...4.....| +peer1.org2.example.com | 00000030 3a 81 57 4f 17 a7 87 8c e3 bc 0d d4 7b 66 ab a7 |:.WO........{f..| +peer1.org2.example.com | 00000040 6d 42 1b fd 66 4a d6 |mB..fJ.| +peer1.org2.example.com | [3dbb 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3dbc 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f3d720 gate 1602702140578167800 evaluation succeeds +peer1.org2.example.com | [3dbd 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dbe 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dbf 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3dc0 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3dc1 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dc2 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3dc3 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3dc4 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3dc5 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3dc6 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc7 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc8 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dc9 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dca 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dcb 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dcc 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dcd 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dce 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dcf 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dd0 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3dd1 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dd2 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd3 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd4 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd5 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd6 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd7 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd8 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dd9 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3dda 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ddb 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3ddc 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ddd 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b4f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3b50 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [3b51 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [3b52 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3b53 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3b54 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3b55 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3b56 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3b57 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [3b58 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [3b59 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3b5a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3b5b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [3b5c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3b5d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3b5e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3b5f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3b60 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3b61 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org1.example.com | [3b62 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org1.example.com | [3b63 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3b64 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3b65 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org1.example.com | [3b66 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3b67 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3b68 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3b69 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3b6a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3b6b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [3b6c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [3b6d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3b6e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3b6f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [3b70 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [3d7b 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3d7c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d7d 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3d7e 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3d7f 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3d80 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3d81 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 gate 1602702150197093400 evaluation starts +peer0.org2.example.com | [3d82 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d83 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3d84 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3d85 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 principal evaluation fails +peer0.org2.example.com | [3d86 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453bd70 gate 1602702150197093400 evaluation fails +peer0.org2.example.com | [3d87 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d88 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d89 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3d8a 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 gate 1602702150197491100 evaluation starts +peer0.org2.example.com | [3d8b 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3d8c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3d8d 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 principal matched by identity 0 +peer0.org2.example.com | [3d8e 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org2.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer0.org2.example.com | [3d8f 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer0.org2.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer0.org2.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer0.org2.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer0.org2.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer0.org2.example.com | [3d90 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3d91 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045542e0 gate 1602702150197491100 evaluation succeeds +peer0.org2.example.com | [3d92 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d93 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d94 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d95 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3d96 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3d97 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d98 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d99 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9a 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9b 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d9c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3d9d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3d9e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer0.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer0.org2.example.com | [3d9f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer0.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer0.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer0.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer0.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer0.org2.example.com | [3da0 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3da1 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 11 be ce 07 38 2a 05 8b fa 8d |0D. s2....8*....| +peer0.org2.example.com | 00000010 bc 26 da 0b dd 2e 1b eb b8 a8 22 97 69 2b 3e db |.&........".i+>.| +peer0.org2.example.com | 00000020 5c 35 09 f2 02 20 73 3c 43 ca c1 d4 fe 64 cd fc |\5... s DEBU 0xc004a42770 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3aeb 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3aec 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42770 principal evaluation fails +peer1.org1.example.com | [3aed 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42770 gate 1602702142541546400 evaluation fails +peer1.org1.example.com | [3aee 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3aef 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3af0 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3af1 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 gate 1602702142546313300 evaluation starts +peer1.org1.example.com | [3af2 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3af3 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3af5 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 principal matched by identity 0 +peer1.org1.example.com | [3af4 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3af6 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer1.org1.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer1.org1.example.com | [3af7 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer1.org1.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer1.org1.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer1.org1.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer1.org1.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer1.org1.example.com | [3af8 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3af9 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a42ce0 gate 1602702142546313300 evaluation succeeds +peer1.org1.example.com | [3afa 10-14 19:02:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3afb 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3afc 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3afd 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3afe 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3aff 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b00 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3b01 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer1.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer1.org1.example.com | [3b02 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer1.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer1.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer1.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer1.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer1.org1.example.com | [3b03 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b04 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b05 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b06 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b07 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b08 10-14 19:02:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3b09 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b0a 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b0b 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b0c 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b0d 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3b0e 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b0f 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b10 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b11 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b12 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b13 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b14 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 gate 1602702142637290800 evaluation starts +peer1.org1.example.com | [3b15 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b16 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3b17 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3b18 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 principal evaluation fails +peer1.org1.example.com | [3b19 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7eb70 gate 1602702142637290800 evaluation fails +peer1.org1.example.com | [3b1a 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b1b 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b1c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b1d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 gate 1602702142642084500 evaluation starts +peer1.org1.example.com | [3b1e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b1f 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3b20 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 principal matched by identity 0 +peer1.org1.example.com | [3b21 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer1.org1.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer1.org1.example.com | [3b22 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer1.org1.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer1.org1.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer1.org1.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer1.org1.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer1.org1.example.com | [3b23 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b24 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a7f0e0 gate 1602702142642084500 evaluation succeeds +peer1.org1.example.com | [3b25 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b26 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b27 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b28 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b29 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b2a 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b2b 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3b2c 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer1.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer1.org1.example.com | [3b2d 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer1.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer1.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer1.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer1.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer1.org1.example.com | [3b2e 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3b71 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [3b72 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [3b73 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [3b74 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [3b75 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [3b76 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [3b77 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3b78 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [3b79 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [3b7a 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [3dde 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ddf 10-14 19:02:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de0 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de1 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3de2 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3de3 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3de4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de5 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de6 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3de7 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3de8 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3de9 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dea 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3deb 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dec 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3ded 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer1.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer1.org2.example.com | [3dee 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer1.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer1.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer1.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer1.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer1.org2.example.com | [3def 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3df0 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 9b 31 88 80 01 81 dc 4d fe 2d 91 |0D. i.1.....M.-.| +peer1.org2.example.com | 00000010 fe de a9 e4 a0 3b 73 07 10 fc 57 25 33 a4 cd 79 |.....;s...W%3..y| +peer1.org2.example.com | 00000020 a2 5f 54 94 02 20 6c c9 39 5d b6 9f 35 8f aa a0 |._T.. l.9]..5...| +peer1.org2.example.com | 00000030 28 52 ab c9 10 20 ce b0 e9 dd 88 9c 24 ff 92 58 |(R... ......$..X| +peer1.org2.example.com | 00000040 f7 57 0b aa dd 7c |.W...|| +peer1.org2.example.com | [3df1 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3df2 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [3df3 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3df4 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3df5 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3df6 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df7 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b2f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b30 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b31 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b32 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b33 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b34 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b35 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b36 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b37 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b38 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b39 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b3a 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b3b 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3b3c 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer1.org1.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer1.org1.example.com | [3b3d 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer1.org1.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer1.org1.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer1.org1.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer1.org1.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3b3f 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 56 51 c5 ec af 26 f7 c1 e3 1e c7 |0D. KVQ...&.....| +peer1.org1.example.com | 00000010 a7 ed d0 b5 dc ad 88 03 d7 56 6d 4b 29 7f 09 3a |.........VmK)..:| +peer1.org1.example.com | 00000020 bc e3 38 c0 02 20 7b ea 40 31 5f db 89 27 43 ec |..8.. {.@1_..'C.| +peer1.org1.example.com | 00000030 9d 9e 4c fe 40 e7 4c eb 31 41 f8 24 a0 98 7a f5 |..L.@.L.1A.$..z.| +peer1.org1.example.com | 00000040 9b 59 10 8a 1b f5 |.Y....| +peer1.org1.example.com | [3b40 10-14 19:02:22.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3b41 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3b42 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b43 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b44 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3b45 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b46 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b47 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b48 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3b49 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b4a 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b4b 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3b4c 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [3b4d 10-14 19:02:22.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b4e 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b4f 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b50 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b51 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b52 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b53 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b54 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [3b55 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [3b56 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3b57 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610111801 +peer1.org1.example.com | [3b58 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1EFD97F71BD151B5CF6986438359599477E3C4D2807BBDF03A400A9FA285F979 +peer1.org1.example.com | [3b59 10-14 19:02:23.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [3b5a 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b5b 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b5c 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b5d 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b5e 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3b5f 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b60 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b61 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b62 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b63 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b64 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b65 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b66 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3b67 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 80 50 8f e8 84 be f6 e7 11 0c 8b 4c 32 15 60 9f |.P.........L2.`.| +peer0.org2.example.com | 00000040 a2 69 2d 82 e5 62 |.i-..b| +peer0.org2.example.com | [3da2 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3da3 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3da4 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3da5 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3da6 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3da7 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3da8 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3da9 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3daa 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3dab 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer0.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer0.org2.example.com | [3dac 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer0.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer0.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer0.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer0.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer0.org2.example.com | [3dad 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dae 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3daf 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3db0 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3db1 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3db2 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3db3 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3db4 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3db5 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3db6 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3db7 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 gate 1602702150208563200 evaluation starts +peer0.org2.example.com | [3db8 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3db9 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3dba 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3dbb 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 principal evaluation fails +peer0.org2.example.com | [3dbc 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004584b90 gate 1602702150208563200 evaluation fails +peer0.org2.example.com | [3dbd 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3dbe 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3dbf 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3dc0 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 gate 1602702150208985900 evaluation starts +peer0.org2.example.com | [3dc1 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3dc2 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3dc3 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 principal matched by identity 0 +peer0.org2.example.com | [3dc4 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer0.org2.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer0.org2.example.com | [3dc5 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer0.org2.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer0.org2.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer0.org2.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer0.org2.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer0.org2.example.com | [3dc6 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3dc7 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004585100 gate 1602702150208985900 evaluation succeeds +peer0.org2.example.com | [3dc8 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3dc9 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3dca 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3dcb 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3dcc 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dcd 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dce 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3dcf 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dd0 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dd1 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd2 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3dd3 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer0.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer0.org2.example.com | [3dd4 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer0.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer0.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer0.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer0.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer0.org2.example.com | [3dd5 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dd6 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dd7 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd8 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dd9 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dda 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3ddb 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 f6 04 cd 9b 51 7c ab 98 b4 8f 30 cf de 0c 59 |f....Q|....0...Y| +peer0.org2.example.com | 00000010 12 b8 0b 70 40 6d f4 a8 91 74 03 01 9b 9e 64 3d |...p@m...t....d=| +peer0.org2.example.com | [3ddc 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 2e a9 99 f1 3d 4b 1e e0 1d 00 bf |0D. .....=K.....| +peer0.org2.example.com | 00000010 0d 05 9b 41 66 b0 39 ff ca 77 b5 68 03 35 b4 d6 |...Af.9..w.h.5..| +peer0.org2.example.com | 00000020 61 a3 c8 89 02 20 29 85 1a b2 ac 78 ca 20 da c5 |a.... )....x. ..| +peer0.org2.example.com | 00000030 e1 b1 a4 03 a8 be ed 44 96 ca f6 70 5c 9b 29 b8 |.......D...p\.).| +peer0.org2.example.com | 00000040 19 0f c9 e0 2f e8 |..../.| +peer0.org2.example.com | [3ddd 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dde 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3ddf 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3de0 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3de1 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3de2 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3de3 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de4 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de5 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3de6 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3de7 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3de8 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de9 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dea 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3deb 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dec 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ded 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dee 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3def 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df0 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df3 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3df4 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df5 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df1 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b7b 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3b7c 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [3b7d 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3b7e 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3b7f 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [3b80 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3b81 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org1.example.com | [3b82 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org1.example.com | [3b83 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [3b84 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [3b85 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [3b86 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [3b87 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [3b88 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [3b89 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org1.example.com | [3b8a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org1.example.com | [3b8b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org1.example.com | [3b8c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org1.example.com | [3b8d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [3b8e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [3b8f 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [3b90 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [3b91 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [3b92 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [3b93 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [3b94 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [3b95 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [3b96 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3b97 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3b98 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3b99 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [3b9a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [3b9b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [3b9c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [3b9d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [3b9e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [3b9f 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [3ba0 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3ba1 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [3ba2 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3ba3 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [3ba4 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [3ba5 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [3ba6 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3ba7 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [3ba8 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [3ba9 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [3baa 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [3bac 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [3bab 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.516Z grpc.peer_address=172.18.0.7:45926 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=204.8µs +peer0.org1.example.com | [3bad 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [3bae 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [3baf 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [3bb0 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3bb1 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3bb2 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3bb3 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3bb4 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3bb5 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [3bb6 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [3bb7 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3bb8 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3bb9 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3bba 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3bbb 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [3bbc 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [3bbd 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bbe 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3bbf 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3bc0 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3bc1 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3bc2 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3bc3 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3bc4 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3bc5 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3bc6 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3bc7 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3bc8 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3bc9 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3bca 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3bcb 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3bcc 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3bcd 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [3bce 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [3bcf 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [3bd0 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [3bd1 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [3bd2 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [3bd3 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [3bd4 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [3bd5 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [3bd6 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [3bd7 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3bd9 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3bda 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3df8 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df9 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3dfa 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfb 10-14 19:02:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfc 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dfd 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" secret_envelope: > alive: +peer1.org2.example.com | [3dfe 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dff 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e00 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3e01 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e03 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e04 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e02 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3e05 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e06 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3e07 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e08 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e09 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e0a 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0b 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e0c 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0d 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e0e 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e0f 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e10 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e11 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e12 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e13 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e14 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e15 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3df6 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3df2 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3df7 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3df8 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3df9 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dfa 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dfb 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dfc 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3dfd 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3dfe 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3dff 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e00 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e01 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e02 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e03 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e04 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e05 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e06 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e07 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3e08 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer0.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer0.org2.example.com | [3e09 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer0.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer0.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer0.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer0.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer0.org2.example.com | [3e0a 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3e0b 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 88 26 00 51 4e 9a e7 6e 03 8e 5e |0D. ).&.QN..n..^| +peer0.org2.example.com | 00000010 1a 93 3b ec f9 78 c6 13 67 a5 cf 1f df e0 79 84 |..;..x..g.....y.| +peer0.org2.example.com | 00000020 27 58 fd 8b 02 20 6f 72 ea 42 a5 a8 c4 8c be 63 |'X... or.B.....c| +peer0.org2.example.com | 00000030 8e e9 30 a1 ad 0e 26 dd 80 a4 9a cc 8b 01 77 9d |..0...&.......w.| +peer0.org2.example.com | 00000040 6e 67 9c af f0 b7 |ng....| +peer0.org2.example.com | [3e0c 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3e0d 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [3e0e 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e0f 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e10 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e11 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e12 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e13 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e14 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3e15 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e16 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e17 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3e18 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [3e19 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e1a 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e1b 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e1c 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e1d 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e1e 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e1f 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3e20 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e21 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e22 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e23 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e24 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e25 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e26 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3e27 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 gate 1602702150406020700 evaluation starts +peer0.org2.example.com | [3e28 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e29 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3e2a 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3e2b 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 principal evaluation fails +peer0.org2.example.com | [3e2c 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6670 gate 1602702150406020700 evaluation fails +peer0.org2.example.com | [3e2d 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e2e 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e2f 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e30 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 gate 1602702150409558700 evaluation starts +peer0.org2.example.com | [3e31 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e32 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3e33 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 principal matched by identity 0 +peer0.org2.example.com | [3e34 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 5b 8b 8f 4b 7d c7 23 1b 45 b9 d5 fa 10 e5 d4 |I[..K}.#.E......| +peer0.org2.example.com | 00000010 a0 18 43 73 8e 23 c3 fe 33 77 ae bf ac a7 e0 09 |..Cs.#..3w......| +peer0.org2.example.com | [3e35 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 0b d5 56 da 56 04 61 ad 3f c3 1b |0D. [..V.V.a.?..| +peer0.org2.example.com | 00000010 b4 93 09 a5 41 7a d0 22 9b 28 1f 50 77 b8 32 b3 |....Az.".(.Pw.2.| +peer0.org2.example.com | 00000020 49 7f 2b 40 02 20 6f bb 95 b1 8e c1 12 8a dc da |I.+@. o.........| +peer0.org2.example.com | 00000030 4c 1d 8a 2f 29 65 b5 8c bc 33 b4 99 04 f3 37 c7 |L../)e...3....7.| +peer0.org2.example.com | 00000040 b8 84 bd 2f 32 42 |.../2B| +peer0.org2.example.com | [3e36 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e37 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e6be0 gate 1602702150409558700 evaluation succeeds +peer0.org2.example.com | [3e38 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e39 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e3a 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e3b 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e16 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e17 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e18 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e19 10-14 19:02:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e1a 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e1b 10-14 19:02:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e1c 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3e1d 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161036 +peer1.org2.example.com | [3e1e 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C515EE9D179120B961F70ED14C52328F5EBCD35436F4DCB854B78F5D012DAACE +peer1.org2.example.com | [3e1f 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3e20 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3e21 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3e22 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e23 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e24 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e25 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e26 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e27 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e28 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e29 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:_v\203\253\251\007\001\036-\006\364\240\306l\365W\340" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e2a 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e2b 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e2c 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b68 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b69 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b6a 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b6b 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b6c 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b6e 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b6f 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 gate 1602702145120048200 evaluation starts +peer1.org1.example.com | [3b70 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b71 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3b72 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3b6d 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b73 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 principal evaluation fails +peer1.org1.example.com | [3b74 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc1c0 gate 1602702145120048200 evaluation fails +peer1.org1.example.com | [3b75 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b76 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b77 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b78 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 gate 1602702145124306200 evaluation starts +peer1.org1.example.com | [3b79 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b7a 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3b7b 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 principal matched by identity 0 +peer1.org1.example.com | [3b7c 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 5a 98 07 dc 3c 51 32 38 4e db d4 e0 9e a7 30 |.Z... DEBU Verify: sig = 00000000 30 44 02 20 31 3e d3 01 ba 14 e4 29 70 1c 6f 51 |0D. 1>.....)p.oQ| +peer1.org1.example.com | 00000010 27 f0 ce 5a 9d 40 9f c4 4a a6 14 dc a9 c2 10 e2 |'..Z.@..J.......| +peer1.org1.example.com | 00000020 67 5f 14 73 02 20 4b 8a b0 ae c5 ac 89 7e 50 91 |g_.s. K......~P.| +peer1.org1.example.com | 00000030 ff 85 a0 5a 65 12 96 c6 10 99 48 59 f4 49 f7 c4 |...Ze.....HY.I..| +peer1.org1.example.com | 00000040 42 69 25 01 0a e8 |Bi%...| +peer1.org1.example.com | [3b7e 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b7f 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004adc750 gate 1602702145124306200 evaluation succeeds +peer1.org1.example.com | [3b80 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b81 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b82 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b83 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b84 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b85 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3b86 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b87 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b88 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3b89 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b8a 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b8b 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b8c 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b8e 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b8d 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b8f 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b90 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b91 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b92 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b93 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b94 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b95 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3b96 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b97 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b98 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3b99 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b9a 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9b 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b9c 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9d 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b9e 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9f 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ba0 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba1 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ba2 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba3 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ba4 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3ba5 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba6 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ba7 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ba8 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ba9 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3baa 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3bab 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3bdb 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3bdc 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org1.example.com | [3bdd 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [3bde 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [3bdf 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [3bd8 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3be0 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [3e3c 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e3e 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3e3f 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e3d 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e40 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e41 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e42 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e43 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e44 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e45 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e46 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e47 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e48 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e49 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4a 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4b 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4c 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4d 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4e 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e4f 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e50 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e51 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e52 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3e53 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e54 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e55 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e56 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e57 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e58 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e59 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e5a 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e5b 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e5c 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e5d 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e5e 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e5f 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e60 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e61 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e62 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e63 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e64 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e65 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3e66 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e67 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e68 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e69 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e6a 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e6b 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3e6c 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e6d 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e6e 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e6f 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e70 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e71 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e72 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3e73 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 gate 1602702150538555200 evaluation starts +peer0.org2.example.com | [3e74 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e75 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3e76 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3e77 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 principal evaluation fails +peer0.org2.example.com | [3e78 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d1c0 gate 1602702150538555200 evaluation fails +peer0.org2.example.com | [3e79 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e7a 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3e7b 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e7c 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 gate 1602702150543303300 evaluation starts +peer0.org2.example.com | [3e7d 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e7e 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3e7f 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 principal matched by identity 0 +peer0.org2.example.com | [3e80 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer0.org2.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer0.org2.example.com | [3e81 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer0.org2.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer0.org2.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer0.org2.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer0.org2.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer0.org2.example.com | [3e82 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e83 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460d730 gate 1602702150543303300 evaluation succeeds +peer0.org2.example.com | [3e84 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e85 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e86 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e87 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e88 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e89 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3e8a 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e8b 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e8c 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e8d 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e8e 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e8f 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e90 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3e91 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e92 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e93 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e94 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3be1 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [3be2 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [3be3 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3be4 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3be5 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [3be7 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [3be8 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [3be6 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45926 +peer0.org1.example.com | [3be9 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [3bea 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [3beb 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [3bec 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [3bed 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [3bee 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [3bef 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [3bf0 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org1.example.com | [3bf1 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [3bf2 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [3bf3 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [3bf4 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bf5 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bf6 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bf7 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bf8 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bf9 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 gate 1602702136577054800 evaluation starts +peer0.org1.example.com | [3bfa 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45926 +peer0.org1.example.com | [3bfb 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bfc 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bfd 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3bfe 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3bff 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 principal evaluation fails +peer0.org1.example.com | [3c00 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c01 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 gate 1602702136577054800 evaluation fails +peer0.org1.example.com | [3c02 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c03 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c04 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c05 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3c06 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c07 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 gate 1602702136577325500 evaluation starts +peer0.org1.example.com | [3c08 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c09 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c0a 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3c0b 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 principal matched by identity 0 +peer0.org1.example.com | [3c0c 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c0d 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c0e 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c0f 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c10 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c11 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3e95 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive: +peer0.org2.example.com | [3e96 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e97 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e98 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e99 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e9a 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3e9b 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e9c 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e9d 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e9e 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e9f 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ea0 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea1 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ea2 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ea3 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ea4 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ea5 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3ea6 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ea7 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ea8 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ea9 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eaa 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3eab 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3eac 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ead 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 gate 1602702150579329500 evaluation starts +peer0.org2.example.com | [3eae 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3eaf 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3eb0 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3eb1 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 principal evaluation fails +peer0.org2.example.com | [3eb2 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046336d0 gate 1602702150579329500 evaluation fails +peer0.org2.example.com | [3eb3 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3eb4 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3eb5 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3eb6 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 gate 1602702150583565900 evaluation starts +peer0.org2.example.com | [3eb7 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3eb8 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3eb9 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 principal matched by identity 0 +peer0.org2.example.com | [3eba 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 cf 2a 01 0e 0f d6 15 b7 9e 3a 62 3b d8 83 dd |..*.......:b;...| +peer0.org2.example.com | 00000010 be c7 b9 d0 13 9c f4 1c 02 da f4 ec 7d 5a 41 87 |............}ZA.| +peer0.org2.example.com | [3ebb 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 3b 0a bb 97 75 26 c1 e2 b5 df 80 |0D. M;...u&.....| +peer0.org2.example.com | 00000010 3c e4 ec 89 09 5a a0 a0 49 21 7d b3 ef 84 e6 cc |<....Z..I!}.....| +peer0.org2.example.com | 00000020 07 b1 d8 de 02 20 2d 29 ab d0 09 e2 a3 e5 fd dd |..... -)........| +peer0.org2.example.com | 00000030 e2 ec d0 9b 94 53 87 e8 c8 3b e3 2d 17 ab 5b 0f |.....S...;.-..[.| +peer0.org2.example.com | 00000040 2a 25 c6 d3 1c a2 |*%....| +peer0.org2.example.com | [3ebc 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ebd 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004633c40 gate 1602702150583565900 evaluation succeeds +peer0.org2.example.com | [3ebe 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ebf 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ec0 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ec1 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ec2 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec3 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ec4 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec5 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ec7 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3ec9 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3eca 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3ec6 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec8 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ecb 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3bac 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 gate 1602702145237120400 evaluation starts +peer1.org1.example.com | [3bad 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bae 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3baf 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3bb0 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 principal evaluation fails +peer1.org1.example.com | [3bb1 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a99f90 gate 1602702145237120400 evaluation fails +peer1.org1.example.com | [3bb2 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3bb3 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3bb4 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3bb5 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 gate 1602702145238997100 evaluation starts +peer1.org1.example.com | [3bb6 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bb7 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3bb8 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 principal matched by identity 0 +peer1.org1.example.com | [3bb9 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 48 82 5a 01 18 1d 54 84 c1 05 96 cf e2 1c 74 |.H.Z...T.......t| +peer1.org1.example.com | 00000010 10 51 01 59 ca ee 6b f5 6a 1e 98 f6 51 fd 6c 42 |.Q.Y..k.j...Q.lB| +peer1.org1.example.com | [3bba 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 2d 9e b8 8b fd cf 63 62 c1 |0E.!...-.....cb.| +peer1.org1.example.com | 00000010 23 da 96 9a 1e 72 d3 95 fb 60 78 04 6a 04 fe f6 |#....r...`x.j...| +peer1.org1.example.com | 00000020 3b 49 5c 50 2e 02 20 10 38 7f 7b bc 9e cb fd 4e |;I\P.. .8.{....N| +peer1.org1.example.com | 00000030 f6 57 fc db a3 43 39 d3 77 49 a8 4f f5 49 d5 64 |.W...C9.wI.O.I.d| +peer1.org1.example.com | 00000040 d4 8b 5e a4 3f e2 ff |..^.?..| +peer1.org1.example.com | [3bbb 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3bbc 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b16500 gate 1602702145238997100 evaluation succeeds +peer1.org1.example.com | [3bbd 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bbe 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3bbf 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3bc0 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3bc1 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bc2 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3bc3 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3bc4 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3bc5 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3bc6 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc7 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc8 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc9 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bca 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcb 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bcc 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcd 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bce 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bcf 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd0 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd1 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd2 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd3 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd4 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bd5 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bd6 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bd7 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bd8 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bd9 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bda 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdb 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bdc 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdd 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bde 10-14 19:02:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdf 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3be0 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103E +peer1.org1.example.com | [3be1 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6215A2C303133D4DFB4D830D01E1CEFC48251D1CF929F4086E0591DF4A109972 +peer1.org1.example.com | [3be2 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3be3 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3be4 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3be5 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3be6 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be7 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be8 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be9 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bea 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3beb 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bec 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bed 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bee 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bef 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bf0 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf1 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bf2 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf3 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bf4 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf5 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bf6 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3bf7 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 15 a2 c3 03 13 3d 4d fb 4d 83 0d 01 e1 ce fc |b.....=M.M......| +peer1.org1.example.com | 00000010 48 25 1d 1c f9 29 f4 08 6e 05 91 df 4a 10 99 72 |H%...)..n...J..r| +peer1.org1.example.com | [3bf8 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 af 8e 67 61 c6 0a 88 43 e4 f0 |0E.!....ga...C..| +peer1.org1.example.com | 00000010 2b 5a 46 76 77 73 50 8b 0e 20 92 15 15 b0 36 cb |+ZFvwsP.. ....6.| +peer1.org1.example.com | 00000020 48 24 95 27 34 02 20 7f 96 c3 29 6a d7 13 fd 48 |H$.'4. ...)j...H| +peer1.org1.example.com | 00000030 df 5d c5 11 9d 48 5f 9e fd cb ee b3 b5 60 0a 4c |.]...H_......`.L| +peer1.org1.example.com | 00000040 25 bd a8 01 2e e7 ea |%......| +peer0.org1.example.com | [3c12 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3c13 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3c14 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c15 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 gate 1602702136577325500 evaluation succeeds +peer0.org1.example.com | [3c16 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c17 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3c18 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c19 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c1a 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c1b 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c1c 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c1d 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c1e 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c1f 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c20 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 gate 1602702136585093400 evaluation starts +peer0.org1.example.com | [3c21 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c22 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3c23 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 principal matched by identity 0 +peer0.org1.example.com | [3c24 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3c25 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 gate 1602702136577639000 evaluation starts +peer0.org1.example.com | [3c26 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c27 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3c28 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 principal matched by identity 0 +peer0.org1.example.com | [3c29 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3c2a 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d4 e6 d6 f1 cb ff 31 43 35 80 4c |0D. w......1C5.L| +peer0.org1.example.com | 00000010 c2 25 bc 5f 05 bb b9 04 3e 13 d4 78 51 03 70 65 |.%._....>..xQ.pe| +peer0.org1.example.com | 00000020 4f 16 68 27 02 20 0c 80 e8 10 bc 31 3d 8f cf 38 |O.h'. .....1=..8| +peer0.org1.example.com | 00000030 4a 2a 61 b2 4c 19 76 5b 8b b0 9d d1 0e b2 90 bb |J*a.L.v[........| +peer0.org1.example.com | 00000040 02 0f 14 7a fb 78 |...z.x| +peer0.org1.example.com | [3c2b 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c2c 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 gate 1602702136577639000 evaluation succeeds +peer0.org1.example.com | [3c2d 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c2e 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c2f 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c32 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c33 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45926 +peer0.org1.example.com | [3c30 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.587Z grpc.peer_address=172.18.0.6:48868 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=102.3µs +peer0.org1.example.com | [3c31 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3c34 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45926 +peer0.org1.example.com | [3c35 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c36 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 gate 1602702136585093400 evaluation succeeds +peer0.org1.example.com | [3c37 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3c38 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c39 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer1.org1.example.com | [3bf9 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bfa 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bfb 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bfc 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bfd 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bfe 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3bff 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 47 c8 4b d9 30 6a 57 88 af 25 ab c7 2a f5 78 | G.K.0jW..%..*.x| +peer1.org1.example.com | 00000010 39 e6 08 05 be 6a 36 da e7 ea 88 e0 c5 62 59 65 |9....j6......bYe| +peer1.org1.example.com | [3c00 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 87 ce e4 cf ff 2d d5 91 73 46 |0E.!.......-..sF| +peer1.org1.example.com | 00000010 53 92 74 eb 6e 2b 7f 02 ea a7 9b 09 4a 21 c0 8a |S.t.n+......J!..| +peer1.org1.example.com | 00000020 ff b0 99 a2 30 02 20 6c 54 16 94 4e 60 54 03 7a |....0. lT..N`T.z| +peer1.org1.example.com | 00000030 c0 70 c9 29 60 bc fd cd 27 de 2d 62 a0 93 86 4e |.p.)`...'.-b...N| +peer1.org1.example.com | 00000040 59 61 1f 7c 24 53 f9 |Ya.|$S.| +peer1.org1.example.com | [3c01 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c02 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3c03 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3c04 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c05 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3c06 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c07 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c08 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c09 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0a 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0b 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0c 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3c0d 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c0e 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3c0f 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c10 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c11 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c12 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c13 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c14 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c15 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c16 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c17 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c18 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e2d 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e2e 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e2f 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e30 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3e31 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer1.org2.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer1.org2.example.com | [3e32 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer1.org2.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer1.org2.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer1.org2.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer1.org2.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer1.org2.example.com | [3e33 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e34 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e35 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e36 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3e37 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer1.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer1.org2.example.com | [3e38 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer1.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer1.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer1.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer1.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer1.org2.example.com | [3e39 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e3a 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3b 10-14 19:02:22.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3c 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e3d 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e3e 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e3f 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3e40 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer1.org2.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer1.org2.example.com | [3e41 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer1.org2.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer1.org2.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer1.org2.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer1.org2.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer1.org2.example.com | [3e42 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3e43 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 c3 01 14 54 73 c1 39 d0 8e bf |0E.!.....Ts.9...| +peer1.org2.example.com | 00000010 1b 73 75 05 01 b6 0d 22 6c 49 4a c3 01 74 ce f7 |.su...."lIJ..t..| +peer1.org2.example.com | 00000020 6f bb d0 0a c5 02 20 20 c4 20 c8 b5 03 f0 22 27 |o..... . ...."'| +peer1.org2.example.com | 00000030 00 78 db cc d9 3e 5f 76 83 ab a9 07 01 1e 2d 06 |.x...>_v......-.| +peer1.org2.example.com | 00000040 f4 a0 c6 6c f5 57 e0 |...l.W.| +peer1.org2.example.com | [3e44 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3e45 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3e46 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e47 10-14 19:02:22.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e48 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e49 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e4a 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e4b 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e4c 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3e4d 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer1.org2.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer1.org2.example.com | [3e4e 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer1.org2.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer1.org2.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer1.org2.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer1.org2.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer1.org2.example.com | [3e4f 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e50 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e51 10-14 19:02:22.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3ecc 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ecd 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ece 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ed0 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ed1 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ecf 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ed2 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ed3 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ed4 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ed5 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ed6 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 gate 1602702150621348600 evaluation starts +peer0.org2.example.com | [3ed7 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ed8 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3ed9 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3eda 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 principal evaluation fails +peer0.org2.example.com | [3edb 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613710 gate 1602702150621348600 evaluation fails +peer0.org2.example.com | [3edc 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3edd 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ede 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3edf 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 gate 1602702150623542700 evaluation starts +peer0.org2.example.com | [3ee0 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ee1 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3ee2 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 principal matched by identity 0 +peer0.org2.example.com | [3ee3 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3ee4 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3ee5 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3ee6 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004613c80 gate 1602702150623542700 evaluation succeeds +peer0.org2.example.com | [3ee7 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ee8 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3ee9 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3eea 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3eeb 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eec 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eef 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c3a 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3c3b 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3c3c 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3c3d 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:48868 +peer0.org1.example.com | [3c3e 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c3f 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c40 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c41 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c42 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c43 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c44 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c45 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c46 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c47 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c48 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 gate 1602702136615666300 evaluation starts +peer0.org1.example.com | [3c49 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c4a 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3c4b 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 principal matched by identity 0 +peer0.org1.example.com | [3c4c 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3c4d 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3c4e 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c4f 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 gate 1602702136615666300 evaluation succeeds +peer0.org1.example.com | [3c50 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c51 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c52 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c53 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c54 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [3c55 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [3c56 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [3c57 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [3c58 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [3c59 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [3c5a 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c5b 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [3c5c 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.614Z grpc.peer_address=172.18.0.8:52342 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.1µs +peer0.org1.example.com | [3c5d 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A\nn80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2\nz+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E\nAwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48868 +peer0.org1.example.com | [3c5e 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c5f 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c60 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c61 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c62 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c63 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c64 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c19 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3c1a 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c1b 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c1c 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c1d 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c1e 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c1f 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c20 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c21 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3c22 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c23 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c24 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c25 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c26 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c27 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c28 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c29 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c2a 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c2b 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3c2c 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c2d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c2e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c2f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3c30 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c31 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c32 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c33 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c34 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c35 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c36 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c37 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 gate 1602702146173590000 evaluation starts +peer1.org1.example.com | [3c38 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c39 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c3a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c3b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 principal evaluation fails +peer1.org1.example.com | [3c3c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b940a0 gate 1602702146173590000 evaluation fails +peer1.org1.example.com | [3c3d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c3e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c3f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c40 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 gate 1602702146173999700 evaluation starts +peer1.org1.example.com | [3c41 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c42 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c43 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 principal matched by identity 0 +peer1.org1.example.com | [3c44 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer1.org1.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer1.org1.example.com | [3c45 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer1.org1.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer1.org1.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org1.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer1.org1.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer1.org1.example.com | [3c46 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c47 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b94610 gate 1602702146173999700 evaluation succeeds +peer1.org1.example.com | [3c48 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c49 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c4a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c4b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c4c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3c4d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3c4e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3c4f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c50 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3c51 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c52 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c53 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c54 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3c55 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c56 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c57 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c58 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3c59 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ef0 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ef1 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ef2 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eed 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eee 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ef3 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ef4 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ef5 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef6 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ef8 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ef7 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ef9 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3efa 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3efb 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3efc 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3efd 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3efe 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eff 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3f00 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f01 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f02 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f03 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f04 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 gate 1602702150646369300 evaluation starts +peer0.org2.example.com | [3f05 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f06 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f07 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f08 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 principal evaluation fails +peer0.org2.example.com | [3f09 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f000 gate 1602702150646369300 evaluation fails +peer0.org2.example.com | [3f0a 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f0b 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f0c 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f0d 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 gate 1602702150660922800 evaluation starts +peer0.org2.example.com | [3f0e 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f0f 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f10 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 principal matched by identity 0 +peer0.org2.example.com | [3f11 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3f12 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3f13 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f14 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467f640 gate 1602702150660922800 evaluation succeeds +peer0.org2.example.com | [3f15 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f16 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f17 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e52 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer1.org2.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer1.org2.example.com | [3e53 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer1.org2.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer1.org2.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer1.org2.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer1.org2.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer1.org2.example.com | [3e54 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e55 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e56 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e57 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e58 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e59 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e5a 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e5b 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5c 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5d 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5e 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e5f 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e60 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e61 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3e62 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e63 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e64 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e65 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e66 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e67 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3e68 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e69 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e6a 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e6b 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e6c 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e6d 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e6e 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3e6f 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 gate 1602702142525607600 evaluation starts +peer1.org2.example.com | [3e70 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e71 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3e72 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3e73 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 principal evaluation fails +peer1.org2.example.com | [3e74 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe91c0 gate 1602702142525607600 evaluation fails +peer1.org2.example.com | [3e75 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e76 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3e77 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e78 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 gate 1602702142526966200 evaluation starts +peer1.org2.example.com | [3e79 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e7a 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3e7b 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e7c 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 principal evaluation fails +peer1.org2.example.com | [3e7d 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9730 gate 1602702142526966200 evaluation fails +peer1.org2.example.com | [3e7e 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e7f 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e80 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e81 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 gate 1602702142527910800 evaluation starts +peer1.org2.example.com | [3e82 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e83 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3e84 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 principal matched by identity 0 +peer1.org2.example.com | [3e85 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer1.org2.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer1.org2.example.com | [3e86 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer1.org2.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer1.org2.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer1.org2.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer1.org2.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer1.org2.example.com | [3e87 10-14 19:02:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e88 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe9ca0 gate 1602702142527910800 evaluation succeeds +peer1.org2.example.com | [3e89 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e8a 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e8b 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e8c 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e8d 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e8e 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3e8f 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3e90 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3e91 10-14 19:02:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3e92 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e93 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e94 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e95 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3e96 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e97 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e98 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c5a 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > +peer1.org1.example.com | [3c5b 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c5c 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c5d 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c5e 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c5f 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3c60 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c61 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c62 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c63 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c64 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c65 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3c66 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3c67 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3c68 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3c69 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c6a 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c6b 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c6c 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c6d 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c6e 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c6f 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c70 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c71 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 gate 1602702146225550200 evaluation starts +peer1.org1.example.com | [3c72 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c73 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c74 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c75 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 principal evaluation fails +peer1.org1.example.com | [3c76 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc6f00 gate 1602702146225550200 evaluation fails +peer1.org1.example.com | [3c77 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c78 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c79 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c7a 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 gate 1602702146225959100 evaluation starts +peer1.org1.example.com | [3c7b 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c7c 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c7d 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 principal matched by identity 0 +peer1.org1.example.com | [3c7e 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3c7f 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3c80 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c81 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc7470 gate 1602702146225959100 evaluation succeeds +peer1.org1.example.com | [3c82 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c83 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c84 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c85 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c86 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c87 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c88 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c89 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c8a 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c8b 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c8c 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c8d 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c8e 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c8f 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c90 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 gate 1602702146239463700 evaluation starts +peer1.org1.example.com | [3c91 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c92 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c93 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c94 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 principal evaluation fails +peer1.org1.example.com | [3c95 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea0e0 gate 1602702146239463700 evaluation fails +peer1.org1.example.com | [3c96 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c97 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c98 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c99 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 gate 1602702146245640500 evaluation starts +peer1.org1.example.com | [3c9a 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c9b 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3c9c 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 principal matched by identity 0 +peer1.org1.example.com | [3c9d 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3c9e 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3c9f 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ca0 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bea650 gate 1602702146245640500 evaluation succeeds +peer1.org1.example.com | [3ca1 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ca2 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ca3 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ca4 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ca5 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ca6 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ca7 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ca8 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3ca9 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3caa 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3cab 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | [3c65 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c66 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c67 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c68 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c69 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 gate 1602702136631255000 evaluation starts +peer0.org1.example.com | [3c6a 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c6e 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3c6f 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 principal matched by identity 0 +peer0.org1.example.com | [3c70 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [3c71 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d5 61 69 b0 c4 3d b0 b0 53 51 14 |0D. x.ai..=..SQ.| +peer0.org1.example.com | 00000010 8e 7f bb 91 59 b3 e7 43 7f 59 38 bc 53 81 38 f4 |....Y..C.Y8.S.8.| +peer0.org1.example.com | 00000020 bb b7 19 49 02 20 08 02 fb 63 30 14 af b9 24 00 |...I. ...c0...$.| +peer0.org1.example.com | 00000030 94 9e 4d 3b b6 5a 91 5e 8d 16 25 7d 3d 89 43 d1 |..M;.Z.^..%}=.C.| +peer0.org1.example.com | 00000040 16 40 68 52 b3 7e |.@hR.~| +peer0.org1.example.com | [3c72 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c73 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 gate 1602702136631255000 evaluation succeeds +peer0.org1.example.com | [3c74 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c75 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c76 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c77 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c78 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48868 +peer0.org1.example.com | [3c79 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48868 +peer0.org1.example.com | [3c6b 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3c7a 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3c7b 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3c7c 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52342 +peer0.org1.example.com | [3c7d 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52342 +peer0.org1.example.com | [3c7e 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3c7f 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3c80 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [3c81 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e fa e5 ea b4 ff aa c9 5a a2 dc |0E.!.........Z..| +peer0.org1.example.com | 00000010 65 f0 cf 19 a1 d8 3c ff 6d ff f1 ca e0 2c cc 7a |e.....<.m....,.z| +peer0.org1.example.com | 00000020 2d c6 ee 9b d1 02 20 6c 93 1d 6c af 42 33 9f 76 |-..... l..l.B3.v| +peer0.org1.example.com | 00000030 81 2f a5 3a 73 88 1e d5 91 f6 83 c6 c3 2c 57 ec |./.:s........,W.| +peer0.org1.example.com | 00000040 dd bd 75 0f 29 1b e7 |..u.)..| +peer0.org1.example.com | [3c82 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52342 +peer0.org2.example.com | [3f18 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f19 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3f1a 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3f1b 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3f1c 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3f1d 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f1e 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f1f 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f20 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f21 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f22 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f23 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f24 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f25 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f26 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3f27 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f28 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f29 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3f2a 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f2b 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f2c 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f2d 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f2e 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f2f 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f30 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 gate 1602702150710741200 evaluation starts +peer0.org2.example.com | [3f31 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f32 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f33 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f34 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 principal evaluation fails +peer0.org2.example.com | [3f35 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7870 gate 1602702150710741200 evaluation fails +peer0.org2.example.com | [3f36 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f37 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f38 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e99 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e9a 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > alive: +peer1.org2.example.com | [3e9b 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e9c 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e9d 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e9e 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e9f 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea0 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ea1 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ea2 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ea3 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea4 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea5 10-14 19:02:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea6 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea7 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea8 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea9 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3eaa 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eab 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eac 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ead 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3cac 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cad 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c83 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52342 +peer0.org1.example.com | [3c84 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3c85 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [3c8a 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3c8c 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004adbda0, CONNECTING +peer0.org1.example.com | [3c8d 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52186 disconnected +peer0.org1.example.com | [3c8e 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:52186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m7.9592484s +peer0.org1.example.com | [3c8f 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3c8b 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [3c86 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [3c87 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45926 disconnected +peer0.org1.example.com | [3c90 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.527Z grpc.peer_address=172.18.0.7:45926 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=141.3622ms +peer0.org1.example.com | [3c91 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3c92 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52342 disconnected +peer0.org1.example.com | [3c93 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.641Z grpc.peer_address=172.18.0.8:52342 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=32.0552ms +peer0.org1.example.com | [3c94 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [3c6c 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c89 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c6d 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org1.example.com | [3c95 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3c88 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c96 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c97 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3c98 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c99 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f39 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 gate 1602702150711086100 evaluation starts +peer0.org2.example.com | [3f3a 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f3b 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f3c 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 principal matched by identity 0 +peer0.org2.example.com | [3f3d 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3f3e 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3f3f 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f40 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7de0 gate 1602702150711086100 evaluation succeeds +peer0.org2.example.com | [3f41 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f42 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f43 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f44 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f45 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f46 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f47 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f48 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f49 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f4a 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f4b 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f4c 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f4d 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f4e 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 gate 1602702150730526300 evaluation starts +peer0.org2.example.com | [3f4f 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f50 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f51 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f52 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 principal evaluation fails +peer0.org2.example.com | [3f53 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ccfe0 gate 1602702150730526300 evaluation fails +peer0.org2.example.com | [3f54 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f55 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f56 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f57 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 gate 1602702150730995900 evaluation starts +peer0.org2.example.com | [3f58 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f59 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f5b 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 principal matched by identity 0 +peer1.org2.example.com | [3eae 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3eaf 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eb0 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3eb1 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eb2 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eb3 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3eb4 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3eb5 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3eb6 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 gate 1602702142623212600 evaluation starts +peer1.org2.example.com | [3eb7 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3eb8 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3eb9 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3eba 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 principal evaluation fails +peer1.org2.example.com | [3ebb 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013720 gate 1602702142623212600 evaluation fails +peer1.org2.example.com | [3ebc 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ebd 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ebe 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3ebf 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 gate 1602702142623591800 evaluation starts +peer1.org2.example.com | [3ec0 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ec1 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ec2 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3ec3 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 principal evaluation fails +peer1.org2.example.com | [3ec4 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004013c90 gate 1602702142623591800 evaluation fails +peer1.org2.example.com | [3ec5 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ec6 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ec7 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ec8 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a200 gate 1602702142623997600 evaluation starts +peer1.org2.example.com | [3ec9 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a200 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3eca 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a200 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3ecb 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a200 principal matched by identity 0 +peer1.org2.example.com | [3ecc 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer1.org2.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer1.org2.example.com | [3ecd 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer1.org2.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer1.org2.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer1.org2.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer1.org2.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU 0xc00404a200 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ecf 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a200 gate 1602702142623997600 evaluation succeeds +peer1.org2.example.com | [3ed0 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cae 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3caf 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cb0 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cb1 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cb2 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cb3 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cb4 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 gate 1602702146248815600 evaluation starts +peer1.org1.example.com | [3cb5 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cb6 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3cb7 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3cb8 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 principal evaluation fails +peer1.org1.example.com | [3cb9 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a880 gate 1602702146248815600 evaluation fails +peer1.org1.example.com | [3cba 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cbb 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cbc 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cbd 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 gate 1602702146249281100 evaluation starts +peer1.org1.example.com | [3cbe 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cbf 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3cc0 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 principal matched by identity 0 +peer1.org1.example.com | [3cc1 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3cc2 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3cc3 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cc4 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0adf0 gate 1602702146249281100 evaluation succeeds +peer1.org1.example.com | [3cc5 10-14 19:02:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cc6 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cc7 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3cc8 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cc9 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cca 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ccb 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ccc 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ccd 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cce 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ccf 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f5a 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f5c 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [3f5d 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [3f5e 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f5f 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cd550 gate 1602702150730995900 evaluation succeeds +peer0.org2.example.com | [3f60 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f61 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f62 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f63 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f64 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3f65 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3f66 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3f67 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3f68 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f69 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f6a 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f6b 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6c 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6d 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6e 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f6f 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f70 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f71 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3f72 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f73 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f74 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f75 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f76 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c9a 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c9b 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [3c9c 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [3c9d 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48868 disconnected +peer0.org1.example.com | [3c9e 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.605Z grpc.peer_address=172.18.0.6:48868 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=87.5522ms +peer0.org1.example.com | [3c9f 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3ca0 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004adbda0, READY +peer0.org1.example.com | [3ca1 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3ca2 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [3ca3 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [3ca4 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org1.example.com | [3ca5 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [3ca6 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [3ca7 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [3ca8 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00463d100 env 0xc004731ae0 txn 0 +peer0.org1.example.com | [3ca9 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [3caa 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 290ms +peer0.org1.example.com | [3cab 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [3cac 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [3cad 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.714Z grpc.peer_address=172.18.0.7:45938 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.1664ms +peer0.org1.example.com | [3cae 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [3caf 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org1.example.com | [3cb1 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [3cb0 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3cb2 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [3cb4 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [3cb5 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org1.example.com | [3cb6 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3cb7 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [3cb8 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [3cb9 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [3cb3 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3cba 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3cbc 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [3cbd 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [3cbb 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3cbe 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer0.org2.example.com | [3f77 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3f78 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ed1 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ed2 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ed3 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ed4 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ed5 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3ed6 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3ed7 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3ed8 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3ed9 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eda 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3edb 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3edc 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3edd 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ede 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3edf 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee0 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3ee1 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" > alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: +peer1.org2.example.com | [3ee2 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ee3 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ee4 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ee5 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ee6 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3ee7 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ee8 10-14 19:02:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee9 10-14 19:02:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eea 10-14 19:02:22.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3eeb 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eee 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eec 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3eef 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eed 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ef0 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cd0 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cd1 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 gate 1602702146253086300 evaluation starts +peer1.org1.example.com | [3cd2 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cd3 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3cd4 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3cd5 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 principal evaluation fails +peer1.org1.example.com | [3cd6 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0bff0 gate 1602702146253086300 evaluation fails +peer1.org1.example.com | [3cd7 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cd8 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cd9 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cda 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 gate 1602702146254684200 evaluation starts +peer1.org1.example.com | [3cdb 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cdc 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3cdd 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 principal matched by identity 0 +peer1.org1.example.com | [3cde 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3cdf 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3ce0 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ce1 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c2a560 gate 1602702146254684200 evaluation succeeds +peer1.org1.example.com | [3ce2 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ce3 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ce4 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ce5 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ce6 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ce7 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ce8 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ce9 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cea 10-14 19:02:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ceb 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cec 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ced 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cee 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cef 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3cf0 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cf1 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cf2 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cf3 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3cf4 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3cf5 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3cf6 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3cf7 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cf8 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ef1 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ef2 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ef3 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ef5 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ef6 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ef7 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ef4 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ef8 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ef9 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3efa 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3efb 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 gate 1602702142891887100 evaluation starts +peer1.org2.example.com | [3efc 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3efd 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3efe 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3eff 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 principal evaluation fails +peer1.org2.example.com | [3f00 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082150 gate 1602702142891887100 evaluation fails +peer1.org2.example.com | [3f01 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f02 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f03 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f04 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 gate 1602702142894158700 evaluation starts +peer1.org2.example.com | [3f05 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f06 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f07 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f08 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 principal evaluation fails +peer1.org2.example.com | [3f09 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040826c0 gate 1602702142894158700 evaluation fails +peer1.org2.example.com | [3f0a 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f0b 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f0c 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f0d 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 gate 1602702142896074600 evaluation starts +peer1.org2.example.com | [3f0e 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f0f 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f10 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 principal matched by identity 0 +peer1.org2.example.com | [3f11 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3f12 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | [3f79 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f7a 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f7b 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f7c 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f7d 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f7e 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f7f 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 gate 1602702150755740400 evaluation starts +peer0.org2.example.com | [3f80 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f81 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f82 10-14 19:02:30.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f83 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 principal evaluation fails +peer0.org2.example.com | [3f84 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046edff0 gate 1602702150755740400 evaluation fails +peer0.org2.example.com | [3f85 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f86 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f87 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f88 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 gate 1602702150767154400 evaluation starts +peer0.org2.example.com | [3f89 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f8a 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f8b 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 principal matched by identity 0 +peer0.org2.example.com | [3f8c 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer0.org2.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer0.org2.example.com | [3f8d 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer0.org2.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer0.org2.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer0.org2.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer0.org2.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer0.org2.example.com | [3f8e 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f8f 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470e560 gate 1602702150767154400 evaluation succeeds +peer0.org2.example.com | [3f90 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f91 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f92 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f93 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f94 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f95 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3f96 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3f97 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3f98 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3f99 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9a 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9b 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cf9 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3cfa 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cfb 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cfc 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cfd 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3cfe 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cff 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 gate 1602702146273567100 evaluation starts +peer1.org1.example.com | [3d00 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d01 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3d02 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d03 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 principal evaluation fails +peer1.org1.example.com | [3d04 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c44ee0 gate 1602702146273567100 evaluation fails +peer1.org1.example.com | [3d05 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d06 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d07 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d08 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 gate 1602702146274173400 evaluation starts +peer1.org1.example.com | [3d09 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d0a 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3d0b 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 principal matched by identity 0 +peer1.org1.example.com | [3d0c 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3d0d 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3d0e 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d0f 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c45450 gate 1602702146274173400 evaluation succeeds +peer1.org1.example.com | [3d10 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d11 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d12 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d13 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d14 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d15 10-14 19:02:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cbf 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [3cc0 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3cc1 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [3cc2 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [3cc3 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004c345c0)} +peer0.org1.example.com | [3cc4 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [3cc5 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [3cc6 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [3cc7 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org1.example.com | [3cc8 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org1.example.com | [3cc9 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org1.example.com | [3cca 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer0.org1.example.com | [3ccb 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +peer0.org1.example.com | txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +peer0.org1.example.com | ] +peer0.org1.example.com | [3ccc 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to txid-index +peer0.org1.example.com | [3ccd 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx number:[0] ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to blockNumTranNum index +peer0.org1.example.com | [3cce 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ccf 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3cd0 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3cd1 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45938 +peer0.org1.example.com | [3cd2 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138781], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org1.example.com | [3cd3 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org1.example.com | [3cd4 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org1.example.com | [3cd5 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org1.example.com | [3cd6 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [3cd7 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [3cd8 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [3cd9 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [3cda 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [3cdb 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer0.org1.example.com | [3cdc 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cdd 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cde 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3cdf 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3ce0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3ce1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ce2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ce3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ce4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ce5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ce6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ce7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ce8 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ce9 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3cea 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ceb 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 gate 1602702136764794100 evaluation starts +peer0.org1.example.com | [3cec 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ced 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3cee 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3cef 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 principal evaluation fails +peer0.org1.example.com | [3cf0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 gate 1602702136764794100 evaluation fails +peer0.org1.example.com | [3cf1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3cf2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3cf3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3cf4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 gate 1602702136768049400 evaluation starts +peer0.org1.example.com | [3cf5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cf6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3f9c 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3f9d 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9e 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f9f 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fa0 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa1 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa2 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa3 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3fa4 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa5 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa6 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa7 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3fa8 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3fa9 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3faa 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fab 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fac 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fad 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fae 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3faf 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3fb0 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3fb1 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 gate 1602702150780932900 evaluation starts +peer0.org2.example.com | [3fb2 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fb3 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3fb4 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3fb5 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 principal evaluation fails +peer0.org2.example.com | [3fb6 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047198d0 gate 1602702150780932900 evaluation fails +peer0.org2.example.com | [3fb7 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fb8 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fb9 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fba 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 gate 1602702150783200600 evaluation starts +peer0.org2.example.com | [3fbb 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fbc 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3fbd 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 principal matched by identity 0 +peer0.org2.example.com | [3fbe 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [3fbf 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3fc0 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fc1 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004719e40 gate 1602702150783200600 evaluation succeeds +peer0.org2.example.com | [3fc2 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc3 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc4 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fc5 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fc6 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fc7 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fc8 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fc9 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fca 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fcb 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3fcc 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3fcd 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3fce 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 gate 1602702150790368000 evaluation starts +peer0.org2.example.com | [3fcf 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fd0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3fd1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3fd2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 principal evaluation fails +peer0.org2.example.com | [3fd3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741040 gate 1602702150790368000 evaluation fails +peer0.org1.example.com | [3cf7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | [3fd4 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d16 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | [3fd5 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3cf8 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3d17 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [3fd6 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3cf9 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3d18 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f13 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fd7 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 gate 1602702150793494700 evaluation starts +peer0.org1.example.com | [3cfa 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 principal matched by identity 0 +peer1.org2.example.com | [3f14 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004082c30 gate 1602702142896074600 evaluation succeeds +peer0.org2.example.com | [3fd8 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3cfb 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | [3d19 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f15 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [3d1a 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f16 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fd9 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3cfc 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 52 2f 6a c4 5d 56 b5 13 b8 19 e4 |0D. .R/j.]V.....| +peer1.org2.example.com | [3f17 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fda 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 principal matched by identity 0 +peer1.org1.example.com | [3d1b 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 05 79 cd 71 56 a6 ac cd c1 0d 8c b6 a3 88 03 b4 |.y.qV...........| +peer1.org1.example.com | [3d1c 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 gate 1602702146322149500 evaluation starts +peer0.org2.example.com | [3fdb 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000020 a8 71 fb 42 02 20 3a 1f 69 23 fa 6f 1d c2 7d ab |.q.B. :.i#.o..}.| +peer1.org2.example.com | [3f18 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d1d 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | 00000030 5e ba 09 65 cc 6b ba 02 b4 d1 a6 e9 2b e4 6f 5a |^..e.k......+.oZ| +peer1.org2.example.com | [3f19 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d1e 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [3fdc 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000040 ef ef da 1c 17 24 |.....$| +peer1.org2.example.com | [3f1a 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d1f 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | [3cfd 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [3f1b 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d20 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 principal evaluation fails +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | [3cfe 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | [3f1c 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d21 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5e650 gate 1602702146322149500 evaluation fails +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | [3cff 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | [3f1d 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d22 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [3d00 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org2.example.com | [3f1e 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d23 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fdd 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d01 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [3f1f 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f20 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f21 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 gate 1602702142896947900 evaluation starts +peer1.org2.example.com | [3f22 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f23 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f24 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3f25 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 principal evaluation fails +peer1.org2.example.com | [3f26 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004083e30 gate 1602702142896947900 evaluation fails +peer1.org2.example.com | [3f27 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f28 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f29 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f2a 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 gate 1602702142897197300 evaluation starts +peer1.org2.example.com | [3f2b 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f2c 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f2d 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f2e 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 principal evaluation fails +peer1.org2.example.com | [3f2f 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c3a0 gate 1602702142897197300 evaluation fails +peer0.org1.example.com | [3d03 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | [3f30 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3d04 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer1.org1.example.com | [3d24 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d25 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 gate 1602702146332252700 evaluation starts +peer1.org1.example.com | [3d26 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d27 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3d28 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 principal matched by identity 0 +peer1.org1.example.com | [3d29 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3d2a 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3d2b 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d2c 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c5ebc0 gate 1602702146332252700 evaluation succeeds +peer1.org1.example.com | [3d2d 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d2e 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d2f 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d30 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d31 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d32 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f31 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f32 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f33 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 gate 1602702142897437800 evaluation starts +peer1.org2.example.com | [3f34 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f35 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f36 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 principal matched by identity 0 +peer0.org1.example.com | [3d02 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d05 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 gate 1602702136768049400 evaluation succeeds +peer0.org1.example.com | [3d06 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d07 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [3d0a 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45938 +peer0.org1.example.com | [3d08 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d09 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3d0b 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d0c 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d0d 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [3d0e 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d0f 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3d10 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161034 +peer0.org1.example.com | [3d11 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2283B40489F22EB1A73ADDFCDBF34647C62BB326FFD2ECD2657D3F04D49774AB +peer0.org1.example.com | [3d12 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3d13 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3d14 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3d15 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d16 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3d17 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d18 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3d19 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3d1a 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [3d33 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d34 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d35 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3d36 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d37 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d38 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d39 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d3a 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d3b 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d3c 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d3d 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 gate 1602702146341576800 evaluation starts +peer1.org1.example.com | [3d3e 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d3f 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3d40 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d41 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 principal evaluation fails +peer1.org1.example.com | [3d42 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c060 gate 1602702146341576800 evaluation fails +peer1.org1.example.com | [3d43 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d44 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d45 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d46 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 gate 1602702146343007600 evaluation starts +peer1.org1.example.com | [3d47 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d48 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3d49 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 principal matched by identity 0 +peer1.org1.example.com | [3d4a 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer1.org1.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer1.org1.example.com | [3d4b 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer1.org1.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer1.org1.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer1.org1.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer1.org1.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer1.org1.example.com | [3d4c 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d4d 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c7c5d0 gate 1602702146343007600 evaluation succeeds +peer1.org1.example.com | [3d4e 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d4f 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d50 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d51 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d52 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3d53 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3d54 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3d55 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3d56 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3d57 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f37 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3f38 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3f39 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f3a 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00409c910 gate 1602702142897437800 evaluation succeeds +peer1.org2.example.com | [3f3b 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f3c 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f3d 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f3e 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f3f 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3f40 10-14 19:02:22.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3f41 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [3f42 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [3f43 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f44 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f45 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f46 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f47 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f48 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f49 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f4a 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f4b 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f4c 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f4d 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f4e 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 gate 1602702142908443000 evaluation starts +peer1.org2.example.com | [3f4f 10-14 19:02:22.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f50 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f51 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3f52 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 principal evaluation fails +peer1.org2.example.com | [3f53 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bcb40 gate 1602702142908443000 evaluation fails +peer1.org2.example.com | [3f54 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d1b 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [3d1c 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3d1d 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d9c0c0, CONNECTING +peer0.org1.example.com | [3d1e 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org1.example.com | [3d1f 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 55ms (state_validation=11ms block_and_pvtdata_commit=14ms state_commit=16ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org1.example.com | [3d20 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org1.example.com | [3d21 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3d22 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d23 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d9c0c0, READY +peer0.org1.example.com | [3d24 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3d25 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3d26 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3d27 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [3d28 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d29 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fde 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047415b0 gate 1602702150793494700 evaluation succeeds +peer0.org2.example.com | [3fdf 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fe0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fe1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fe2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fe3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [3fe4 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [3fe5 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [3fe6 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [3fe7 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe8 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fe9 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fea 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3feb 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fec 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fed 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fee 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fef 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ff0 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ff1 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff2 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ff3 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ff4 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ff5 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ff6 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ff7 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3ff8 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ff9 10-14 19:02:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3ffa 10-14 19:02:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3ffb 10-14 19:02:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3ffc 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ffd 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ffe 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 4b 3d c1 80 f4 23 a7 13 f7 74 2f b5 22 21 c7 |yK=...#...t/."!.| +peer0.org2.example.com | 00000010 cf e2 44 b0 22 28 fc 1f 8c 81 26 e3 ec 59 d5 2f |..D."(....&..Y./| +peer0.org2.example.com | [3fff 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 a6 0d da e8 64 eb 1c 64 70 11 |0E.!......d..dp.| +peer0.org2.example.com | 00000010 8d 20 7c ae 50 a4 e5 1f 40 00 07 b7 61 29 ea ba |. |.P...@...a)..| +peer0.org2.example.com | 00000020 96 ff c2 1a e8 02 20 19 4f 65 19 6d d2 bb b8 aa |...... .Oe.m....| +peer0.org2.example.com | 00000030 1c e1 c2 1c b6 47 b1 23 60 31 83 00 7f 64 f2 3c |.....G.#`1...d.<| +peer0.org2.example.com | 00000040 bb 05 0b 44 99 02 81 |...D...| +peer0.org2.example.com | [4000 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4001 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4002 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4003 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [4004 10-14 19:02:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4005 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4006 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4007 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4008 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4009 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [400a 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [400b 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [400c 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [400d 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [400e 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [400f 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4010 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4011 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4012 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4013 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4014 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4015 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4016 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4017 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4018 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [401a 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4019 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [401b 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d2a 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d2b 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d2c 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d2d 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d2e 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d2f 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d30 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d31 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d32 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 gate 1602702136809608000 evaluation starts +peer0.org1.example.com | [3d33 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d34 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d35 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d36 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 principal evaluation fails +peer0.org1.example.com | [3d38 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 gate 1602702136809608000 evaluation fails +peer0.org1.example.com | [3d39 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d37 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +peer0.org1.example.com | [3d3a 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d3b 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d3c 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d3d 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d3e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d3f 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d40 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d41 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d42 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d43 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d44 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d45 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 gate 1602702136817562900 evaluation starts +peer0.org1.example.com | [3d46 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d47 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d48 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d49 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 principal evaluation fails +peer0.org1.example.com | [3d4a 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 gate 1602702136817562900 evaluation fails +peer0.org1.example.com | [3d4b 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d4c 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d4d 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d4e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 gate 1602702136819808700 evaluation starts +peer0.org1.example.com | [3d4f 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d50 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d51 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 principal matched by identity 0 +peer0.org1.example.com | [3d52 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3d53 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 46 c3 a5 2c bf 02 23 b1 a7 73 b7 |0D. .F..,..#..s.| +peer0.org1.example.com | 00000010 2a f5 cb 5b 65 04 e9 96 da 30 14 e8 41 ac 93 5b |*..[e....0..A..[| +peer0.org1.example.com | 00000020 3f 09 97 ea 02 20 0c 93 59 0f 84 75 5d c7 82 af |?.... ..Y..u]...| +peer0.org1.example.com | 00000030 83 da a0 70 8e 99 65 03 17 c9 f3 d9 9c 00 01 6b |...p..e........k| +peer0.org1.example.com | 00000040 5a ae af f7 cb ee |Z.....| +peer0.org1.example.com | [3d54 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d55 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 gate 1602702136819808700 evaluation succeeds +peer0.org1.example.com | [3d56 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d57 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d58 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d59 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d5a 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [3d5b 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d5c 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3d5d 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d5e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d5f 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d60 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 gate 1602702136825951800 evaluation starts +peer0.org1.example.com | [3d61 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d62 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d63 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 principal matched by identity 0 +peer0.org1.example.com | [3d64 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3d65 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 1b 06 b7 df 3b ae 0f 36 79 91 |0E.!......;..6y.| +peer0.org1.example.com | 00000010 0d ce ef 87 c8 6a 45 39 2f 9c 0a 28 91 f5 8c 11 |.....jE9/..(....| +peer0.org1.example.com | 00000020 47 7b da c7 4f 02 20 7a d3 b1 f2 64 c9 a7 f3 cb |G{..O. z...d....| +peer0.org1.example.com | 00000030 e1 b8 ac 8b 86 22 eb 11 bf 85 3a 6a 8f d2 17 ab |....."....:j....| +peer0.org1.example.com | 00000040 6b 0d 6f 94 9e 2b 2b |k.o..++| +peer0.org1.example.com | [3d66 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d67 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 gate 1602702136825951800 evaluation succeeds +peer0.org1.example.com | [3d68 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d69 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d6a 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d6b 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d6c 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45938 +peer0.org1.example.com | [3d6d 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45938 +peer0.org1.example.com | [3d6e 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3d6f 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [3d70 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [3d71 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45938 disconnected +peer0.org1.example.com | [3d72 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45938 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.2222ms +peer0.org1.example.com | [3d73 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3d74 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3d75 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.853Z grpc.peer_address=172.18.0.7:45944 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=100.7µs +peer0.org1.example.com | [3d76 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3d77 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3d78 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3d79 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:45944 +peer0.org1.example.com | [3d7a 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45944 +peer0.org1.example.com | [3d7b 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d7c 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d7d 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d58 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d59 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3d5a 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d5b 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d5c 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d5d 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d5e 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d5f 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d60 10-14 19:02:26.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d61 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: alive: alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > +peer1.org1.example.com | [3d62 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d63 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d64 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3d65 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d66 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d67 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d68 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d69 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d6a 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d6b 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d6c 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d6d 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3d6e 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d6f 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3d70 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d71 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3d72 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d73 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d74 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d75 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d76 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d77 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d78 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d79 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f55 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f56 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f57 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 gate 1602702142914540800 evaluation starts +peer1.org2.example.com | [3f58 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f59 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f5a 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f5b 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 principal evaluation fails +peer1.org2.example.com | [3f5c 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd0b0 gate 1602702142914540800 evaluation fails +peer1.org2.example.com | [3f5d 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f5e 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f5f 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f60 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 gate 1602702142917917000 evaluation starts +peer1.org2.example.com | [3f61 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f62 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f63 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 principal matched by identity 0 +peer1.org2.example.com | [3f64 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3f65 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3f66 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f67 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bd620 gate 1602702142917917000 evaluation succeeds +peer1.org2.example.com | [3f68 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f69 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f6a 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f6b 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f6c 10-14 19:02:22.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6d 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f6e 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f6f 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f70 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f71 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f72 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f73 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f74 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 gate 1602702142925697000 evaluation starts +peer1.org2.example.com | [3f75 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f76 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f77 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3f78 10-14 19:02:22.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 principal evaluation fails +peer1.org2.example.com | [3f79 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2820 gate 1602702142925697000 evaluation fails +peer1.org2.example.com | [3f7a 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f7b 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f7c 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f7d 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 gate 1602702142937506700 evaluation starts +peer1.org2.example.com | [3f7e 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f7f 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f80 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f81 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 principal evaluation fails +peer1.org2.example.com | [3f82 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d2d90 gate 1602702142937506700 evaluation fails +peer1.org2.example.com | [3f83 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f84 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f85 10-14 19:02:22.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f86 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 gate 1602702142940418600 evaluation starts +peer1.org2.example.com | [3f87 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f88 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3f89 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 principal matched by identity 0 +peer1.org2.example.com | [3f8a 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3f8b 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3f8c 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f8d 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3300 gate 1602702142940418600 evaluation succeeds +peer1.org2.example.com | [3f8e 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f8f 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f90 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f91 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f92 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [3f93 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3f94 10-14 19:02:22.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [3f95 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [3f96 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f97 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f98 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f99 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9a 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d7a 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7b 10-14 19:02:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7c 10-14 19:02:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7d 10-14 19:02:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7e 10-14 19:02:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7f 10-14 19:02:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d80 10-14 19:02:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d81 10-14 19:02:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d82 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d83 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E16103F +peer1.org1.example.com | [3d84 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 247E066DD5E8607966BC854208137759E81C5C508BCD59262697F3A5356279E1 +peer1.org1.example.com | [3d85 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d86 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3d87 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3d88 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d89 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d8a 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d8b 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d8c 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d8d 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d8e 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d8f 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d90 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d91 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d92 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d93 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d94 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d95 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d96 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3d97 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d98 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d99 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d9a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d9b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d9c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d9d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d9e 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 gate 1602702146544976200 evaluation starts +peer1.org1.example.com | [3d9f 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3da0 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3da1 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3da2 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 principal evaluation fails +peer1.org1.example.com | [3da3 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1990 gate 1602702146544976200 evaluation fails +peer1.org1.example.com | [3da4 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3da5 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3da6 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3da7 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 gate 1602702146546389800 evaluation starts +peer1.org1.example.com | [3da8 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3da9 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3daa 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 principal matched by identity 0 +peer1.org1.example.com | [3dab 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer1.org1.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer1.org1.example.com | [3dac 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer1.org1.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer1.org1.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org1.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer1.org1.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer1.org1.example.com | [3dad 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3dae 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004be1f00 gate 1602702146546389800 evaluation succeeds +peer1.org1.example.com | [3daf 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f9b 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f9c 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f9d 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f9e 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f9f 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fa0 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3fa1 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 gate 1602702142956315500 evaluation starts +peer1.org2.example.com | [3fa2 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fa3 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fa4 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3fa5 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 principal evaluation fails +peer1.org2.example.com | [3fa6 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1530 gate 1602702142956315500 evaluation fails +peer1.org2.example.com | [3fa7 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fa8 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fa9 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3faa 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 gate 1602702142958611500 evaluation starts +peer1.org2.example.com | [3fab 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fac 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fad 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3fae 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 principal evaluation fails +peer1.org2.example.com | [3faf 10-14 19:02:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1aa0 gate 1602702142958611500 evaluation fails +peer1.org2.example.com | [3fb0 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fb1 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fb2 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fb3 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb4 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb5 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3fb6 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb7 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fb8 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3fb9 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fba 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fbb 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 gate 1602702142960447100 evaluation starts +peer1.org2.example.com | [3fbc 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fbd 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fbe 10-14 19:02:22.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 principal matched by identity 0 +peer1.org2.example.com | [3fbf 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [3fc0 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [3fc1 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3fc2 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410e010 gate 1602702142960447100 evaluation succeeds +peer1.org2.example.com | [3fc3 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fc4 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fc5 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fc6 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fc7 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc8 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fc9 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [401c 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [401d 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [401e 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [401f 10-14 19:02:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4020 10-14 19:02:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4021 10-14 19:02:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4022 10-14 19:02:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4023 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4024 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08B0838CD6DEA0FC9E161039 +peer0.org2.example.com | [4025 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E3B4C251C74A37A985C31214BB3149B665F8F31109E16AB9AEFAF99021884DAC +peer0.org2.example.com | [4026 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4027 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4028 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4029 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [402a 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [402b 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [402c 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [402d 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [402e 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [402f 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4030 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4031 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d7e 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d7f 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d80 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3d81 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d82 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d83 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d84 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d85 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3d86 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 gate 1602702136860002900 evaluation starts +peer0.org1.example.com | [3d87 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d88 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d89 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3d8a 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 principal evaluation fails +peer0.org1.example.com | [3d8b 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 gate 1602702136860002900 evaluation fails +peer0.org1.example.com | [3d8c 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d8d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d8e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d8f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 gate 1602702136860979300 evaluation starts +peer0.org1.example.com | [3d90 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d91 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3d92 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 principal matched by identity 0 +peer0.org1.example.com | [3d93 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3d94 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 59 b5 d2 3e 60 fe 60 58 99 ca |0E.!..Y..>`.`X..| +peer0.org1.example.com | 00000010 26 7d a6 28 67 f0 21 b7 62 b8 6c dd 78 fd 21 3e |&}.(g.!.b.l.x.!>| +peer0.org1.example.com | 00000020 3f a0 40 d7 19 02 20 69 fb 6a 0f ee c6 7a 00 f4 |?.@... i.j...z..| +peer0.org1.example.com | 00000030 a5 59 32 68 c5 ed 96 04 d5 17 40 ea 1b b4 8f d3 |.Y2h......@.....| +peer0.org1.example.com | 00000040 c8 e0 6b 92 32 a3 50 |..k.2.P| +peer0.org1.example.com | [3d95 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3d96 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 gate 1602702136860979300 evaluation succeeds +peer0.org1.example.com | [3d97 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d98 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d99 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3d9a 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3d9b 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45944 +peer0.org1.example.com | [3d9c 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45944 +peer0.org1.example.com | [3d9d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d9e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d9f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3da0 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3da1 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +peer0.org1.example.com | 00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +peer0.org1.example.com | [3da2 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +peer0.org1.example.com | 00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +peer0.org1.example.com | 00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +peer0.org1.example.com | 00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +peer0.org1.example.com | 00000040 19 3c b2 fe e4 20 |.<... | +peer0.org1.example.com | [3da3 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3da4 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3da5 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3da6 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3da7 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3da8 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3da9 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3daa 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3dab 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 83 b4 04 89 f2 2e b1 a7 3a dd fc db f3 46 47 |"........:....FG| +peer0.org1.example.com | 00000010 c6 2b b3 26 ff d2 ec d2 65 7d 3f 04 d4 97 74 ab |.+.&....e}?...t.| +peer0.org1.example.com | [3dac 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 d0 5b 66 88 33 8f 4d 7e dc d7 3c |0D. ..[f.3.M~..<| +peer0.org1.example.com | 00000010 fc 47 a2 e4 61 45 b5 ad 14 0f d9 5b 83 3b c3 d6 |.G..aE.....[.;..| +peer0.org1.example.com | 00000020 79 d5 a6 de 02 20 71 5d c8 14 40 b5 f1 9f 61 63 |y.... q]..@...ac| +peer0.org1.example.com | 00000030 a3 dc 76 bb b5 b2 f2 4d d4 8d 7b 13 b0 10 14 f3 |..v....M..{.....| +peer0.org1.example.com | 00000040 f5 cd 77 64 bc fe |..wd..| +peer0.org1.example.com | [3dad 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3db0 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3db1 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3db2 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3db3 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3db4 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db5 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3db6 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer1.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer1.org1.example.com | [3db7 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer1.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer1.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer1.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer1.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer1.org1.example.com | [3db8 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3db9 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3dba 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dbb 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dbc 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dbd 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dbe 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dbf 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3dc0 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dc1 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dc2 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3dc3 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dc4 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dc5 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3dc6 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3dc7 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3dc8 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 gate 1602702146573423700 evaluation starts +peer1.org1.example.com | [3dc9 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3dca 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3dcb 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3dcc 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 principal evaluation fails +peer1.org1.example.com | [3dcd 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cd1f10 gate 1602702146573423700 evaluation fails +peer1.org1.example.com | [3dce 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3dcf 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3dd0 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3dd1 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 gate 1602702146580819600 evaluation starts +peer1.org1.example.com | [3dd2 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3dd3 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3dd4 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 principal matched by identity 0 +peer1.org1.example.com | [3dd5 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer1.org1.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer1.org1.example.com | [3dd6 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer1.org1.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer1.org1.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer1.org1.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer1.org1.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer1.org1.example.com | [3dd7 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3dd8 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cf8480 gate 1602702146580819600 evaluation succeeds +peer1.org1.example.com | [3dd9 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3dda 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ddb 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ddc 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ddd 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3dde 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ddf 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3de0 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer1.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer1.org1.example.com | [3de1 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer1.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer1.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer1.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer1.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer1.org1.example.com | [3de2 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3de3 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3de4 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de5 10-14 19:02:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de6 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3de7 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3de8 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer1.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer1.org1.example.com | [3de9 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer1.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer1.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer1.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer1.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer1.org1.example.com | [3dea 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3deb 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 be b5 38 5d ff ce d6 e9 6a 32 |0E.!....8]....j2| +peer1.org1.example.com | 00000010 2c 8e 4b 66 74 cc 02 cd b1 03 13 ef 03 ec 8d fd |,.Kft...........| +peer1.org1.example.com | 00000020 dd 42 65 e2 f6 02 20 12 c1 0d 32 1a 69 1f 26 f2 |.Be... ...2.i.&.| +peer1.org1.example.com | 00000030 12 c1 67 96 5e 2d d9 ea 96 d8 5d 4c 28 11 b4 d9 |..g.^-....]L(...| +peer1.org1.example.com | 00000040 57 93 27 ae eb d9 f3 |W.'....| +peer1.org1.example.com | [3dec 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3ded 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3dee 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3def 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df0 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df1 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df2 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df3 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3df4 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df5 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fca 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fcb 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fcc 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fcd 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fce 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3fcf 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 gate 1602702142977213700 evaluation starts +peer1.org2.example.com | [3fd0 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fd1 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fd2 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3fd3 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 principal evaluation fails +peer1.org2.example.com | [3fd4 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f210 gate 1602702142977213700 evaluation fails +peer1.org2.example.com | [3fd5 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fd6 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3fd7 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3fd8 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 gate 1602702142977852100 evaluation starts +peer1.org2.example.com | [3fd9 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fda 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fdb 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3fdc 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 principal evaluation fails +peer1.org2.example.com | [3fdd 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410f780 gate 1602702142977852100 evaluation fails +peer1.org2.example.com | [3fde 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fdf 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fe0 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fe1 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 gate 1602702142979462900 evaluation starts +peer1.org2.example.com | [3fe2 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fe3 10-14 19:02:22.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [3fe4 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 principal matched by identity 0 +peer1.org2.example.com | [3fe5 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [3fe6 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [3fe7 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3fe8 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410fcf0 gate 1602702142979462900 evaluation succeeds +peer1.org2.example.com | [3fe9 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fea 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3feb 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fec 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fed 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [3dae 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3daf 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3db0 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3db1 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db3 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db4 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db5 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3db2 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3db6 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08071A0C0A0565787030321203312E30 +peer0.org1.example.com | [3db7 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3EE8CFAEA39A579EB891757DA25320A31239218AFD2D9AC0DBFDE72D691CAD +peer0.org1.example.com | [3db8 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3db9 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dba 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3dbb 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dbc 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dbd 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc0 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4032 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4033 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4034 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4035 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4036 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4037 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4038 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4039 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [403a 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [403b 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [403c 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [403e 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [403f 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4040 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4041 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4042 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4043 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 gate 1602702154199816200 evaluation starts +peer0.org2.example.com | [4044 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4045 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4046 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4047 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 principal evaluation fails +peer0.org2.example.com | [4048 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ba5d0 gate 1602702154199816200 evaluation fails +peer0.org2.example.com | [4049 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [404a 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [404b 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [404c 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 gate 1602702154200328900 evaluation starts +peer0.org2.example.com | [404d 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3df6 10-14 19:02:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df7 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df8 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df9 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dfa 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dfb 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dfc 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dfd 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3dfe 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer1.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer1.org1.example.com | [3dff 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer1.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer1.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer1.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer1.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer1.org1.example.com | [3e00 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3e01 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 ca 84 57 9a c6 34 e3 ad 46 c9 ed |0D. ...W..4..F..| +peer1.org1.example.com | 00000010 70 54 e6 fd f7 3d 59 f3 b0 27 1c ce 25 1d 16 d3 |pT...=Y..'..%...| +peer1.org1.example.com | 00000020 da cc 44 ce 02 20 3f e8 c0 a4 2d c2 d3 6c 17 ad |..D.. ?...-..l..| +peer1.org1.example.com | 00000030 d6 8d 3d 39 10 71 28 3d 45 ed d8 b6 d2 16 5c a1 |..=9.q(=E.....\.| +peer1.org1.example.com | 00000040 35 98 99 98 57 1a |5...W.| +peer1.org1.example.com | [3e02 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3e03 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3e04 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e05 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e06 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3e07 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e08 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e09 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fee 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [3fef 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [3ff0 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [3ff1 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ff2 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ff3 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ff4 10-14 19:02:22.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ff5 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [3ff6 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3ff7 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3ff8 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610111801 +peer1.org2.example.com | [3ff9 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 019C43ADAB90B3083329424046FBD6F021AEC4887E8B474D383B5EC7AA2D0B3E +peer1.org2.example.com | [3ffa 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3ffb 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ffc 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ffd 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ffe 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fff 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4000 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4001 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4002 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [4003 10-14 19:02:23.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4004 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4005 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4006 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4007 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4008 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 5a 98 07 dc 3c 51 32 38 4e db d4 e0 9e a7 30 |.Z... DEBU Verify: sig = 00000000 30 44 02 20 31 3e d3 01 ba 14 e4 29 70 1c 6f 51 |0D. 1>.....)p.oQ| +peer1.org2.example.com | 00000010 27 f0 ce 5a 9d 40 9f c4 4a a6 14 dc a9 c2 10 e2 |'..Z.@..J.......| +peer1.org2.example.com | 00000020 67 5f 14 73 02 20 4b 8a b0 ae c5 ac 89 7e 50 91 |g_.s. K......~P.| +peer1.org2.example.com | 00000030 ff 85 a0 5a 65 12 96 c6 10 99 48 59 f4 49 f7 c4 |...Ze.....HY.I..| +peer1.org2.example.com | 00000040 42 69 25 01 0a e8 |Bi%...| +peer1.org2.example.com | [400a 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [400b 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [400c 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [400d 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3dbe 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3dc1 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3dc2 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org1.example.com | [3dc3 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3dc4 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004eb5ba0, CONNECTING +peer0.org1.example.com | [3dbf 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dc5 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc6 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3dc7 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3dc8 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3dc9 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3dca 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3dcb 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3dce 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org1.example.com | [3dcc 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dcd 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dcf 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3dd0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dd1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dd3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [3dd4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dd5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dd6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3dd2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3dd7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dd8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dd9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3dda 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e0a 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3e0b 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e0c 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e0d 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3e0e 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > +peer1.org1.example.com | [3e0f 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e10 10-14 19:02:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e11 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e12 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e13 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e14 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e15 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e16 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [3e17 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [3e18 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3e19 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610121801 +peer1.org1.example.com | [3e1a 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E3E40D22FC0BE56451B6B5A07B32356F65BEEA4CF5D411D70BF5E20F2836B10 +peer1.org1.example.com | [3e1b 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [3e1c 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e1d 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e1e 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e1f 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e20 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3e21 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e22 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e23 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3e24 10-14 19:02:28.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e25 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54850 +peer1.org1.example.com | [3e26 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004d0dae0 +peer1.org1.example.com | [3e27 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3e28 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3e29 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3e2a 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3e2b 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 42 f4 ae 71 da 07 4c b8 c8 b2 81 67 fa f9 ac |.B..q..L....g...| +peer1.org1.example.com | 00000010 67 db a8 6d 27 76 94 99 30 5b 7c f3 19 52 cd 57 |g..m'v..0[|..R.W| +peer1.org1.example.com | [3e2c 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c3 a2 c0 d5 c8 c8 b6 bc ad 06 |0E.!............| +peer1.org1.example.com | 00000010 72 50 a7 34 41 b7 a9 b8 4d 09 ae 9f 5c 71 7e 90 |rP.4A...M...\q~.| +peer1.org1.example.com | 00000020 1d 52 ae f8 3f 02 20 3d 8d ec bd 13 d7 0b 41 ff |.R..?. =......A.| +peer1.org1.example.com | 00000030 e5 45 78 d4 f9 54 c3 0f f9 9b b7 6b c9 6c 78 18 |.Ex..T.....k.lx.| +peer1.org1.example.com | 00000040 76 5f 62 dc e7 24 cb |v_b..$.| +peer1.org1.example.com | [3e2d 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3e2e 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004b65110, header 0xc004d0def0 +peer1.org1.example.com | [3e2f 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [3e30 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU [][1c2d3a25] processing txid: 1c2d3a25ec54833cbd6a9e7948135e04f9a27899511a372a6f4b63947c3c3a88 +peer1.org1.example.com | [3e31 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU [][1c2d3a25] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3e32 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> INFO [][1c2d3a25] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3e33 10-14 19:02:28.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3e34 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [3e35 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 42 f4 ae 71 da 07 4c b8 c8 b2 81 67 fa f9 ac |.B..q..L....g...| +peer1.org1.example.com | 00000010 67 db a8 6d 27 76 94 99 30 5b 7c f3 19 52 cd 57 |g..m'v..0[|..R.W| +peer1.org1.example.com | [3e36 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd c3 a2 c0 d5 c8 c8 b6 bc ad 06 |0E.!............| +peer1.org1.example.com | 00000010 72 50 a7 34 41 b7 a9 b8 4d 09 ae 9f 5c 71 7e 90 |rP.4A...M...\q~.| +peer1.org1.example.com | 00000020 1d 52 ae f8 3f 02 20 3d 8d ec bd 13 d7 0b 41 ff |.R..?. =......A.| +peer1.org1.example.com | 00000030 e5 45 78 d4 f9 54 c3 0f f9 9b b7 6b c9 6c 78 18 |.Ex..T.....k.lx.| +peer1.org1.example.com | 00000040 76 5f 62 dc e7 24 cb |v_b..$.| +peer1.org1.example.com | [3e37 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU [1c2d3a25] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3e38 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU [1c2d3a25] notifying Txid:1c2d3a25ec54833cbd6a9e7948135e04f9a27899511a372a6f4b63947c3c3a88, channelID: +peer1.org1.example.com | [3e39 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3e3a 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> INFO [][1c2d3a25] Exit chaincode: name:"cscc" (2ms) +peer1.org1.example.com | [3e3b 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][1c2d3a25] Exit +peer1.org1.example.com | [3e3c 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54850 +peer1.org1.example.com | [3e3d 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54850 grpc.code=OK grpc.call_duration=8.0086ms +peer1.org1.example.com | [3e3e 10-14 19:02:28.39 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3e3f 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:54858 +peer1.org1.example.com | [3e40 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004cf25a0 +peer1.org1.example.com | [3e41 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3e42 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3e43 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3e44 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3e45 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 04 61 e4 8a b4 33 59 f2 75 1c de c0 22 36 48 |..a...3Y.u..."6H| +peer1.org1.example.com | 00000010 e1 4a 22 23 51 0c f2 f6 34 cb 16 78 5a a2 d8 02 |.J"#Q...4..xZ...| +peer1.org1.example.com | [3e46 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 3b 1c f4 30 e8 8d 34 0d cf 7f |0E.!..;..0..4...| +peer1.org1.example.com | 00000010 1c be fe 72 1a b8 65 70 5c 69 7b b6 f3 28 f2 6e |...r..ep\i{..(.n| +peer1.org1.example.com | 00000020 3a 3e b9 6d 27 02 20 7c ff 79 62 60 54 2d 52 de |:>.m'. |.yb`T-R.| +peer1.org1.example.com | 00000030 55 c8 88 a3 96 b0 1f d2 f2 a8 a9 f1 28 d4 e0 50 |U...........(..P| +peer1.org1.example.com | 00000040 38 61 c9 c0 55 e0 ef |8a..U..| +peer1.org1.example.com | [3e47 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3e48 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004cc03f0, header 0xc004cf29b0 +peer1.org1.example.com | [3e49 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [3e4a 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU [][1fa81fa4] processing txid: 1fa81fa4978065ad89df53dcaa1fa3a544cbdd132a78a880e210316aa28fc4d5 +peer1.org1.example.com | [3e4b 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU [][1fa81fa4] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3e4c 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> INFO [][1fa81fa4] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3e4d 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3e4e 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [3e4f 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [3e50 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [3e51 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e52 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e53 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e54 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e55 10-14 19:02:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3e56 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 gate 1602702149470236200 evaluation starts +peer1.org1.example.com | [3e57 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e58 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3e59 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3e5a 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3e5b 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3e5c 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 principal matched by identity 0 +peer1.org1.example.com | [3e5d 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 04 61 e4 8a b4 33 59 f2 75 1c de c0 22 36 48 |..a...3Y.u..."6H| +peer1.org1.example.com | 00000010 e1 4a 22 23 51 0c f2 f6 34 cb 16 78 5a a2 d8 02 |.J"#Q...4..xZ...| +peer1.org1.example.com | [3e5e 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 3b 1c f4 30 e8 8d 34 0d cf 7f |0E.!..;..0..4...| +peer1.org1.example.com | 00000010 1c be fe 72 1a b8 65 70 5c 69 7b b6 f3 28 f2 6e |...r..ep\i{..(.n| +peer1.org1.example.com | 00000020 3a 3e b9 6d 27 02 20 7c ff 79 62 60 54 2d 52 de |:>.m'. |.yb`T-R.| +peer1.org1.example.com | 00000030 55 c8 88 a3 96 b0 1f d2 f2 a8 a9 f1 28 d4 e0 50 |U...........(..P| +peer1.org1.example.com | 00000040 38 61 c9 c0 55 e0 ef |8a..U..| +peer1.org1.example.com | [3e5f 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e60 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9070 gate 1602702149470236200 evaluation succeeds +peer1.org1.example.com | [3e61 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ddb 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ddc 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 gate 1602702137905610300 evaluation starts +peer0.org1.example.com | [3ddd 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3dde 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ddf 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3de0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 principal evaluation fails +peer0.org1.example.com | [3de1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 gate 1602702137905610300 evaluation fails +peer0.org1.example.com | [3de2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3de3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3de4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3de5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 gate 1602702137907609300 evaluation starts +peer0.org1.example.com | [3de6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3de7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3de8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 principal matched by identity 0 +peer0.org1.example.com | [3de9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3dea 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3deb 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dec 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 gate 1602702137907609300 evaluation succeeds +peer0.org1.example.com | [3ded 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dee 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3def 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3df0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3df1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3df4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3df5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3df6 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3df7 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3df8 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3df9 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3dfa 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [404e 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [404f 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 principal matched by identity 0 +peer0.org2.example.com | [4050 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer0.org2.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer0.org2.example.com | [4051 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer0.org2.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer0.org2.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer0.org2.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer0.org2.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer0.org2.example.com | [4052 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4053 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bab40 gate 1602702154200328900 evaluation succeeds +peer0.org2.example.com | [4054 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4055 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4056 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4057 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4058 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4059 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [405a 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [403d 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [405b 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer0.org2.example.com | [405c 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer0.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer0.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer0.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer0.org2.example.com | [405d 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [405e 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [405f 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4060 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4061 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer0.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer0.org2.example.com | [4062 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer0.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer0.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer0.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer0.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer0.org2.example.com | [4063 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4064 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4065 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4066 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4067 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4068 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4069 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [406a 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer0.org2.example.com | [406b 10-14 19:02:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer0.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer0.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer0.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer0.org2.example.com | [406c 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [406d 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a de b8 e9 2f 44 ba cc 91 26 3d |0E.!...../D...&=| +peer0.org2.example.com | 00000010 7d fd df de 5a 95 4f 29 0d 9d 99 38 90 2e 79 12 |}...Z.O)...8..y.| +peer0.org2.example.com | 00000020 5c 9b 61 86 d1 02 20 55 7c 4a a1 e4 39 d0 58 f8 |\.a... U|J..9.X.| +peer0.org2.example.com | 00000030 e1 9e f6 cd 0b 1e 6a 21 3c b0 80 b7 9b 80 f7 45 |......j!<......E| +peer0.org2.example.com | 00000040 da 2c 95 07 58 23 b7 |.,..X#.| +peer0.org2.example.com | [406e 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [406f 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [4070 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4071 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4072 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4073 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4074 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4075 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4076 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4077 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4078 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4079 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [407a 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [407b 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [407c 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [407d 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [407e 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [407f 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4080 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4081 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4082 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4083 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4084 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4085 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4086 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4087 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 gate 1602702154240498000 evaluation starts +peer0.org2.example.com | [4088 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4089 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [400e 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [400f 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4010 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4011 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4012 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4013 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4014 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4015 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4016 10-14 19:02:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4017 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4018 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4019 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [401a 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [401b 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [401c 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [401d 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [401e 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [401f 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4020 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4021 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4022 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4023 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4024 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4025 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4026 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161037 +peer1.org2.example.com | [4027 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9748825A01181D5484C10596CFE21C7410510159CAEE6BF56A1E98F651FD6C42 +peer1.org2.example.com | [4028 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4029 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [402a 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [402b 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [402c 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [402d 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [402e 10-14 19:02:25.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [402f 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4030 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4031 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4033 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4035 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4034 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4036 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4032 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4037 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4038 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4039 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403a 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403b 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [403c 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403d 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [403e 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 48 82 5a 01 18 1d 54 84 c1 05 96 cf e2 1c 74 |.H.Z...T.......t| +peer1.org2.example.com | 00000010 10 51 01 59 ca ee 6b f5 6a 1e 98 f6 51 fd 6c 42 |.Q.Y..k.j...Q.lB| +peer1.org2.example.com | [403f 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 2d 9e b8 8b fd cf 63 62 c1 |0E.!...-.....cb.| +peer1.org2.example.com | 00000010 23 da 96 9a 1e 72 d3 95 fb 60 78 04 6a 04 fe f6 |#....r...`x.j...| +peer1.org2.example.com | 00000020 3b 49 5c 50 2e 02 20 10 38 7f 7b bc 9e cb fd 4e |;I\P.. .8.{....N| +peer1.org2.example.com | 00000030 f6 57 fc db a3 43 39 d3 77 49 a8 4f f5 49 d5 64 |.W...C9.wI.O.I.d| +peer1.org2.example.com | 00000040 d4 8b 5e a4 3f e2 ff |..^.?..| +peer1.org2.example.com | [4040 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4041 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4042 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4043 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4044 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4045 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4046 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4047 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [408a 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [408b 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 principal evaluation fails +peer0.org2.example.com | [408c 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f8480 gate 1602702154240498000 evaluation fails +peer0.org2.example.com | [408d 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [408e 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [408f 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4090 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 gate 1602702154241914300 evaluation starts +peer0.org2.example.com | [4091 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4092 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4093 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 principal matched by identity 0 +peer0.org2.example.com | [4094 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer0.org2.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer0.org2.example.com | [4095 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer0.org2.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer0.org2.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer0.org2.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer0.org2.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer0.org2.example.com | [4096 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4097 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047f89f0 gate 1602702154241914300 evaluation succeeds +peer0.org2.example.com | [4098 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4099 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [409a 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [409b 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [409c 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [409d 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409e 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [409f 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer0.org2.example.com | [40a0 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer0.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer0.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer0.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer0.org2.example.com | [40a1 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a2 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a3 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40a4 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [40a5 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer0.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer0.org2.example.com | [40a6 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer0.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer0.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer0.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer0.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer0.org2.example.com | [40a7 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a8 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40a9 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40aa 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:I\2245" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [40ab 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:I\2245" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [40ac 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ad 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:I\2245" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [40ae 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [40af 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer0.org2.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer0.org2.example.com | [40b0 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer0.org2.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer0.org2.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer0.org2.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer0.org2.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer0.org2.example.com | [40b1 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [40b2 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 ba 50 c1 9b 46 62 42 c8 11 47 48 |0D. w.P..FbB..GH| +peer0.org2.example.com | 00000010 34 6c 0d 02 75 84 99 7f 53 41 8e 45 2e d2 2f 82 |4l..u...SA.E../.| +peer0.org2.example.com | 00000020 35 57 47 05 02 20 72 f1 0a 4d f9 91 f1 21 6f 15 |5WG.. r..M...!o.| +peer0.org2.example.com | 00000030 42 01 29 ab 2c 27 0e 40 80 40 4a 0a 57 6a 32 e8 |B.).,'.@.@J.Wj2.| +peer0.org2.example.com | 00000040 cf ee 3e 49 94 35 |..>I.5| +peer0.org2.example.com | [40b3 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [40b4 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [40b5 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [40b6 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [40b7 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [40b8 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b9 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40bb 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [40bc 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40bd 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40be 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [40bf 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:I\2245" > > alive: +peer0.org2.example.com | [40c0 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c1 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ba 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40c2 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c3 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c4 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40c5 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c6 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c7 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c8 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c9 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40ca 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40cb 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [40cc 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40cd 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40ce 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40cf 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [40d0 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d1 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40d2 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d3 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40d4 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d5 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40d6 10-14 19:02:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d8 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d9 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40da 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40db 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d7 10-14 19:02:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [40dc 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40dd 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [40de 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4048 10-14 19:02:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4049 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [404a 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [404b 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [404c 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [404d 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [404e 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 gate 1602702145381733200 evaluation starts +peer1.org2.example.com | [404f 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4050 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4051 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4052 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 principal evaluation fails +peer1.org2.example.com | [4053 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416b8d0 gate 1602702145381733200 evaluation fails +peer1.org2.example.com | [4054 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4055 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4056 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4057 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 gate 1602702145384911200 evaluation starts +peer1.org2.example.com | [4058 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4059 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [405a 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [405b 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 principal evaluation fails +peer1.org2.example.com | [405c 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416be40 gate 1602702145384911200 evaluation fails +peer1.org2.example.com | [405d 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [405e 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [405f 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4060 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 gate 1602702145385247900 evaluation starts +peer1.org2.example.com | [4061 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4062 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4063 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 principal matched by identity 0 +peer1.org2.example.com | [4064 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 15 a2 c3 03 13 3d 4d fb 4d 83 0d 01 e1 ce fc |b.....=M.M......| +peer1.org2.example.com | 00000010 48 25 1d 1c f9 29 f4 08 6e 05 91 df 4a 10 99 72 |H%...)..n...J..r| +peer1.org2.example.com | [4065 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 af 8e 67 61 c6 0a 88 43 e4 f0 |0E.!....ga...C..| +peer1.org2.example.com | 00000010 2b 5a 46 76 77 73 50 8b 0e 20 92 15 15 b0 36 cb |+ZFvwsP.. ....6.| +peer1.org2.example.com | 00000020 48 24 95 27 34 02 20 7f 96 c3 29 6a d7 13 fd 48 |H$.'4. ...)j...H| +peer1.org2.example.com | 00000030 df 5d c5 11 9d 48 5f 9e fd cb ee b3 b5 60 0a 4c |.]...H_......`.L| +peer1.org2.example.com | 00000040 25 bd a8 01 2e e7 ea |%......| +peer1.org2.example.com | [4066 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4067 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a43b0 gate 1602702145385247900 evaluation succeeds +peer1.org2.example.com | [4068 10-14 19:02:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4069 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [406a 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [406b 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [406c 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [406d 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [406e 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [406f 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4070 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4071 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4072 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4073 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4074 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4075 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4076 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4077 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4078 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4079 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [407a 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [407b 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [407c 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [407d 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [407e 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [407f 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4080 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4081 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4082 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4083 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4084 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4085 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4086 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4087 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4088 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4089 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [408a 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3dfb 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 gate 1602702137910919900 evaluation starts +peer0.org1.example.com | [3dfc 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3dfe 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3dff 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3e00 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 principal evaluation fails +peer0.org1.example.com | [3e01 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 gate 1602702137910919900 evaluation fails +peer0.org1.example.com | [3e02 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e03 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e04 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e05 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 gate 1602702137913338100 evaluation starts +peer0.org1.example.com | [3e06 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e07 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e08 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [3e09 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3e0a 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3e0b 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 principal matched by identity 0 +peer0.org1.example.com | [3e0c 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3e0d 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004eb5ba0, READY +peer0.org1.example.com | [3e0e 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3e0f 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e10 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 gate 1602702137913338100 evaluation succeeds +peer0.org1.example.com | [3e11 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e12 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e13 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e14 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e15 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dfd 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004f082c0, CONNECTING +peer0.org1.example.com | [3e16 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e17 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e18 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e19 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e1a 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3e1b 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3e1c 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004f082c0, READY +peer0.org1.example.com | [3e1d 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e1e 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3e1f 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3e20 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +peer1.org1.example.com | [3e62 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e63 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e64 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e65 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU [1fa81fa4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3e66 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU [1fa81fa4] notifying Txid:1fa81fa4978065ad89df53dcaa1fa3a544cbdd132a78a880e210316aa28fc4d5, channelID: +peer1.org1.example.com | [3e67 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3e68 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> INFO [][1fa81fa4] Exit chaincode: name:"qscc" (7ms) +peer1.org1.example.com | [3e69 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU [][1fa81fa4] Exit +peer1.org1.example.com | [3e6a 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:54858 +peer1.org1.example.com | [3e6b 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:54858 grpc.code=OK grpc.call_duration=10.9648ms +peer1.org1.example.com | [3e6c 10-14 19:02:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3e6d 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e6e 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e6f 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e70 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e71 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e72 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e73 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3e74 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e75 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e76 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e77 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e78 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e79 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e7a 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e7b 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e7c 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e7d 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3e7e 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e7f 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e80 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e81 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e82 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3e83 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e21 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org1.example.com | [3e22 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [3e23 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 39 73 9c ac d4 cc 33 ae 9b 5d 45 c6 |0C..9s....3..]E.| +peer0.org1.example.com | 00000010 c5 cd 6a 0e 08 83 a0 f8 d1 f3 40 d5 23 f7 55 f2 |..j.......@.#.U.| +peer0.org1.example.com | 00000020 0c 74 1f 02 20 1f 0c bc b3 1b 4b b3 89 25 28 dc |.t.. .....K..%(.| +peer0.org1.example.com | 00000030 fe 8a bd b7 a3 92 91 16 fd 7e 3d 21 d6 ca f1 a9 |.........~=!....| +peer0.org1.example.com | 00000040 2d 33 7c b0 bc |-3|..| +peer0.org1.example.com | [3e24 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org1.example.com | [3e25 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e26 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3e27 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e28 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e29 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [3e2a 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +peer0.org1.example.com | [3e2b 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e2c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e2d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e2e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e2f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e30 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e31 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e32 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e33 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e34 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e35 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3e36 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 gate 1602702137912353700 evaluation starts +peer0.org1.example.com | [3e37 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e38 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e39 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3e3a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 principal evaluation fails +peer0.org1.example.com | [3e3b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 gate 1602702137912353700 evaluation fails +peer0.org1.example.com | [3e3c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e3d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e3e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e3f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 gate 1602702137913254400 evaluation starts +peer0.org1.example.com | [3e40 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e41 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e42 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 principal matched by identity 0 +peer0.org1.example.com | [3e43 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [3e44 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 44 cc 77 89 a1 f2 81 23 ab 1a 00 |0D. HD.w....#...| +peer0.org1.example.com | 00000010 9e 53 7e 9d 97 e3 bc 07 6d 66 3f 97 b8 7d 93 cd |.S~.....mf?..}..| +peer0.org1.example.com | 00000020 0f 45 b1 73 02 20 30 2d 36 10 c2 70 2a e2 c1 86 |.E.s. 0-6..p*...| +peer0.org1.example.com | 00000030 24 c4 9a 2f a9 19 e4 ce c0 10 88 54 ca 5a b4 f2 |$../.......T.Z..| +peer0.org1.example.com | 00000040 cf 3e 55 d4 5b be |.>U.[.| +peer0.org1.example.com | [3e45 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e46 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 gate 1602702137913254400 evaluation succeeds +peer1.org2.example.com | [408b 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [408c 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [408d 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [408e 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [408f 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4090 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4091 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4092 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4093 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4094 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4095 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 gate 1602702145564902500 evaluation starts +peer1.org2.example.com | [4096 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4097 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4098 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4099 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 principal evaluation fails +peer1.org2.example.com | [409a 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6720 gate 1602702145564902500 evaluation fails +peer1.org2.example.com | [409b 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [40df 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40e0 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e1 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e2 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40e3 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40e4 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [40e5 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 gate 1602702154619821100 evaluation starts +peer0.org2.example.com | [40e6 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40e7 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [40e8 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [40e9 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 principal evaluation fails +peer0.org2.example.com | [40ea 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048139b0 gate 1602702154619821100 evaluation fails +peer0.org2.example.com | [40eb 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [40ec 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [40ed 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40ee 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 gate 1602702154620383200 evaluation starts +peer0.org2.example.com | [40ef 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40f0 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [40f1 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 principal matched by identity 0 +peer0.org2.example.com | [40f2 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [40f3 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [40f4 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40f5 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004813f20 gate 1602702154620383200 evaluation succeeds +peer0.org2.example.com | [40f6 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40f7 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40f8 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [40f9 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [40fa 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40fb 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40fc 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [40fd 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e47 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e48 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e49 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e4a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e4b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [3e4c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3e4e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e50 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e51 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e52 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3e53 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3e54 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3e55 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e56 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3e57 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e58 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e59 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e5a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e5b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e5c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e5d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e5e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3e5f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 gate 1602702137938818800 evaluation starts +peer0.org1.example.com | [3e60 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e61 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e62 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3e63 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 principal evaluation fails +peer0.org1.example.com | [3e64 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 gate 1602702137938818800 evaluation fails +peer0.org1.example.com | [3e65 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e66 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e84 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3e85 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e86 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e87 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e88 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e89 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e8a 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 gate 1602702150120092300 evaluation starts +peer1.org1.example.com | [3e8b 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e8c 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3e8d 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3e8e 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 principal evaluation fails +peer1.org1.example.com | [3e8f 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df2030 gate 1602702150120092300 evaluation fails +peer1.org1.example.com | [3e90 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e91 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e92 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e93 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 gate 1602702150121313200 evaluation starts +peer1.org1.example.com | [3e94 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e95 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3e96 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 principal matched by identity 0 +peer1.org1.example.com | [3e97 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c3 8a 1b e3 8c 28 2e 93 03 d9 f7 e6 03 c6 4e |......(........N| +peer1.org1.example.com | 00000010 61 84 42 83 e2 6b e9 3a a9 89 9b 25 b1 a4 0f 5f |a.B..k.:...%..._| +peer1.org1.example.com | [3e98 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 54 1c 9b 02 19 d7 98 02 1a 03 |0E.!..T.........| +peer1.org1.example.com | 00000010 54 46 e4 79 3d 4e 71 51 29 d1 2b da 66 7f e2 93 |TF.y=NqQ).+.f...| +peer1.org1.example.com | 00000020 20 a6 2b e3 a4 02 20 45 80 43 07 9d 9d ea a7 c1 | .+... E.C......| +peer1.org1.example.com | 00000030 0c cb 21 b6 2f 5a 46 6f e2 f8 76 4a bb 9f ae 25 |..!./ZFo..vJ...%| +peer1.org1.example.com | 00000040 e7 6b 24 f8 2a b4 7b |.k$.*.{| +peer1.org1.example.com | [3e99 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e9a 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df25a0 gate 1602702150121313200 evaluation succeeds +peer1.org1.example.com | [3e9b 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e9c 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e9d 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e9e 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e9f 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ea0 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3ea1 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3ea2 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3ea3 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3ea4 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ea5 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ea6 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ea7 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ea8 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ea9 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3eaa 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eab 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eac 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40fe 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40ff 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4100 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4101 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4102 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4103 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 gate 1602702154655323600 evaluation starts +peer0.org2.example.com | [4104 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4105 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4106 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4107 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 principal evaluation fails +peer0.org2.example.com | [4108 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882120 gate 1602702154655323600 evaluation fails +peer0.org2.example.com | [4109 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [410a 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [410b 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [410c 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 gate 1602702154658750400 evaluation starts +peer0.org2.example.com | [410d 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [410e 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [410f 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 principal matched by identity 0 +peer0.org2.example.com | [4110 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [4111 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [4112 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4113 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004882690 gate 1602702154658750400 evaluation succeeds +peer0.org2.example.com | [4114 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4115 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4116 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4117 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4118 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [4119 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [411a 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [411b 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | [409c 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [409d 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [409e 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 gate 1602702145565183700 evaluation starts +peer1.org2.example.com | [409f 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40a0 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [40a1 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [40a2 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 principal evaluation fails +peer1.org2.example.com | [40a3 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c6c90 gate 1602702145565183700 evaluation fails +peer1.org2.example.com | [40a4 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40a5 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40a6 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [40a7 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 gate 1602702145565429700 evaluation starts +peer1.org2.example.com | [40a8 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40a9 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [40aa 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 principal matched by identity 0 +peer1.org2.example.com | [40ab 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 47 c8 4b d9 30 6a 57 88 af 25 ab c7 2a f5 78 | G.K.0jW..%..*.x| +peer1.org2.example.com | 00000010 39 e6 08 05 be 6a 36 da e7 ea 88 e0 c5 62 59 65 |9....j6......bYe| +peer1.org2.example.com | [40ac 10-14 19:02:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 87 ce e4 cf ff 2d d5 91 73 46 |0E.!.......-..sF| +peer1.org2.example.com | 00000010 53 92 74 eb 6e 2b 7f 02 ea a7 9b 09 4a 21 c0 8a |S.t.n+......J!..| +peer1.org2.example.com | 00000020 ff b0 99 a2 30 02 20 6c 54 16 94 4e 60 54 03 7a |....0. lT..N`T.z| +peer1.org2.example.com | 00000030 c0 70 c9 29 60 bc fd cd 27 de 2d 62 a0 93 86 4e |.p.)`...'.-b...N| +peer1.org2.example.com | 00000040 59 61 1f 7c 24 53 f9 |Ya.|$S.| +peer1.org2.example.com | [40ad 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [40ae 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c7200 gate 1602702145565429700 evaluation succeeds +peer1.org2.example.com | [40af 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40b0 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40b1 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40b2 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [40b3 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [40b4 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40b5 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [40b6 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40b7 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [40b8 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [40b9 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [40ba 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40bb 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40bc 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40bd 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40be 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40bf 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c0 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40c1 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c2 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40c3 10-14 19:02:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c4 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c5 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c6 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c7 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c8 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c9 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ca 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [40cb 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40cc 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40cd 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [40ce 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40d0 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40cf 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40d1 10-14 19:02:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40d2 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e67 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e68 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 gate 1602702137939158700 evaluation starts +peer0.org1.example.com | [3e69 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e6a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e6b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 principal matched by identity 0 +peer0.org1.example.com | [3e6c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3e6d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3e6e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e6f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 gate 1602702137939158700 evaluation succeeds +peer0.org1.example.com | [3e70 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e71 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e72 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e73 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e74 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e75 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e76 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e77 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e78 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e79 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e7a 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e7b 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3e7c 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 gate 1602702137946736800 evaluation starts +peer0.org1.example.com | [3e7d 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e7e 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e7f 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3e80 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 principal evaluation fails +peer0.org1.example.com | [3e81 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 gate 1602702137946736800 evaluation fails +peer0.org1.example.com | [3e82 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e83 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3e84 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e85 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 gate 1602702137950756200 evaluation starts +peer0.org1.example.com | [3e86 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e87 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3e88 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 principal matched by identity 0 +peer0.org1.example.com | [3e89 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3e8a 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3e8b 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e8c 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 gate 1602702137950756200 evaluation succeeds +peer0.org1.example.com | [3e8d 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e8e 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e8f 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e90 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ead 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [411c 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411d 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [411e 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [411f 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d3 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d4 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d5 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40d6 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40d7 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [40d8 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [40d9 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [40da 10-14 19:02:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40db 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [40dc 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40dd 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e91 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e92 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e93 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e94 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3e95 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e96 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e97 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e98 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e99 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e9a 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9b 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e9d 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9c 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +peer0.org1.example.com | 00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +peer0.org1.example.com | [3e9e 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +peer0.org1.example.com | 00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +peer0.org1.example.com | 00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +peer0.org1.example.com | 00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +peer0.org1.example.com | 00000040 2d df 38 1a 14 c5 2d |-.8...-| +peer0.org1.example.com | [3e9f 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +peer0.org1.example.com | 00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +peer0.org1.example.com | [3ea0 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +peer0.org1.example.com | 00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +peer0.org1.example.com | 00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +peer0.org1.example.com | 00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +peer0.org1.example.com | 00000040 2a e4 27 d5 14 02 6b |*.'...k| +peer0.org1.example.com | [3ea1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ea2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ea3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ea4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4120 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4121 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4122 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4123 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4124 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4125 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4126 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 gate 1602702154683139700 evaluation starts +peer0.org2.example.com | [4127 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4128 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4129 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [412a 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 principal evaluation fails +peer0.org2.example.com | [412b 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489a810 gate 1602702154683139700 evaluation fails +peer0.org2.example.com | [412c 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [412d 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [412e 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [412f 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 gate 1602702154683555300 evaluation starts +peer0.org2.example.com | [4130 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4131 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4132 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 principal matched by identity 0 +peer0.org2.example.com | [4133 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [4134 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [4135 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4136 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489ad80 gate 1602702154683555300 evaluation succeeds +peer0.org2.example.com | [4137 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4138 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4139 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [413a 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [413b 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [413c 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [413d 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [413e 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [413f 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3eae 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eaf 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eb0 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eb1 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3eb2 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eb3 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eb4 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3eb5 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3eb6 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eb7 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3eb8 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eb9 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3eba 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ebb 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ebc 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ebd 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ebe 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ebf 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ec0 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3ec1 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ec2 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ec3 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ec4 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ec5 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ea7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ea8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ea9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 gate 1602702137974297200 evaluation starts +peer0.org1.example.com | [3eaa 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eab 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3eac 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ead 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 principal evaluation fails +peer0.org1.example.com | [3eae 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 gate 1602702137974297200 evaluation fails +peer0.org1.example.com | [3eaf 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3eb0 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3eb1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3eb2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 gate 1602702137975831900 evaluation starts +peer0.org1.example.com | [3eb3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eb4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3eb5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 principal matched by identity 0 +peer0.org1.example.com | [3eb6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +peer0.org1.example.com | 00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +peer0.org1.example.com | [3eb7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +peer0.org1.example.com | 00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +peer0.org1.example.com | 00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +peer0.org1.example.com | 00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +peer0.org1.example.com | 00000040 3a 97 fa 76 08 75 |:..v.u| +peer0.org1.example.com | [3eb8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3eb9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 gate 1602702137975831900 evaluation succeeds +peer0.org1.example.com | [3eba 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ebb 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ebc 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ebd 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ebe 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ebf 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec0 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ec1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ec2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ec3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ec4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ec5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ec6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 gate 1602702137979566100 evaluation starts +peer0.org1.example.com | [3ec7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ec8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ec9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3eca 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 principal evaluation fails +peer0.org1.example.com | [3ecb 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 gate 1602702137979566100 evaluation fails +peer0.org2.example.com | [4140 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4141 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4142 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4143 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 gate 1602702154691425200 evaluation starts +peer0.org2.example.com | [4144 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4145 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4146 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4147 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 principal evaluation fails +peer0.org2.example.com | [4148 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00489bf80 gate 1602702154691425200 evaluation fails +peer0.org2.example.com | [4149 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [414a 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [414b 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [414c 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 gate 1602702154699084100 evaluation starts +peer0.org2.example.com | [414d 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [414e 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [414f 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 principal matched by identity 0 +peer0.org2.example.com | [4150 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [4151 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [4152 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4153 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b64f0 gate 1602702154699084100 evaluation succeeds +peer0.org2.example.com | [4154 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4155 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4156 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4157 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4158 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [4159 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [415a 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [415b 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [415c 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [415d 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [415e 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [415f 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4160 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4161 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40de 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [40df 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer1.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer1.org2.example.com | [40e0 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer1.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer1.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer1.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer1.org2.example.com | [40e1 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [40e2 10-14 19:02:26.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 19 6e 59 b4 de 4b 34 e0 f8 e9 64 |0D. ".nY..K4...d| +peer1.org2.example.com | 00000010 57 2f 3a 70 34 af be a4 4e 1f d1 dd b5 4f 2e 70 |W/:p4...N....O.p| +peer1.org2.example.com | 00000020 87 4a 87 16 02 20 2a 86 63 f5 02 e7 f1 04 67 59 |.J... *.c.....gY| +peer1.org2.example.com | 00000030 1c 06 c7 c6 d0 a9 91 73 cf fd 96 e7 19 2a e1 c2 |.......s.....*..| +peer1.org2.example.com | 00000040 4c 46 c1 2b bd 16 |LF.+..| +peer1.org2.example.com | [40e3 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [40e4 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [40e5 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [40e6 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [40e7 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [40e8 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40e9 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ea 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40eb 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [40ec 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ed 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ee 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [40ef 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [40f0 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [40f1 10-14 19:02:26.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40f2 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40f3 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [40f4 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f5 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f7 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f8 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40f6 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [40f9 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [40fa 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [40fb 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [40fc 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [40fd 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [40fe 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [40ff 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4101 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4102 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4100 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4103 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4104 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4105 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4106 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ecc 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ecd 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ece 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ecf 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 gate 1602702137980753700 evaluation starts +peer0.org1.example.com | [3ed0 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ed1 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ed2 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 principal matched by identity 0 +peer0.org1.example.com | [3ed3 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +peer0.org1.example.com | 00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +peer0.org1.example.com | [3ed4 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +peer0.org1.example.com | 00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +peer0.org1.example.com | 00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +peer0.org1.example.com | 00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +peer0.org1.example.com | 00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +peer0.org1.example.com | [3ed5 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ed6 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 gate 1602702137980753700 evaluation succeeds +peer0.org1.example.com | [3ed7 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ed8 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ed9 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3eda 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3edb 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3edc 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3edd 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ede 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3edf 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee0 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee1 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee2 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee3 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee4 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee5 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee6 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ee7 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3ee8 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ee9 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3eea 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eeb 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3eec 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3ec6 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ec7 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ec8 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 gate 1602702150179875500 evaluation starts +peer1.org1.example.com | [3ec9 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3eca 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3ecb 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ecc 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 principal evaluation fails +peer1.org1.example.com | [3ecd 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1aa70 gate 1602702150179875500 evaluation fails +peer1.org1.example.com | [3ece 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ecf 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ed0 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ed1 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 gate 1602702150180218600 evaluation starts +peer1.org1.example.com | [3ed2 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ed3 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3ed4 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 principal matched by identity 0 +peer1.org1.example.com | [3ed5 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer1.org1.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer1.org1.example.com | [3ed6 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer1.org1.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer1.org1.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer1.org1.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer1.org1.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer1.org1.example.com | [3ed7 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ed8 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e1afe0 gate 1602702150180218600 evaluation succeeds +peer1.org1.example.com | [3ed9 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3eda 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3edb 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3edc 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3edd 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ede 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3edf 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3ee0 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3ee1 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3ee2 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee3 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee4 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ee5 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3ee6 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ee7 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ee8 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ee9 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3eea 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3eeb 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4162 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4163 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4164 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4165 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4166 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4167 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4168 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 gate 1602702154714741600 evaluation starts +peer0.org2.example.com | [4169 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [416a 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [416b 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [416c 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 principal evaluation fails +peer0.org2.example.com | [416d 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dc6c0 gate 1602702154714741600 evaluation fails +peer0.org2.example.com | [416e 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [416f 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4170 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4171 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 gate 1602702154716538600 evaluation starts +peer0.org2.example.com | [4172 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4173 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [4174 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 principal matched by identity 0 +peer0.org2.example.com | [4175 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer0.org2.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer0.org2.example.com | [4176 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer0.org2.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer0.org2.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer0.org2.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer0.org2.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer0.org2.example.com | [4177 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4178 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dcc30 gate 1602702154716538600 evaluation succeeds +peer0.org2.example.com | [4179 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [417a 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [417b 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [417c 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [417d 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [417e 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [417f 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4180 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4181 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4182 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4183 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4184 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4185 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4186 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4187 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4188 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4189 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [418a 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [418b 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [418c 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [418d 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [418e 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [418f 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4190 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4191 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4192 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4193 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4194 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4195 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4196 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4197 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 gate 1602702154734817100 evaluation starts +peer0.org2.example.com | [4198 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4199 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [419a 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [419b 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 principal evaluation fails +peer0.org2.example.com | [419c 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b0d0 gate 1602702154734817100 evaluation fails +peer0.org2.example.com | [419d 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [419e 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [419f 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41a0 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 gate 1602702154735654500 evaluation starts +peer0.org2.example.com | [41a1 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41a2 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [41a3 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 principal matched by identity 0 +peer0.org2.example.com | [41a4 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org2.example.com | [41a5 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org2.example.com | [41a6 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41a7 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41a8 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41a9 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [41aa 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486b640 gate 1602702154735654500 evaluation succeeds +peer0.org2.example.com | [41ab 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41ac 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41ad 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41ae 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41af 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41b0 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41b1 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41b2 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41b3 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41b4 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41b5 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41b6 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [41b7 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 gate 1602702154743919900 evaluation starts +peer0.org2.example.com | [41b8 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41b9 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [41ba 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41bb 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [41bc 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 principal evaluation fails +peer0.org2.example.com | [41bd 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912840 gate 1602702154743919900 evaluation fails +peer0.org2.example.com | [41be 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41bf 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [41c0 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41c1 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41c2 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41c3 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 gate 1602702154758508000 evaluation starts +peer0.org2.example.com | [41c4 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41c5 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [41c6 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 principal matched by identity 0 +peer0.org2.example.com | [41c7 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org2.example.com | [41c8 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org2.example.com | [41c9 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41ca 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [41cb 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004912db0 gate 1602702154758508000 evaluation succeeds +peer0.org2.example.com | [41cc 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41cd 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41ce 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41cf 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41d0 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41d1 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org2.example.com | [41d2 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org2.example.com | [41d3 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d4 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org2.example.com | [41d5 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org2.example.com | [41d6 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41d7 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d8 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [41d9 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41da 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41db 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41dc 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41dd 10-14 19:02:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41de 10-14 19:02:34.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41df 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [41e0 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3eed 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3eee 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3eef 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef0 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ef1 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3ef2 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3ef3 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ef4 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 gate 1602702138158144300 evaluation starts +peer0.org1.example.com | [3ef5 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ef6 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ef7 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ef8 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 principal evaluation fails +peer0.org1.example.com | [3ef9 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 gate 1602702138158144300 evaluation fails +peer0.org1.example.com | [3efa 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3efb 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3efc 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3efd 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 gate 1602702138158771200 evaluation starts +peer0.org1.example.com | [3efe 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eff 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3f00 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 principal matched by identity 0 +peer0.org1.example.com | [3f01 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer0.org1.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer0.org1.example.com | [3f02 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer0.org1.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer0.org1.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer0.org1.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer0.org1.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer0.org1.example.com | [3f03 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f04 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 gate 1602702138158771200 evaluation succeeds +peer0.org1.example.com | [3f05 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f06 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f07 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f08 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f09 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f0a 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3f0b 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f0c 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f0d 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3f0e 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f0f 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f10 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f11 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [3f12 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e1 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [41e2 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41e3 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [41e4 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [41e5 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41e6 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [41e7 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [41e8 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e9 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41ea 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41eb 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41ec 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41ed 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41ee 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [41ef 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 gate 1602702154803821200 evaluation starts +peer0.org2.example.com | [41f0 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41f1 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [41f2 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [41f3 10-14 19:02:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 principal evaluation fails +peer0.org2.example.com | [41f4 10-14 19:02:34.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049379d0 gate 1602702154803821200 evaluation fails +peer0.org2.example.com | [41f5 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41f6 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41f7 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41f8 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 gate 1602702154824975300 evaluation starts +peer0.org2.example.com | [41f9 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41fa 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 processing identity 0 with bytes of 115a6c0 +peer0.org2.example.com | [41fb 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 principal matched by identity 0 +peer0.org2.example.com | [41fc 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 1a c9 aa 0e a0 c8 a0 f4 40 10 dc c7 69 0a dc |.........@...i..| +peer0.org2.example.com | 00000010 4a 10 32 ca 5b 61 a6 d6 55 69 b6 24 6b fe 41 fc |J.2.[a..Ui.$k.A.| +peer0.org2.example.com | [41fd 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 5e fc 9c 1a 86 51 94 43 88 9d |0D. xD^....Q.C..| +peer0.org2.example.com | 00000010 a4 02 40 2e 67 ca 4b 9a 59 dc 7f d7 dc 55 66 94 |..@.g.K.Y....Uf.| +peer0.org2.example.com | 00000020 7e 1f bf e0 02 20 6c 36 dc 0d 7c 63 4e b5 e4 77 |~.... l6..|cN..w| +peer0.org2.example.com | 00000030 80 f2 15 d6 32 ad 34 98 69 f2 14 72 92 1e 5b 6e |....2.4.i..r..[n| +peer0.org2.example.com | 00000040 65 e8 f8 e1 fa 82 |e.....| +peer0.org2.example.com | [41fe 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41ff 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004937f40 gate 1602702154824975300 evaluation succeeds +peer0.org2.example.com | [4200 10-14 19:02:34.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4201 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4202 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4203 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4204 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4205 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4206 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4207 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4208 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4209 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [420a 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [420b 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [420c 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [420d 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [420e 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [420f 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4210 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4211 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4212 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4213 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3f13 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f14 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f15 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f16 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > alive: +peer0.org1.example.com | [3f17 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f18 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f19 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f1a 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f1b 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f1c 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1d 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1e 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1f 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f20 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f21 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f22 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3f23 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f24 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f25 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [3f26 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [3f27 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f28 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f29 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f2a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f2b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f2c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f2d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f2e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3f2f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 gate 1602702138263336000 evaluation starts +peer0.org1.example.com | [3f30 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4107 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4108 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4109 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [410a 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [410b 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [410c 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [410d 10-14 19:02:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [410e 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [410f 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161038 +peer1.org2.example.com | [4110 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2057AEF9FFEBCAF97964477730D410CFAF6238A24E01FDF82F1B2C3888750B0D +peer1.org2.example.com | [4111 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4112 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4113 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4114 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4115 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eec 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > +peer1.org1.example.com | [3eed 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3eee 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eef 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ef0 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3ef1 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ef2 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ef3 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ef4 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ef5 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ef6 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ef7 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ef8 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 gate 1602702150213509600 evaluation starts +peer1.org1.example.com | [3ef9 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3efa 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3efb 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3efc 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 principal evaluation fails +peer1.org1.example.com | [3efd 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e42cb0 gate 1602702150213509600 evaluation fails +peer1.org1.example.com | [3efe 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3eff 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f00 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f01 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 gate 1602702150213908600 evaluation starts +peer1.org1.example.com | [3f02 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f03 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f04 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 principal matched by identity 0 +peer1.org1.example.com | [3f05 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 f6 04 cd 9b 51 7c ab 98 b4 8f 30 cf de 0c 59 |f....Q|....0...Y| +peer1.org1.example.com | 00000010 12 b8 0b 70 40 6d f4 a8 91 74 03 01 9b 9e 64 3d |...p@m...t....d=| +peer1.org1.example.com | [3f06 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 2e a9 99 f1 3d 4b 1e e0 1d 00 bf |0D. .....=K.....| +peer1.org1.example.com | 00000010 0d 05 9b 41 66 b0 39 ff ca 77 b5 68 03 35 b4 d6 |...Af.9..w.h.5..| +peer1.org1.example.com | 00000020 61 a3 c8 89 02 20 29 85 1a b2 ac 78 ca 20 da c5 |a.... )....x. ..| +peer1.org1.example.com | 00000030 e1 b1 a4 03 a8 be ed 44 96 ca f6 70 5c 9b 29 b8 |.......D...p\.).| +peer1.org1.example.com | 00000040 19 0f c9 e0 2f e8 |..../.| +peer1.org1.example.com | [3f07 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f08 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e43220 gate 1602702150213908600 evaluation succeeds +peer1.org1.example.com | [3f09 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f0a 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f0b 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f0c 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f0d 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3f0e 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f0f 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f10 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f11 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f12 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f13 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3f14 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3f15 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3f16 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f17 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f18 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3f19 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1a 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1b 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1c 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f1d 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f1e 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f1f 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3f20 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3f21 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3f22 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3f23 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f24 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f25 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f26 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f27 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f28 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f29 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f2a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f2b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 gate 1602702150236064700 evaluation starts +peer0.org1.example.com | [3f31 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3f32 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [3f33 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [3f34 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [3f35 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 principal matched by identity 0 +peer0.org1.example.com | [3f36 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [3f37 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [3f38 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f39 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 gate 1602702138263336000 evaluation succeeds +peer0.org1.example.com | [3f3a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f3b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f3c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f3d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f3e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f3f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f40 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f41 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [3f42 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f43 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f44 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f45 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f46 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f47 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f48 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f49 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3f4a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [3f4b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [3f4c 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f4d 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f4e 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f4f 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f50 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4116 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4117 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [4118 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4119 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [411a 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [411b 10-14 19:02:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [411c 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [411d 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [411e 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [411f 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [4120 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4121 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [4122 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4123 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer1.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer1.org2.example.com | [4124 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer1.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer1.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer1.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer1.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer1.org2.example.com | [4125 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4126 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 94 5b 7f 6d 67 56 fe 7c d5 60 a2 |0D. l.[.mgV.|.`.| +peer1.org2.example.com | 00000010 97 99 9c e9 a6 a7 f3 67 df 3a b5 06 25 91 21 2d |.......g.:..%.!-| +peer1.org2.example.com | 00000020 18 30 14 9d 02 20 09 79 e0 54 ef 12 9e b4 a1 e2 |.0... .y.T......| +peer1.org2.example.com | 00000030 73 f2 88 38 9a b9 87 37 c6 1c 0d 4c 00 b4 6e 31 |s..8...7...L..n1| +peer1.org2.example.com | 00000040 ea f4 8d 08 f8 61 |.....a| +peer1.org2.example.com | [4127 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4128 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4129 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f2c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f2d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f2e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f2f 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f30 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f31 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f32 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f33 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3f34 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f35 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f36 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3f37 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f38 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f39 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 principal evaluation fails +peer1.org1.example.com | [3f3a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e65db0 gate 1602702150236064700 evaluation fails +peer1.org1.example.com | [3f3b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f3c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f3d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f3e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 gate 1602702150238503400 evaluation starts +peer1.org1.example.com | [3f3f 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f40 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f41 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 principal matched by identity 0 +peer1.org1.example.com | [3f42 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3f43 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3f44 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f45 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8e320 gate 1602702150238503400 evaluation succeeds +peer1.org1.example.com | [3f46 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f47 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f48 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f49 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f4a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f4b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f51 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f52 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3f53 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f54 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f55 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f56 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f57 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f58 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f59 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f5a 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 gate 1602702138289085700 evaluation starts +peer0.org1.example.com | [3f5b 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f5c 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3f5d 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3f5e 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 principal evaluation fails +peer0.org1.example.com | [3f5f 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 gate 1602702138289085700 evaluation fails +peer0.org1.example.com | [3f60 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f61 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f62 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f63 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 gate 1602702138289798500 evaluation starts +peer0.org1.example.com | [3f64 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f65 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3f66 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 principal matched by identity 0 +peer0.org1.example.com | [3f67 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer0.org1.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer0.org1.example.com | [3f68 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer0.org1.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer0.org1.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer0.org1.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer0.org1.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer0.org1.example.com | [3f69 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f6a 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 gate 1602702138289798500 evaluation succeeds +peer0.org1.example.com | [3f6b 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6c 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6d 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f6e 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f4c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f4d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f4e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f4f 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f50 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f51 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f52 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 gate 1602702150239516400 evaluation starts +peer1.org1.example.com | [3f53 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f54 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f55 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f56 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 principal evaluation fails +peer1.org1.example.com | [3f57 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8f520 gate 1602702150239516400 evaluation fails +peer1.org1.example.com | [3f58 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f59 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f5a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f5b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 gate 1602702150239840000 evaluation starts +peer1.org1.example.com | [3f5c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f5d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f5e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f5f 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 principal matched by identity 0 +peer1.org1.example.com | [3f60 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3f61 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3f62 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f63 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f64 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e8fa90 gate 1602702150239840000 evaluation succeeds +peer1.org1.example.com | [3f65 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f66 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f67 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3f68 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f69 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f6a 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f6b 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f6c 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f6d 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f6e 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3f6f 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3f70 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3f71 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3f72 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f73 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f74 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f75 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f76 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f77 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f78 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f79 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f7a 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 gate 1602702150263420400 evaluation starts +peer1.org1.example.com | [3f7b 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [412a 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412b 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [412c 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412d 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [412e 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [412f 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer1.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer1.org2.example.com | [4130 10-14 19:02:26.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer1.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer1.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer1.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer1.org2.example.com | [4131 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4132 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4133 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4134 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer1.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer1.org2.example.com | [4135 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer1.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer1.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer1.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer1.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer1.org2.example.com | [4136 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4137 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4138 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4139 10-14 19:02:26.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [413a 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [413b 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [413c 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [413d 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [413e 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [413f 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer1.org2.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer1.org2.example.com | [4140 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer1.org2.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer1.org2.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer1.org2.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer1.org2.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer1.org2.example.com | [4141 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4142 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4143 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4144 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4145 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer1.org2.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer1.org2.example.com | [4146 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer1.org2.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer1.org2.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer1.org2.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer1.org2.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org1.example.com | [3f6f 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f70 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3f71 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f72 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f73 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3f74 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f75 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f76 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f77 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3f78 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f79 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7a 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f7b 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f7c 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3f7d 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f7e 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f7f 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [3f80 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [3f81 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [3f82 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3f83 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f84 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3f85 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f86 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3f87 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f88 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f89 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8a 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f8c 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8b 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f8d 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f8e 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f8f 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f90 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f91 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f92 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f93 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f94 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f95 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f96 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f97 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f98 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f99 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f9a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f9b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f9c 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f9d 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f9e 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f9f 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fa0 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fa1 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3fa2 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 gate 1602702138579128100 evaluation starts +peer1.org1.example.com | [3f7c 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f7d 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f7e 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 principal evaluation fails +peer1.org1.example.com | [3f7f 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea9cc0 gate 1602702150263420400 evaluation fails +peer1.org1.example.com | [3f80 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f81 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f82 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f83 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 gate 1602702150264155700 evaluation starts +peer1.org1.example.com | [3f84 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f85 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f86 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 principal matched by identity 0 +peer1.org1.example.com | [3f87 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3f88 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3f89 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f8a 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8230 gate 1602702150264155700 evaluation succeeds +peer1.org1.example.com | [3f8b 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f8c 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f8d 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f8e 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f8f 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f90 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f91 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f92 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f93 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f94 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f95 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f96 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f97 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 gate 1602702150268008300 evaluation starts +peer1.org1.example.com | [3f98 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f99 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3f9a 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f9b 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 principal evaluation fails +peer1.org1.example.com | [3f9c 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9430 gate 1602702150268008300 evaluation fails +peer1.org1.example.com | [3f9d 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f9e 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f9f 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3fa0 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 gate 1602702150269559600 evaluation starts +peer1.org1.example.com | [3fa1 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fa2 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3fa3 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 principal matched by identity 0 +peer1.org1.example.com | [3fa4 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3fa5 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3fa6 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3fa7 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec99a0 gate 1602702150269559600 evaluation succeeds +peer1.org1.example.com | [3fa8 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fa9 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3faa 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fab 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3fac 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fad 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fae 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3faf 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [3fb0 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | [3fa3 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fa4 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fa5 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3fa6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 principal evaluation fails +peer0.org1.example.com | [3fa7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 gate 1602702138579128100 evaluation fails +peer0.org1.example.com | [3fa8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3fa9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3faa 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3fab 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 gate 1602702138580846600 evaluation starts +peer0.org1.example.com | [3fac 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fad 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fae 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 principal matched by identity 0 +peer0.org1.example.com | [3faf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [3fb0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [3fb1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3fb2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 gate 1602702138580846600 evaluation succeeds +peer0.org1.example.com | [3fb3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fb4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fb5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3fb6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3fb7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fb8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fb9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fba 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fbb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fbc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fbd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3fbe 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 gate 1602702138581484800 evaluation starts +peer0.org1.example.com | [3fbf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fc0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fc1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3fc2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 principal evaluation fails +peer0.org1.example.com | [3fc3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 gate 1602702138581484800 evaluation fails +peer0.org1.example.com | [3fc4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3fc5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3fc6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3fc7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 gate 1602702138584067400 evaluation starts +peer0.org1.example.com | [3fc8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fc9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fca 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 principal matched by identity 0 +peer0.org1.example.com | [3fcb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [3fcc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [3fcd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3fce 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 gate 1602702138584067400 evaluation succeeds +peer0.org1.example.com | [3fcf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fd0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fd1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4147 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4148 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4149 10-14 19:02:26.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [414a 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [414b 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [414c 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [414d 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [414e 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [414f 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4150 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4151 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4152 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4153 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [4154 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4155 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4156 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4157 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4158 10-14 19:02:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4159 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [415a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [415b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [415c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [415d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [415e 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [415f 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4160 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4161 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 gate 1602702146530879800 evaluation starts +peer1.org2.example.com | [4162 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4163 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fd2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3fd3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fd4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [3fd7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fd9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fda 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fdc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fde 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fdf 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fe0 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fe1 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fe2 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fe3 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe4 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3fe5 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fe6 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fe7 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fe8 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fe9 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3fea 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 gate 1602702138600484000 evaluation starts +peer0.org1.example.com | [3feb 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fec 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3fed 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3fee 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 principal evaluation fails +peer0.org1.example.com | [3fef 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 gate 1602702138600484000 evaluation fails +peer0.org1.example.com | [3ff0 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ff1 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ff2 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ff3 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 gate 1602702138602790500 evaluation starts +peer0.org1.example.com | [3ff4 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ff5 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [3ff7 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 principal matched by identity 0 +peer0.org1.example.com | [3ff6 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ff8 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161035 +peer0.org1.example.com | [3ff9 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DB6128421050D540350C3A6B41F935DB070C52B5B53CBCA29845B3A2ACD3D8EA +peer0.org1.example.com | [3ffa 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ffc 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3ffd 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3ffb 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [3ffe 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3fff 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4000 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4001 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4002 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4003 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4004 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 gate 1602702138602790500 evaluation succeeds +peer0.org1.example.com | [4005 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4006 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4007 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4008 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4009 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4164 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4165 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 principal evaluation fails +peer1.org2.example.com | [4166 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290b70 gate 1602702146530879800 evaluation fails +peer1.org2.example.com | [4167 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4168 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4169 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [416a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 gate 1602702146534110500 evaluation starts +peer1.org2.example.com | [416b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [416c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [416d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [416e 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 principal evaluation fails +peer1.org2.example.com | [416f 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042910e0 gate 1602702146534110500 evaluation fails +peer1.org2.example.com | [4170 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4171 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4172 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4173 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 gate 1602702146535030400 evaluation starts +peer1.org2.example.com | [4174 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4175 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4176 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 principal matched by identity 0 +peer1.org2.example.com | [4177 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer1.org2.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer1.org2.example.com | [4178 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer1.org2.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer1.org2.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer1.org2.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer1.org2.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer1.org2.example.com | [4179 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [417a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291650 gate 1602702146535030400 evaluation succeeds +peer1.org2.example.com | [417b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [417c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [417d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [417e 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [417f 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4180 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4181 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4182 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4183 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4184 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4185 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4186 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4187 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4188 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4189 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418a 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [418b 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [418c 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [418d 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [3fb1 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [3fb2 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [3fb3 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb4 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb5 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3fb6 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fb7 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fb8 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fb9 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fba 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3fbb 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 gate 1602702150277692900 evaluation starts +peer1.org1.example.com | [3fbc 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fbd 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3fbe 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3fbf 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 principal evaluation fails +peer1.org1.example.com | [3fc0 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eebbe0 gate 1602702150277692900 evaluation fails +peer1.org1.example.com | [3fc1 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fc2 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fc3 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3fc4 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 gate 1602702150278134800 evaluation starts +peer1.org1.example.com | [3fc5 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fc6 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3fc7 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 principal matched by identity 0 +peer1.org1.example.com | [3fc8 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [3fc9 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [3fca 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3fcb 10-14 19:02:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f08150 gate 1602702150278134800 evaluation succeeds +peer1.org1.example.com | [3fcc 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fcd 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fce 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fcf 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [400a 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [400b 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [400c 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [400d 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [400e 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [400f 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4010 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4011 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4012 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4013 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4014 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4015 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4016 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4017 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4018 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4019 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [401a 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [401b 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [401c 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [401d 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [401e 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 gate 1602702138616833200 evaluation starts +peer0.org1.example.com | [401f 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4020 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4021 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4022 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 principal evaluation fails +peer0.org1.example.com | [4023 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 gate 1602702138616833200 evaluation fails +peer0.org1.example.com | [4024 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4025 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4026 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [418e 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [418f 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4190 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4191 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4192 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4193 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4194 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4195 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4196 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4197 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4198 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4199 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [419a 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [419b 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [419c 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [419d 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [419e 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [419f 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [41a0 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [41a1 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a2 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [41a3 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41a4 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41a5 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [41a6 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [41a7 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [41a8 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 gate 1602702146630332300 evaluation starts +peer1.org2.example.com | [41a9 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41aa 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [41ab 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [41ac 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 principal evaluation fails +peer1.org2.example.com | [41ad 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab3c0 gate 1602702146630332300 evaluation fails +peer1.org2.example.com | [41ae 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41af 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41b0 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [41b1 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 gate 1602702146630674600 evaluation starts +peer1.org2.example.com | [41b2 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41b3 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [41b4 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [41b5 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 principal evaluation fails +peer1.org2.example.com | [41b6 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ab930 gate 1602702146630674600 evaluation fails +peer1.org2.example.com | [41b7 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41b8 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41b9 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [41ba 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 gate 1602702146631621500 evaluation starts +peer1.org2.example.com | [41bb 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41bc 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [41bd 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 principal matched by identity 0 +peer1.org2.example.com | [41be 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer1.org2.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer1.org2.example.com | [41bf 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer1.org2.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer1.org2.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer1.org2.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer1.org2.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer1.org2.example.com | [41c0 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [41c1 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042abea0 gate 1602702146631621500 evaluation succeeds +peer1.org2.example.com | [41c2 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41c3 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41c4 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [41c5 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [41c6 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [41c7 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [41c8 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [41c9 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [41ca 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [41cb 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41cc 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41cd 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [41ce 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41cf 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d0 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41d1 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41d2 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive: +peer1.org2.example.com | [41d3 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [41d4 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41d5 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41d6 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [41d7 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [41d8 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [41d9 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41da 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41db 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41dc 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [41dd 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41de 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41df 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e0 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e1 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e2 10-14 19:02:26.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e3 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e4 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e5 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41e6 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41e7 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [41e8 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4027 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 gate 1602702138617071500 evaluation starts +peer0.org1.example.com | [4028 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4029 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [402a 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 principal matched by identity 0 +peer0.org1.example.com | [402b 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +peer0.org1.example.com | 00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +peer0.org1.example.com | [402c 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +peer0.org1.example.com | 00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +peer0.org1.example.com | 00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +peer0.org1.example.com | 00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +peer0.org1.example.com | 00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +peer0.org1.example.com | [402d 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [402e 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 gate 1602702138617071500 evaluation succeeds +peer0.org1.example.com | [402f 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4030 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4031 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4032 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4033 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4034 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4035 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4036 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer0.org1.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer0.org1.example.com | [4037 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer0.org1.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer0.org1.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer0.org1.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer0.org1.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer0.org1.example.com | [4038 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4039 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [403a 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [403b 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [403c 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer0.org1.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer0.org1.example.com | [403d 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer0.org1.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer0.org1.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer0.org1.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer0.org1.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer0.org1.example.com | [403e 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [403f 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4040 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4041 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4042 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4043 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e9 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41ea 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [41eb 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [41ec 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [41ed 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 gate 1602702146882484100 evaluation starts +peer1.org2.example.com | [41ee 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41ef 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [41f0 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [41f1 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 principal evaluation fails +peer1.org2.example.com | [41f2 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e180 gate 1602702146882484100 evaluation fails +peer1.org2.example.com | [41f3 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41f4 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [41f5 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [41f6 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 gate 1602702146882783300 evaluation starts +peer1.org2.example.com | [41f7 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41f8 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [41f9 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [41fa 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 principal evaluation fails +peer1.org2.example.com | [41fb 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431e6f0 gate 1602702146882783300 evaluation fails +peer1.org2.example.com | [41fc 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41fd 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41fe 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [41ff 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 gate 1602702146883071600 evaluation starts +peer1.org2.example.com | [4200 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4201 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4202 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 principal matched by identity 0 +peer1.org2.example.com | [4203 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [4204 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [4205 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4206 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ec60 gate 1602702146883071600 evaluation succeeds +peer1.org2.example.com | [4207 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4208 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4209 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [420a 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [420b 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [420c 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [420d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [420e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [420f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4210 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4211 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4212 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4213 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 gate 1602702146883917700 evaluation starts +peer1.org2.example.com | [4214 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4215 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4216 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4217 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 principal evaluation fails +peer1.org2.example.com | [4218 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431fe60 gate 1602702146883917700 evaluation fails +peer1.org2.example.com | [4219 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [421a 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [421b 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [421c 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 gate 1602702146884177900 evaluation starts +peer1.org2.example.com | [421d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [421e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [421f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4220 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 principal evaluation fails +peer1.org2.example.com | [4221 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a3d0 gate 1602702146884177900 evaluation fails +peer1.org2.example.com | [4222 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4223 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4224 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4225 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 gate 1602702146884521800 evaluation starts +peer1.org2.example.com | [4226 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4227 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4228 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 principal matched by identity 0 +peer1.org2.example.com | [4229 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [422a 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [422b 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [422c 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433a940 gate 1602702146884521800 evaluation succeeds +peer1.org2.example.com | [422d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [422e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [422f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4230 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4231 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [4232 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [4233 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [4234 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [4235 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4236 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [4237 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4238 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4239 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4044 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4045 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4046 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4047 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4048 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4049 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [404a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [404b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer0.org1.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer0.org1.example.com | [404c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer0.org1.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer0.org1.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer0.org1.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer0.org1.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer0.org1.example.com | [404d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [404e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d3 e7 f3 ed 51 49 52 b6 94 7c 23 |0D. w....QIR..|#| +peer0.org1.example.com | 00000010 e2 b6 6e d7 e6 f3 f0 74 5d 1f c2 f9 18 ad 87 dc |..n....t].......| +peer0.org1.example.com | 00000020 07 7d cd 95 02 20 22 1e 0f 03 99 71 c5 5b da 82 |.}... "....q.[..| +peer0.org1.example.com | 00000030 36 32 6d f2 0b 0f 04 e4 1e 6d 4e 7f de 2d 25 70 |62m......mN..-%p| +peer0.org1.example.com | 00000040 3f 84 3f 9d 16 de |?.?...| +peer0.org1.example.com | [404f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4050 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4051 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4052 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4053 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4054 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4055 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4056 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4057 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4058 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4059 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [405a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [405b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [405c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [405d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [405e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 gate 1602702138669390400 evaluation starts +peer0.org1.example.com | [405f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4060 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4061 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4062 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 principal evaluation fails +peer0.org1.example.com | [4063 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 gate 1602702138669390400 evaluation fails +peer0.org1.example.com | [4064 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4065 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4066 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4067 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 gate 1602702138669778300 evaluation starts +peer0.org1.example.com | [4068 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4069 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [406a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 principal matched by identity 0 +peer0.org1.example.com | [406b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +peer0.org1.example.com | 00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +peer0.org1.example.com | [406c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +peer0.org1.example.com | 00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +peer0.org1.example.com | 00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +peer0.org1.example.com | 00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +peer0.org1.example.com | 00000040 93 c7 3a a4 5c c6 |..:.\.| +peer0.org1.example.com | [406d 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [406e 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 gate 1602702138669778300 evaluation succeeds +peer0.org1.example.com | [406f 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4070 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4071 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4072 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4073 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4074 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4075 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4076 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +peer0.org1.example.com | 00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +peer0.org1.example.com | [4077 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +peer0.org1.example.com | 00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +peer0.org1.example.com | 00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +peer1.org1.example.com | [3fd0 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fd1 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fd2 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3fd3 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fd4 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fd5 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fd6 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fd7 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3fd8 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 gate 1602702150288140000 evaluation starts +peer1.org1.example.com | [3fd9 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fda 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3fdb 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3fdc 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 principal evaluation fails +peer1.org1.example.com | [3fdd 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e86b20 gate 1602702150288140000 evaluation fails +peer1.org1.example.com | [3fde 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fdf 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3fe0 10-14 19:02:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3fe1 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 gate 1602702150290019100 evaluation starts +peer1.org1.example.com | [3fe2 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fe3 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [3fe4 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 principal matched by identity 0 +peer1.org1.example.com | [3fe5 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [3fe6 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [3fe7 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3fe8 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e87090 gate 1602702150290019100 evaluation succeeds +peer1.org1.example.com | [3fe9 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3fea 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3feb 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fec 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3fed 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fee 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fef 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ff0 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ff1 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ff2 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ff3 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ff4 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [423a 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [423b 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [423c 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [423d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [423e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [423f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4240 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 gate 1602702146888912600 evaluation starts +peer1.org2.example.com | [4241 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4242 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4243 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4244 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 principal evaluation fails +peer1.org2.example.com | [4245 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004350b70 gate 1602702146888912600 evaluation fails +peer1.org2.example.com | [4246 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4247 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4248 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4249 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 gate 1602702146889429000 evaluation starts +peer1.org2.example.com | [424a 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [424b 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [424c 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [424d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 principal evaluation fails +peer1.org2.example.com | [424e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043510e0 gate 1602702146889429000 evaluation fails +peer1.org2.example.com | [424f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4250 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4251 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4252 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 gate 1602702146889748500 evaluation starts +peer1.org2.example.com | [4253 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4254 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4255 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 principal matched by identity 0 +peer1.org2.example.com | [4256 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [4257 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [4258 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4259 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004351650 gate 1602702146889748500 evaluation succeeds +peer1.org2.example.com | [425a 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [425b 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [425c 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [425d 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [425e 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [425f 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4260 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4261 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4262 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4263 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4264 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4265 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4266 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 gate 1602702146892902300 evaluation starts +peer1.org2.example.com | [4267 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4268 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4269 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [426a 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 principal evaluation fails +peer1.org2.example.com | [426b 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374850 gate 1602702146892902300 evaluation fails +peer1.org2.example.com | [426c 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [426d 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [426e 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [426f 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 gate 1602702146893429400 evaluation starts +peer1.org2.example.com | [4270 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4271 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4272 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4273 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 principal evaluation fails +peer1.org2.example.com | [4274 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004374dc0 gate 1602702146893429400 evaluation fails +peer1.org2.example.com | [4275 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4276 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4277 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4278 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 gate 1602702146893798200 evaluation starts +peer1.org2.example.com | [4279 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [427a 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [427b 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 principal matched by identity 0 +peer1.org2.example.com | [427c 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [427d 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [427e 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [427f 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004375330 gate 1602702146893798200 evaluation succeeds +peer1.org2.example.com | [4280 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4281 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4282 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4283 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4284 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [4285 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [4286 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [4287 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +peer0.org1.example.com | 00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +peer0.org1.example.com | [4078 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4079 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407a 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [407b 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +peer0.org1.example.com | 00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +peer0.org1.example.com | [407c 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +peer0.org1.example.com | 00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +peer0.org1.example.com | 00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +peer0.org1.example.com | 00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +peer0.org1.example.com | 00000040 95 6b b7 20 3f 79 |.k. ?y| +peer0.org1.example.com | [407d 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [407e 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [407f 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4080 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4081 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ff5 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ff6 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3ff7 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ff8 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ff9 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ffa 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ffb 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ffc 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ffd 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ffe 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fff 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4000 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4001 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4002 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4003 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4004 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4005 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4006 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4007 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4008 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4009 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [400a 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [400b 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 gate 1602702150319846300 evaluation starts +peer1.org1.example.com | [400c 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [4288 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4289 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [428a 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428b 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428c 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428d 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [428e 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [428f 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4290 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4291 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4292 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4293 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 gate 1602702146897413100 evaluation starts +peer1.org2.example.com | [4294 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4295 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4296 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4297 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 principal evaluation fails +peer1.org2.example.com | [4298 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d560 gate 1602702146897413100 evaluation fails +peer1.org2.example.com | [4299 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [429a 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [429b 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [429c 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 gate 1602702146899737800 evaluation starts +peer1.org2.example.com | [429d 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [429e 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [429f 10-14 19:02:26.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [42a0 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 principal evaluation fails +peer1.org2.example.com | [42a1 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438dad0 gate 1602702146899737800 evaluation fails +peer1.org2.example.com | [42a2 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42a3 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42a4 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [42a5 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 gate 1602702146900270000 evaluation starts +peer1.org2.example.com | [42a6 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42a7 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [42a8 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 principal matched by identity 0 +peer1.org2.example.com | [42a9 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [42aa 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [42ab 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [42ac 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a2040 gate 1602702146900270000 evaluation succeeds +peer1.org2.example.com | [42ad 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42ae 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42af 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42b0 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42b1 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42b2 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42b3 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [42b4 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42b5 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42b6 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [42b7 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [42b8 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [42b9 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 gate 1602702146901844500 evaluation starts +peer1.org2.example.com | [42ba 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42bb 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [42bc 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [42bd 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 principal evaluation fails +peer1.org2.example.com | [42be 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3240 gate 1602702146901844500 evaluation fails +peer1.org2.example.com | [42bf 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [42c0 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [42c1 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [42c2 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 gate 1602702146902151100 evaluation starts +peer1.org2.example.com | [42c3 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42c4 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [42c5 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [42c6 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 principal evaluation fails +peer1.org1.example.com | [400d 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [400e 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [400f 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 principal evaluation fails +peer1.org1.example.com | [4010 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb250 gate 1602702150319846300 evaluation fails +peer1.org1.example.com | [4011 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4012 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4013 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4014 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 gate 1602702150320940100 evaluation starts +peer1.org1.example.com | [4015 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4016 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4017 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 principal matched by identity 0 +peer1.org1.example.com | [4018 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer1.org1.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer1.org1.example.com | [4019 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer1.org1.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer1.org1.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer1.org1.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer1.org1.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer1.org1.example.com | [401a 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [401b 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035eb7c0 gate 1602702150320940100 evaluation succeeds +peer1.org1.example.com | [401c 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [401d 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [401e 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [401f 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4020 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4021 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4022 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4023 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4024 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4025 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4026 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4027 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4028 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [4029 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [402a 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [402b 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [402c 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [402d 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [402e 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [402f 10-14 19:02:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > +peer0.org1.example.com | [4082 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4083 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4084 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4085 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4086 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4087 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [4088 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [4089 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [408a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [408b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [408c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [408d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [408e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [408f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4090 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 gate 1602702138918919400 evaluation starts +peer0.org1.example.com | [4091 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4092 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4093 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4094 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 principal evaluation fails +peer0.org1.example.com | [4095 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 gate 1602702138918919400 evaluation fails +peer0.org1.example.com | [4096 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4097 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4098 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4099 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 gate 1602702138919264000 evaluation starts +peer0.org1.example.com | [409a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [409b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [409c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 principal matched by identity 0 +peer0.org1.example.com | [409d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [409e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [409f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40a0 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 gate 1602702138919264000 evaluation succeeds +peer0.org1.example.com | [40a1 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40a2 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40a3 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40a4 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40a5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40a7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40a8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40a9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40aa 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40ab 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [40ac 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 gate 1602702138920360000 evaluation starts +peer0.org1.example.com | [40ad 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40ae 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40af 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [40b0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 principal evaluation fails +peer0.org1.example.com | [40b1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 gate 1602702138920360000 evaluation fails +peer0.org1.example.com | [40b2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40b3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40b4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40b5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 gate 1602702138925977700 evaluation starts +peer0.org1.example.com | [40b6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40b7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40b8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 principal matched by identity 0 +peer0.org1.example.com | [40b9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [40ba 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [40bb 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [40bc 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40bd 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 gate 1602702138925977700 evaluation succeeds +peer0.org1.example.com | [40be 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40bf 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40c0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40c1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40c2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40c3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [40c4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4030 10-14 19:02:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [4031 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4032 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4033 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [4034 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4035 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4036 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4037 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [4038 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4039 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [403a 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [403b 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [403c 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [403d 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161040 +peer1.org1.example.com | [403e 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 495B8B8F4B7DC7231B45B9D5FA10E5D4A01843738E23C3FE3377AEBFACA7E009 +peer1.org1.example.com | [403f 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4040 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [4041 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [4042 10-14 19:02:30.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [4043 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4044 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4045 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4046 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4047 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4048 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4049 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [404a 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [404b 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [404c 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [404d 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [404e 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [404f 10-14 19:02:30.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4050 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [4051 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4052 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [4053 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4054 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [4055 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4056 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4057 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4058 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4059 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [405a 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [42c7 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a37b0 gate 1602702146902151100 evaluation fails +peer1.org2.example.com | [42c8 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42c9 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42ca 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [42cb 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 gate 1602702146902468500 evaluation starts +peer1.org2.example.com | [42cc 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42cd 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [42ce 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 principal matched by identity 0 +peer1.org2.example.com | [42cf 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [42d0 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [42d1 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [42d2 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a3d20 gate 1602702146902468500 evaluation succeeds +peer1.org2.example.com | [42d3 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42d4 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42d5 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42d6 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42d7 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [42d8 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [42d9 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [42da 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [42db 10-14 19:02:26.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42dc 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42dd 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42de 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [42df 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42e0 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42e1 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42e2 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e3 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e4 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e5 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e6 10-14 19:02:26.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e7 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [42e8 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [42e9 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [42ea 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610121801 +peer1.org2.example.com | [42eb 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D51DC075B63D19C9D55ED57B137CC047DF251726EEFBBF81FB8923C6D21BC962 +peer1.org2.example.com | [42ec 10-14 19:02:28.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [42ed 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ee 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ef 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f0 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f1 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [42f2 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f3 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f4 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [42f5 10-14 19:02:28.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42f6 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47404 +peer1.org2.example.com | [42f7 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0043b3680 +peer1.org2.example.com | [42f8 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [42f9 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [42fa 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [42fb 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [42fc 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 6f 7a 06 82 82 df 70 32 6f ab 34 ab 16 a9 da |Voz....p2o.4....| +peer1.org2.example.com | 00000010 f3 1d 2f 37 31 3c ba 65 b6 70 a4 d5 e4 fb c2 ee |../71<.e.p......| +peer1.org2.example.com | [42fd 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 5d db 12 78 bf 55 0a 09 e9 5b 13 |0D. C]..x.U...[.| +peer1.org2.example.com | 00000010 91 05 24 c1 12 77 27 8c 1f b4 91 b6 ab ce df ad |..$..w'.........| +peer1.org2.example.com | 00000020 65 40 03 7e 02 20 6a ce 1d 5f 47 59 6a b0 69 5d |e@.~. j.._GYj.i]| +peer1.org2.example.com | 00000030 b0 34 07 ae 32 07 69 91 4d fe ed f2 a0 04 68 7a |.4..2.i.M.....hz| +peer1.org2.example.com | 00000040 c8 58 17 fe cb 72 |.X...r| +peer1.org2.example.com | [42fe 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [42ff 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00421d490, header 0xc0043b3a90 +peer1.org2.example.com | [4300 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [4301 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU [][bf50e9c6] processing txid: bf50e9c6a5405868cf481402ff92acf12ce0e99acc7fad42a1af8a3e23feb5b8 +peer1.org2.example.com | [4302 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU [][bf50e9c6] Entry chaincode: name:"cscc" +peer1.org2.example.com | [4303 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> INFO [][bf50e9c6] Entry chaincode: name:"cscc" +peer1.org2.example.com | [4304 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [4305 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [4306 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 6f 7a 06 82 82 df 70 32 6f ab 34 ab 16 a9 da |Voz....p2o.4....| +peer1.org2.example.com | 00000010 f3 1d 2f 37 31 3c ba 65 b6 70 a4 d5 e4 fb c2 ee |../71<.e.p......| +peer1.org2.example.com | [4307 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 5d db 12 78 bf 55 0a 09 e9 5b 13 |0D. C]..x.U...[.| +peer1.org2.example.com | 00000010 91 05 24 c1 12 77 27 8c 1f b4 91 b6 ab ce df ad |..$..w'.........| +peer1.org2.example.com | 00000020 65 40 03 7e 02 20 6a ce 1d 5f 47 59 6a b0 69 5d |e@.~. j.._GYj.i]| +peer1.org2.example.com | 00000030 b0 34 07 ae 32 07 69 91 4d fe ed f2 a0 04 68 7a |.4..2.i.M.....hz| +peer1.org2.example.com | 00000040 c8 58 17 fe cb 72 |.X...r| +peer1.org2.example.com | [4308 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU [bf50e9c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [4309 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU [bf50e9c6] notifying Txid:bf50e9c6a5405868cf481402ff92acf12ce0e99acc7fad42a1af8a3e23feb5b8, channelID: +peer1.org2.example.com | [430a 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [430b 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> INFO [][bf50e9c6] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [430c 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU [][bf50e9c6] Exit +peer1.org2.example.com | [430d 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47404 +peer1.org2.example.com | [430e 10-14 19:02:28.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47404 grpc.code=OK grpc.call_duration=3.4263ms +peer1.org2.example.com | [430f 10-14 19:02:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:47404: read: connection reset by peer +peer1.org2.example.com | [4310 10-14 19:02:28.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [4311 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4312 10-14 19:02:29.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4313 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4314 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4315 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4316 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:47412 +peer1.org2.example.com | [4317 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00427b450 +peer1.org2.example.com | [4318 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [4319 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [431a 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [431b 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [431c 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 6d 37 ed 8e ff 1a 17 b2 2d 14 c3 97 d0 30 5c |.m7......-....0\| +peer1.org2.example.com | 00000010 e4 b7 0a ab e0 6d 04 85 40 49 8e 21 be 56 bc 8d |.....m..@I.!.V..| +peer1.org2.example.com | [431d 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 9f 97 33 49 47 ea 7f 5f 74 67 |0E.!....3IG.._tg| +peer1.org2.example.com | 00000010 0a 0d 7e 1a 61 dd 44 7f 95 58 66 a2 c0 fa 65 49 |..~.a.D..Xf...eI| +peer1.org2.example.com | 00000020 47 3c 8f 52 ff 02 20 6a ab 7c 7f d6 61 23 d8 ec |G<.R.. j.|..a#..| +peer1.org2.example.com | 00000030 91 32 46 77 c4 e3 10 41 2e af c6 28 ff a6 b8 c5 |.2Fw...A...(....| +peer1.org2.example.com | 00000040 89 cc 61 7b 36 d8 78 |..a{6.x| +peer1.org2.example.com | [431e 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [431f 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00427c540, header 0xc00427b860 +peer1.org2.example.com | [4320 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [4321 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dc6514a] processing txid: 1dc6514a30db8d7a9bcb6a83078958bb68d705268c158dc15e138576ccf02924 +peer1.org2.example.com | [4322 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dc6514a] Entry chaincode: name:"qscc" +peer1.org2.example.com | [4323 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> INFO [][1dc6514a] Entry chaincode: name:"qscc" +peer1.org2.example.com | [4324 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [4325 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [4326 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [4327 10-14 19:02:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [4328 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4329 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [432a 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [432b 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [432c 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [432d 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 gate 1602702150012453500 evaluation starts +peer1.org2.example.com | [432e 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [432f 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4330 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [4331 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4332 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4333 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 principal matched by identity 0 +peer1.org2.example.com | [4334 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 6d 37 ed 8e ff 1a 17 b2 2d 14 c3 97 d0 30 5c |.m7......-....0\| +peer1.org2.example.com | 00000010 e4 b7 0a ab e0 6d 04 85 40 49 8e 21 be 56 bc 8d |.....m..@I.!.V..| +peer1.org2.example.com | [4335 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 9f 97 33 49 47 ea 7f 5f 74 67 |0E.!....3IG.._tg| +peer1.org2.example.com | 00000010 0a 0d 7e 1a 61 dd 44 7f 95 58 66 a2 c0 fa 65 49 |..~.a.D..Xf...eI| +peer1.org2.example.com | 00000020 47 3c 8f 52 ff 02 20 6a ab 7c 7f d6 61 23 d8 ec |G<.R.. j.|..a#..| +peer1.org2.example.com | 00000030 91 32 46 77 c4 e3 10 41 2e af c6 28 ff a6 b8 c5 |.2Fw...A...(....| +peer1.org2.example.com | 00000040 89 cc 61 7b 36 d8 78 |..a{6.x| +peer1.org2.example.com | [4336 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4337 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c080 gate 1602702150012453500 evaluation succeeds +peer1.org2.example.com | [4338 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4339 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [433a 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [433b 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [433c 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1dc6514a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [433d 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU [1dc6514a] notifying Txid:1dc6514a30db8d7a9bcb6a83078958bb68d705268c158dc15e138576ccf02924, channelID: +peer1.org2.example.com | [433e 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [433f 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> INFO [][1dc6514a] Exit chaincode: name:"qscc" (9ms) +peer1.org2.example.com | [4340 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dc6514a] Exit +peer1.org2.example.com | [4341 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:47412 +peer1.org2.example.com | [4342 10-14 19:02:30.01 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:47412 grpc.code=OK grpc.call_duration=13.3901ms +peer1.org2.example.com | [4343 10-14 19:02:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [4344 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4345 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [405b 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [405c 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [405d 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [405e 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [405f 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4060 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4061 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4062 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4063 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4064 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4065 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4066 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161041 +peer1.org1.example.com | [4067 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 46CFEBF18B7D04258C115F2186051BEDF6736F98554926F9D0223C395A1E4A8D +peer1.org1.example.com | [4068 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4069 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [406a 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [406b 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [406c 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [406d 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [406e 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [406f 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [40c5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [40c6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40c8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40c9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40ca 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [40cb 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 gate 1602702138927209700 evaluation starts +peer0.org1.example.com | [40cc 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40cd 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40ce 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [40cf 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 principal evaluation fails +peer0.org1.example.com | [40d0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 gate 1602702138927209700 evaluation fails +peer0.org1.example.com | [40d1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40d2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40d3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40d4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 gate 1602702138927533300 evaluation starts +peer0.org1.example.com | [40d5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40d6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40d8 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 principal matched by identity 0 +peer0.org1.example.com | [40d9 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [40d7 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40da 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [40db 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40dc 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 gate 1602702138927533300 evaluation succeeds +peer0.org1.example.com | [40dd 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40de 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40df 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org1.example.com | [40e0 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40e1 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e2 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40e5 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40e6 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [40e7 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e8 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e3 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e4 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [40e9 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ea 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [40eb 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4346 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4347 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4348 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4349 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [434a 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [434b 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [434c 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c3 8a 1b e3 8c 28 2e 93 03 d9 f7 e6 03 c6 4e |......(........N| +peer1.org2.example.com | 00000010 61 84 42 83 e2 6b e9 3a a9 89 9b 25 b1 a4 0f 5f |a.B..k.:...%..._| +peer1.org2.example.com | [434d 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 54 1c 9b 02 19 d7 98 02 1a 03 |0E.!..T.........| +peer1.org2.example.com | 00000010 54 46 e4 79 3d 4e 71 51 29 d1 2b da 66 7f e2 93 |TF.y=NqQ).+.f...| +peer1.org2.example.com | 00000020 20 a6 2b e3 a4 02 20 45 80 43 07 9d 9d ea a7 c1 | .+... E.C......| +peer1.org2.example.com | 00000030 0c cb 21 b6 2f 5a 46 6f e2 f8 76 4a bb 9f ae 25 |..!./ZFo..vJ...%| +peer1.org2.example.com | 00000040 e7 6b 24 f8 2a b4 7b |.k$.*.{| +peer1.org2.example.com | [434e 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [434f 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4350 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4351 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4352 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4353 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4354 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4355 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4356 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4357 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4358 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4359 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [435a 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [435b 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [435c 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [435d 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [435e 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [435f 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4360 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4361 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4362 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4363 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4364 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4365 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4366 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4367 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4368 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4369 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [436a 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\333\\5\t\362\002 s > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [436b 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [436c 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\333\\5\t\362\002 s > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [436d 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [436e 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer1.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer1.org2.example.com | [436f 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer1.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer1.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer1.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer1.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer1.org2.example.com | [4370 10-14 19:02:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4371 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 11 be ce 07 38 2a 05 8b fa 8d |0D. s2....8*....| +peer1.org2.example.com | 00000010 bc 26 da 0b dd 2e 1b eb b8 a8 22 97 69 2b 3e db |.&........".i+>.| +peer1.org2.example.com | 00000020 5c 35 09 f2 02 20 73 3c 43 ca c1 d4 fe 64 cd fc |\5... s DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4373 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [4374 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4375 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4376 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4377 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4378 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4379 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [437a 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437b 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437c 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [40ec 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [40ed 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40ee 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40ef 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40f0 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40f1 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [40f2 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 gate 1602702138941284700 evaluation starts +peer0.org1.example.com | [40f3 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40f4 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40f5 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [40f6 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 principal evaluation fails +peer0.org1.example.com | [40f7 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 gate 1602702138941284700 evaluation fails +peer0.org1.example.com | [40f8 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40f9 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40fa 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40fb 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 gate 1602702138946376900 evaluation starts +peer0.org1.example.com | [40fc 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40fd 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [40fe 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 principal matched by identity 0 +peer0.org1.example.com | [40ff 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4100 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4101 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4102 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 gate 1602702138946376900 evaluation succeeds +peer0.org1.example.com | [4103 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4104 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4105 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4106 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4107 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4108 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4109 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [410a 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [410b 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [410c 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [410d 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [410e 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [410f 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4110 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4111 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4112 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4113 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4114 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 gate 1602702140107719100 evaluation starts +peer0.org1.example.com | [4115 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4116 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4117 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4118 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 principal evaluation fails +peer0.org1.example.com | [4119 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 gate 1602702140107719100 evaluation fails +peer0.org1.example.com | [411a 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [411b 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [411c 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [411d 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 gate 1602702140110825600 evaluation starts +peer0.org1.example.com | [411e 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [411f 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4120 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 principal matched by identity 0 +peer0.org1.example.com | [4121 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 f6 93 99 69 05 e0 ec 05 31 9b 69 e4 6a b0 89 |P...i....1.i.j..| +peer0.org1.example.com | 00000010 58 43 4d b9 53 c6 69 38 bd 90 d2 13 78 1b 1f d9 |XCM.S.i8....x...| +peer0.org1.example.com | [4122 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 01 6b 5d 3e 35 a2 c2 de 0d 32 ec |0D. p.k]>5....2.| +peer0.org1.example.com | 00000010 56 d9 eb 08 72 bb 29 d1 82 6c 50 3a b7 f6 57 e3 |V...r.)..lP:..W.| +peer0.org1.example.com | 00000020 ba e2 77 d5 02 20 63 68 15 0d 98 41 bf a4 ec 4c |..w.. ch...A...L| +peer0.org1.example.com | 00000030 f2 ff 4b 5e 19 32 3b 57 b8 a5 e8 87 77 67 75 72 |..K^.2;W....wgur| +peer0.org1.example.com | 00000040 9e cc a6 f4 df 3e |.....>| +peer0.org1.example.com | [4123 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4124 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 gate 1602702140110825600 evaluation succeeds +peer0.org1.example.com | [4125 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4126 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4127 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4128 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4129 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [412a 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [412b 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4070 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4072 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4071 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [4073 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4074 10-14 19:02:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [4075 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4076 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [4077 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4078 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [4079 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [407a 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer1.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer1.org1.example.com | [407b 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer1.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer1.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer1.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer1.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer1.org1.example.com | [407c 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [407d 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 77 72 57 e4 83 e1 49 ae d9 aa 64 |0D. iwrW...I...d| +peer1.org1.example.com | 00000010 1b 62 ac a0 78 92 7b 41 89 63 87 df b8 be d0 8b |.b..x.{A.c......| +peer1.org1.example.com | 00000020 f0 ca d0 a0 02 20 09 c4 46 18 a4 92 8e 59 41 15 |..... ..F....YA.| +peer1.org1.example.com | 00000030 db f3 4d 41 73 18 c2 c5 e5 81 b1 22 3d ae 0e ee |..MAs......"=...| +peer1.org1.example.com | 00000040 e8 88 8c c4 22 9c |....".| +peer1.org1.example.com | [407e 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [407f 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [4080 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4081 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4082 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4083 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4084 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4085 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4086 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [412c 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [412d 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [412e 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [412f 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4130 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4131 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4132 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4133 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4134 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4135 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4136 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4137 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4138 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4139 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [413a 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [413b 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413c 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413d 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413e 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413f 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4140 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4141 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4142 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4143 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4144 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4145 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4146 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4147 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4148 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4149 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [414a 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [414b 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [414c 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [414d 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [414e 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437d 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\333\\5\t\362\002 s > alive: +peer1.org2.example.com | [437e 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [437f 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4380 10-14 19:02:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4381 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4382 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E161039 +peer1.org2.example.com | [4383 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66F604CD9B517CAB98B48F30CFDE0C5912B80B70406DF4A8917403019B9E643D +peer1.org2.example.com | [4384 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4385 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4386 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4387 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4388 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4389 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [438a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [438b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [438c 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [438d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [438e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [438f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4390 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4391 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4392 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4393 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4394 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4395 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4396 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4397 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4398 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4399 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [439a 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [439b 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [439c 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [439d 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [439e 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [439f 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [43a0 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43a1 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [43a2 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4087 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4088 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4089 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [408a 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [408b 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [408c 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [408d 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [408e 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 gate 1602702150559123700 evaluation starts +peer1.org1.example.com | [408f 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4090 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4091 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4092 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 principal evaluation fails +peer1.org1.example.com | [4093 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d250 gate 1602702150559123700 evaluation fails +peer1.org1.example.com | [4094 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4095 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4096 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4097 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 gate 1602702150575972600 evaluation starts +peer1.org1.example.com | [4098 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4099 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [409a 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 principal matched by identity 0 +peer1.org1.example.com | [409b 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer1.org1.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer1.org1.example.com | [409c 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer1.org1.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer1.org1.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer1.org1.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer1.org1.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer1.org1.example.com | [409d 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [409e 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00392d7c0 gate 1602702150575972600 evaluation succeeds +peer1.org1.example.com | [409f 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40a0 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40a1 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [40a2 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [40a3 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40a4 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40a5 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [40a6 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer1.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer1.org1.example.com | [40a7 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer1.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer1.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer1.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer1.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer1.org1.example.com | [40a8 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40a9 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40aa 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ab 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [40ac 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org1.example.com | [414f 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4150 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4151 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4152 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4153 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4154 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4155 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 gate 1602702140216099100 evaluation starts +peer0.org1.example.com | [4156 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4157 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4158 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4159 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 principal evaluation fails +peer0.org1.example.com | [415a 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 gate 1602702140216099100 evaluation fails +peer0.org1.example.com | [415b 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [415c 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [415d 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [415e 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 gate 1602702140217850800 evaluation starts +peer0.org1.example.com | [415f 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4160 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4161 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 principal matched by identity 0 +peer0.org1.example.com | [4162 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 7c 5c e9 97 f2 cb c1 4f 81 a9 58 32 6d 12 82 |t|\.....O..X2m..| +peer0.org1.example.com | 00000010 09 f5 4b 2b e2 78 58 d5 cf c2 a9 c5 79 ae 9b a2 |..K+.xX.....y...| +peer0.org1.example.com | [4163 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 59 8b 03 85 c3 cf c9 71 9c aa |0E.!..Y......q..| +peer0.org1.example.com | 00000010 e2 9c b6 70 68 f5 fb f8 18 fa 46 f9 ea 49 49 63 |...ph.....F..IIc| +peer0.org1.example.com | 00000020 07 99 0a 49 54 02 20 05 c9 85 a3 59 b7 af 1a 2c |...IT. ....Y...,| +peer0.org1.example.com | 00000030 a5 a8 e8 25 98 35 8f 33 bb ef a8 a9 eb 18 ac 89 |...%.5.3........| +peer0.org1.example.com | 00000040 58 fe 10 49 12 f3 01 |X..I...| +peer0.org1.example.com | [4164 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4165 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 gate 1602702140217850800 evaluation succeeds +peer0.org1.example.com | [4166 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4167 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4168 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4169 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [416a 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [416b 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [416c 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [43a3 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [43a4 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43a5 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [43a6 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43a7 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43a8 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43a9 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43aa 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43ab 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43ac 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43ad 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [43ae 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16103A +peer1.org2.example.com | [43af 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8C6FB44110D4FA41ED3466A8412BC67CD82BEA54071919317CF9B474C05B010 +peer1.org2.example.com | [43b0 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [43b1 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [43b2 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [43b3 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43b4 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43b5 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43b6 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b7 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43b8 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b9 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43ba 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer1.org1.example.com | [40ad 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer1.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer1.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer1.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer1.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer1.org1.example.com | [40ae 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40af 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b0 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b1 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [40b2 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b4 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [40b3 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [40b5 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b7 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [40b8 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40b9 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40b6 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40bb 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40ba 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [40bd 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40be 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40bf 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40bc 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [40c0 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [40c1 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 gate 1602702150641772600 evaluation starts +peer1.org1.example.com | [40c2 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40c3 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [40c4 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [40c5 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 principal evaluation fails +peer1.org1.example.com | [40c6 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c21d0 gate 1602702150641772600 evaluation fails +peer1.org1.example.com | [40c7 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40c8 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40c9 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [40ca 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 gate 1602702150649005300 evaluation starts +peer1.org1.example.com | [40cb 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40cc 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [416d 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [416e 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [416f 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4170 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4171 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4172 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4173 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4174 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4175 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4177 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4176 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4178 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [417a 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4179 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [417b 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417c 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417d 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417e 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417f 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4180 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4181 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4182 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4183 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4184 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4185 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4186 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4187 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4188 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4189 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [418a 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [418b 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [418c 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [418d 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [418e 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 32 67 85 ff 47 af 20 ff 06 2c 2e 97 a3 f4 26 |.2g..G. ..,....&| +peer0.org1.example.com | 00000010 d2 36 9e bb 3d 43 7e 64 be 4d 75 0b 7b 29 28 ce |.6..=C~d.Mu.{)(.| +peer0.org1.example.com | [418f 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 f7 1f 36 a6 82 14 b6 a3 06 2e |0E.!....6.......| +peer0.org1.example.com | 00000010 81 8e 2f b8 3d d2 43 41 5a cd 1b f4 f9 ba ad 8c |../.=.CAZ.......| +peer0.org1.example.com | 00000020 09 6a 45 ed 1d 02 20 2c e3 e7 51 be 84 a8 e1 5d |.jE... ,..Q....]| +peer0.org1.example.com | 00000030 fc 06 41 31 3b fc 07 82 c5 92 f4 77 1b 36 73 24 |..A1;......w.6s$| +peer0.org1.example.com | 00000040 be 1a e1 bb 6f 9e 2b |....o.+| +peer1.org2.example.com | [43bb 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43bc 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43bd 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [43be 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43bf 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [43c0 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43c1 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [43c2 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [43c3 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer1.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer1.org2.example.com | [43c4 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer1.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer1.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer1.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer1.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer1.org2.example.com | [43c5 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [43c6 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 88 26 00 51 4e 9a e7 6e 03 8e 5e |0D. ).&.QN..n..^| +peer1.org2.example.com | 00000010 1a 93 3b ec f9 78 c6 13 67 a5 cf 1f df e0 79 84 |..;..x..g.....y.| +peer1.org2.example.com | 00000020 27 58 fd 8b 02 20 6f 72 ea 42 a5 a8 c4 8c be 63 |'X... or.B.....c| +peer1.org2.example.com | 00000030 8e e9 30 a1 ad 0e 26 dd 80 a4 9a cc 8b 01 77 9d |..0...&.......w.| +peer1.org2.example.com | 00000040 6e 67 9c af f0 b7 |ng....| +peer1.org2.example.com | [43c7 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [43c8 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [43c9 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43ca 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43cb 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43cc 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [43cd 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43ce 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [43cf 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43d0 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [43d1 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [43d2 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40cd 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 principal matched by identity 0 +peer1.org1.example.com | [40ce 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer1.org1.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer1.org1.example.com | [40cf 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer1.org1.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer1.org1.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer1.org1.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer1.org1.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer1.org1.example.com | [40d0 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [40d1 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c2740 gate 1602702150649005300 evaluation succeeds +peer1.org1.example.com | [40d2 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40d3 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40d4 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [40d5 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [40d6 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40d7 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40d8 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [40d9 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer1.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer1.org1.example.com | [40da 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer1.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer1.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer1.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer1.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer1.org1.example.com | [40db 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40dc 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40dd 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [40de 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer1.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer1.org1.example.com | [40df 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer1.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer1.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer1.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer1.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer1.org1.example.com | [40e0 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40e1 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40e2 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e3 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e4 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e6 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40e7 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [40e5 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e8 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e9 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [40ea 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 cf 2a 01 0e 0f d6 15 b7 9e 3a 62 3b d8 83 dd |..*.......:b;...| +peer1.org1.example.com | 00000010 be c7 b9 d0 13 9c f4 1c 02 da f4 ec 7d 5a 41 87 |............}ZA.| +peer1.org1.example.com | [40ec 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 3b 0a bb 97 75 26 c1 e2 b5 df 80 |0D. M;...u&.....| +peer1.org1.example.com | 00000010 3c e4 ec 89 09 5a a0 a0 49 21 7d b3 ef 84 e6 cc |<....Z..I!}.....| +peer1.org1.example.com | 00000020 07 b1 d8 de 02 20 2d 29 ab d0 09 e2 a3 e5 fd dd |..... -)........| +peer1.org1.example.com | 00000030 e2 ec d0 9b 94 53 87 e8 c8 3b e3 2d 17 ab 5b 0f |.....S...;.-..[.| +peer1.org1.example.com | 00000040 2a 25 c6 d3 1c a2 |*%....| +peer1.org1.example.com | [40eb 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4190 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4191 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4192 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4193 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4194 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4195 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4196 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4197 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4198 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4199 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [419c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [419d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [419e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [419f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a0 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41a1 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a2 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41a3 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41a4 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a5 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41a6 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a7 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41a8 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a9 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41aa 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ab 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [41ac 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161036 +peer0.org1.example.com | [41ad 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4EF506DEE83FBDA0812F792FA30B2F1891EABA0CD90B46F76FEEDABE6510EC0C +peer0.org1.example.com | [41ae 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [41af 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [41b0 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [41b1 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [41b2 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b3 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b4 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b5 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [41b6 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [41b7 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b8 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [41b9 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41bb 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ba 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41bc 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41bd 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41be 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41bf 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c0 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41c1 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [41c2 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41c4 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c5 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41c6 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c3 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [41c7 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41c8 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [41c9 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41ca 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [41cb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [41cc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [41cd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [41ce 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [41cf 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [41d0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41d1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41d2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41d3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41d4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41d5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41d6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41d7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [41d8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 gate 1602702141863695000 evaluation starts +peer0.org1.example.com | [41d9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41da 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [41db 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [41dc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 principal evaluation fails +peer0.org1.example.com | [41dd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 gate 1602702141863695000 evaluation fails +peer0.org1.example.com | [41de 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41df 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41e0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41e1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 gate 1602702141864568200 evaluation starts +peer0.org1.example.com | [41e2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41e3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [41e4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 principal matched by identity 0 +peer0.org1.example.com | [41e5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [41e6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [41e7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [41e8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 gate 1602702141864568200 evaluation succeeds +peer0.org1.example.com | [41e9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41ea 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41eb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [41ec 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [41ed 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41ee 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43d3 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [43d4 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [43d5 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [43d6 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [43d7 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [43d8 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [43d9 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 gate 1602702150321533600 evaluation starts +peer1.org2.example.com | [43da 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [43db 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [43dc 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [43dd 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 principal evaluation fails +peer1.org2.example.com | [43de 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fb570 gate 1602702150321533600 evaluation fails +peer1.org2.example.com | [43df 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [43e0 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [43e1 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [43e2 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 gate 1602702150321776000 evaluation starts +peer1.org2.example.com | [43e3 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [43e4 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [43e5 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [43e6 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 principal evaluation fails +peer1.org2.example.com | [43e7 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fbae0 gate 1602702150321776000 evaluation fails +peer1.org2.example.com | [43e8 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43e9 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43ea 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [43eb 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 gate 1602702150327576300 evaluation starts +peer1.org2.example.com | [43ec 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [43ed 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [43ee 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 principal matched by identity 0 +peer1.org2.example.com | [43ef 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer1.org2.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer1.org2.example.com | [43f0 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer1.org2.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer1.org2.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer1.org2.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer1.org2.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer1.org2.example.com | [43f1 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [43f2 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004516050 gate 1602702150327576300 evaluation succeeds +peer1.org2.example.com | [43f3 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [43f4 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [43f5 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [43f6 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [43f7 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [43f8 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43f9 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [43fa 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer1.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer1.org2.example.com | [43fb 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer1.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer1.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer1.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer1.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer1.org2.example.com | [43fc 10-14 19:02:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [43fd 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43fe 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [43ff 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer1.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer1.org2.example.com | [4400 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer1.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer1.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer1.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer1.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer1.org2.example.com | [4401 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4402 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4403 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4404 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4405 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4406 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4407 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4408 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4409 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [440a 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer1.org2.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer1.org2.example.com | [440b 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer1.org2.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer1.org2.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer1.org2.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer1.org2.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer1.org2.example.com | [440c 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [440d 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [440e 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [440f 10-14 19:02:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer1.org2.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer1.org2.example.com | [4410 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer1.org2.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer1.org2.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer1.org2.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer1.org2.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer1.org1.example.com | [40ed 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40ef 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [40f0 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [40f1 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [40f2 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [40f3 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f4 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f5 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ee 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40f6 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f7 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [40f8 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40f9 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40fa 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40fb 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [40fc 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [40fd 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [40fe 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer1.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer1.org1.example.com | [40ff 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer1.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer1.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer1.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer1.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer1.org1.example.com | [4100 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [4101 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b c9 ce 09 7b bb 5a fc 89 fc 0b ea |0D. ....{.Z.....| +peer1.org1.example.com | 00000010 cb c9 71 ce 29 5c de 32 9e cb c5 70 de df 52 33 |..q.)\.2...p..R3| +peer1.org1.example.com | 00000020 41 5a 13 fa 02 20 30 78 8e dd ef 4e 75 e4 04 e1 |AZ... 0x...Nu...| +peer1.org1.example.com | 00000030 e5 6c 1e 42 fe ac da 13 03 e6 c5 87 95 62 81 81 |.l.B.........b..| +peer1.org1.example.com | 00000040 fb 8e 8d 13 9d f8 |......| +peer1.org1.example.com | [4102 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [4103 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [41ef 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41f0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41f1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41f2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41f3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41f4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [41f5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 gate 1602702141867076500 evaluation starts +peer0.org1.example.com | [41f6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41f7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [41f8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [41f9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 principal evaluation fails +peer0.org1.example.com | [41fa 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 gate 1602702141867076500 evaluation fails +peer0.org1.example.com | [41fb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41fc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41fd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41fe 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 gate 1602702141868942500 evaluation starts +peer0.org1.example.com | [41ff 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4200 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4201 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 principal matched by identity 0 +peer0.org1.example.com | [4202 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4203 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4204 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4205 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 gate 1602702141868942500 evaluation succeeds +peer0.org1.example.com | [4206 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4207 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4208 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4209 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [420a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [420b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [420c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [420d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [420e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [420f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [4411 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4412 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4413 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4414 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4415 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4416 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4417 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4418 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4419 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [441a 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [441b 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [441c 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 gate 1602702150345542600 evaluation starts +peer1.org2.example.com | [441d 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [441e 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [441f 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4420 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 principal evaluation fails +peer1.org2.example.com | [4421 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c40 gate 1602702150345542600 evaluation fails +peer1.org2.example.com | [4422 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4423 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4424 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4425 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 gate 1602702150348433700 evaluation starts +peer1.org2.example.com | [4426 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4427 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4428 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4429 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 principal evaluation fails +peer1.org2.example.com | [442a 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045461b0 gate 1602702150348433700 evaluation fails +peer1.org2.example.com | [442b 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [442c 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [442d 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [442e 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 gate 1602702150349104100 evaluation starts +peer1.org2.example.com | [442f 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4430 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4431 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 principal matched by identity 0 +peer1.org2.example.com | [4432 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer1.org2.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer1.org2.example.com | [4433 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer1.org2.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer1.org2.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer1.org2.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer1.org2.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer1.org2.example.com | [4434 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4435 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004546720 gate 1602702150349104100 evaluation succeeds +peer1.org2.example.com | [4436 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4437 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4438 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4439 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [443a 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [443b 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4104 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4105 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4106 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4107 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4108 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4109 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [410a 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [410c 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [410b 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [410d 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [410e 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [410f 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4110 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4111 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4112 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4113 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4116 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4117 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4118 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [4119 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [411a 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [411b 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4114 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4115 10-14 19:02:30.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [411c 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [411d 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [411e 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [411f 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4120 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4121 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4122 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4123 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [4124 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning true +peer1.org1.example.com | [4125 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4126 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F8939BA18CA1FC9E1610131801 +peer1.org1.example.com | [4127 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA0D142D31D5269D5730CF2752EFAD667D69D282AD6BC39F9668170030E21F6D +peer1.org1.example.com | [4128 10-14 19:02:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [4129 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [412a 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [412b 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [412c 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4210 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4211 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4212 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4213 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4214 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4215 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4216 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4217 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4218 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 gate 1602702141873907700 evaluation starts +peer0.org1.example.com | [4219 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [421a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [421b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [421c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 principal evaluation fails +peer0.org1.example.com | [421d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 gate 1602702141873907700 evaluation fails +peer0.org1.example.com | [421e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [421f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4220 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4221 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 gate 1602702141875538900 evaluation starts +peer0.org1.example.com | [4222 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4223 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4224 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 principal matched by identity 0 +peer0.org1.example.com | [4225 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4226 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4227 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4228 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 gate 1602702141875538900 evaluation succeeds +peer0.org1.example.com | [4229 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [422a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [422b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [422c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [422d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [422e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [443c 10-14 19:02:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [443d 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [443e 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [443f 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4440 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4441 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4442 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4443 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4444 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4445 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4446 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4447 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4448 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4449 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [444a 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 gate 1602702150419697100 evaluation starts +peer1.org2.example.com | [444b 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [444c 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [444d 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [444e 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 principal evaluation fails +peer1.org2.example.com | [444f 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044bdae0 gate 1602702150419697100 evaluation fails +peer1.org2.example.com | [4450 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [422f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4230 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4231 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4232 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4233 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4234 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4235 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 gate 1602702141877130400 evaluation starts +peer0.org1.example.com | [4236 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4237 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4238 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4239 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 principal evaluation fails +peer0.org1.example.com | [423a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 gate 1602702141877130400 evaluation fails +peer0.org1.example.com | [423b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [423c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [423d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [423e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 gate 1602702141877374500 evaluation starts +peer0.org1.example.com | [423f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4240 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4241 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 principal matched by identity 0 +peer0.org1.example.com | [4242 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4243 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4244 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4245 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 gate 1602702141877374500 evaluation succeeds +peer0.org1.example.com | [4246 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4247 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4248 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4249 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [424a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [424b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [424c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [424d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [424e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [424f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4250 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4251 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4252 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4253 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4254 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4255 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4256 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4257 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4258 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4259 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 gate 1602702141883309600 evaluation starts +peer0.org1.example.com | [425a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [425b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [425c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [425d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 principal evaluation fails +peer0.org1.example.com | [425e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 gate 1602702141883309600 evaluation fails +peer0.org1.example.com | [425f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4260 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4261 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4262 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 gate 1602702141884315500 evaluation starts +peer0.org1.example.com | [4263 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4264 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4265 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 principal matched by identity 0 +peer0.org1.example.com | [4266 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4267 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4268 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4269 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 gate 1602702141884315500 evaluation succeeds +peer0.org1.example.com | [426a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [426b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [426c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [426d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [426e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [426f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4270 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4271 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4272 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4273 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4274 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4275 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4276 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 gate 1602702141886781400 evaluation starts +peer0.org1.example.com | [4277 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4278 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4279 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [427a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 principal evaluation fails +peer0.org1.example.com | [427b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 gate 1602702141886781400 evaluation fails +peer0.org1.example.com | [427c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [427d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [427e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [427f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 gate 1602702141887380800 evaluation starts +peer0.org1.example.com | [4280 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4281 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4282 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 principal matched by identity 0 +peer0.org1.example.com | [4283 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4284 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4285 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4286 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 gate 1602702141887380800 evaluation succeeds +peer0.org1.example.com | [4287 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4288 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4289 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [428a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [428b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [428c 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [428d 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [428e 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [428f 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4290 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4291 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4292 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [412d 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [412e 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [412f 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4130 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [4131 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4132 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4133 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4134 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4135 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4136 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [4137 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [4138 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [4139 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [413a 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [413b 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [413c 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [413d 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [413e 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [413f 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4140 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4141 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4142 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [4143 10-14 19:02:34.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4144 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4145 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4146 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4147 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [4148 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4293 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4294 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4295 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4296 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4297 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4298 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4299 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [429a 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429b 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429c 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429d 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429e 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [429f 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42a0 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [42a1 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42a2 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42a3 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42a4 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42a5 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [42a6 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42a7 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42a8 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42a9 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42aa 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42ab 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42ac 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42ad 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 gate 1602702142177957500 evaluation starts +peer1.org2.example.com | [4451 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4452 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4453 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 gate 1602702150421377600 evaluation starts +peer1.org2.example.com | [4454 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4455 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4456 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4457 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 principal evaluation fails +peer1.org2.example.com | [4458 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004566050 gate 1602702150421377600 evaluation fails +peer1.org2.example.com | [4459 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [445a 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [445b 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [445c 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 gate 1602702150430463900 evaluation starts +peer1.org2.example.com | [445d 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [445e 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [445f 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 principal matched by identity 0 +peer1.org2.example.com | [4460 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 5b 8b 8f 4b 7d c7 23 1b 45 b9 d5 fa 10 e5 d4 |I[..K}.#.E......| +peer1.org2.example.com | 00000010 a0 18 43 73 8e 23 c3 fe 33 77 ae bf ac a7 e0 09 |..Cs.#..3w......| +peer1.org2.example.com | [4461 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 0b d5 56 da 56 04 61 ad 3f c3 1b |0D. [..V.V.a.?..| +peer1.org2.example.com | 00000010 b4 93 09 a5 41 7a d0 22 9b 28 1f 50 77 b8 32 b3 |....Az.".(.Pw.2.| +peer1.org2.example.com | 00000020 49 7f 2b 40 02 20 6f bb 95 b1 8e c1 12 8a dc da |I.+@. o.........| +peer1.org2.example.com | 00000030 4c 1d 8a 2f 29 65 b5 8c bc 33 b4 99 04 f3 37 c7 |L../)e...3....7.| +peer1.org2.example.com | 00000040 b8 84 bd 2f 32 42 |.../2B| +peer1.org2.example.com | [4462 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4463 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045665c0 gate 1602702150430463900 evaluation succeeds +peer1.org2.example.com | [4464 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4465 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4466 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4467 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4468 10-14 19:02:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4469 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [446a 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [446b 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [446c 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [446d 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [446e 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [446f 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4470 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4471 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4472 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4473 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4474 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4475 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4476 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4477 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4478 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4479 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [447a 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [447b 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [447c 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [447d 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [447e 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [447f 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4480 10-14 19:02:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4481 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4482 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4483 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4484 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4485 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4486 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4487 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4488 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4489 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [448a 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [448b 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [448c 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [448d 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [448e 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [448f 10-14 19:02:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4490 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4491 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4492 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4493 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4494 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4495 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42ae 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42af 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [42b0 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42b1 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 principal evaluation fails +peer0.org1.example.com | [42b2 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 gate 1602702142177957500 evaluation fails +peer0.org1.example.com | [42b3 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42b4 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42b5 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42b6 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 gate 1602702142193429000 evaluation starts +peer0.org1.example.com | [42b7 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42b8 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [42b9 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 principal matched by identity 0 +peer0.org1.example.com | [42ba 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer0.org1.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer0.org1.example.com | [42bb 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer0.org1.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer0.org1.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer0.org1.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer0.org1.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer0.org1.example.com | [42bc 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42bd 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 gate 1602702142193429000 evaluation succeeds +peer0.org1.example.com | [42be 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42bf 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42c0 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42c1 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42c2 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [42c3 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [42c4 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [42c5 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [42c6 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [42c7 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42c8 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42c9 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42ca 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [42cb 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42cc 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42cd 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42ce 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [42d0 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: alive: +peer1.org1.example.com | [4149 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [414a 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [414b 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [414c 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [414d 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [414e 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [414f 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 gate 1602702154191582500 evaluation starts +peer1.org1.example.com | [4150 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4151 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4152 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4153 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 principal evaluation fails +peer1.org1.example.com | [4154 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d28f0 gate 1602702154191582500 evaluation fails +peer1.org1.example.com | [4155 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4156 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4157 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4158 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 gate 1602702154193019800 evaluation starts +peer1.org1.example.com | [4159 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [415a 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [415b 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 principal matched by identity 0 +peer1.org1.example.com | [415c 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer1.org1.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer1.org1.example.com | [415d 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer1.org1.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer1.org1.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer1.org1.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer1.org1.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer1.org1.example.com | [415e 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [415f 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036d2e60 gate 1602702154193019800 evaluation succeeds +peer1.org1.example.com | [4160 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4161 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4162 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4163 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4164 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4165 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4166 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4167 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4168 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4169 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [416a 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [416b 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [416c 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [416d 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416e 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416f 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4170 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4171 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [4172 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4173 10-14 19:02:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4174 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4175 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4176 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [4177 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4178 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [4179 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [417a 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [417b 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [417c 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [417d 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [417e 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [417f 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [4180 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [4181 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [4182 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [4183 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4184 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4185 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42d1 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d2 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42cf 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d3 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d4 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d5 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42d6 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [42d7 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42d8 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42d9 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42da 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42db 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42dc 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [42dd 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42de 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [42df 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42e0 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42e1 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42e2 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42e3 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42e4 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42e5 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [42e6 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [42e7 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42e8 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42e9 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42ea 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4496 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4497 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4498 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4499 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [449a 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [449b 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [449c 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 gate 1602702150541890900 evaluation starts +peer1.org2.example.com | [449d 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [449e 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [449f 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [44a0 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 principal evaluation fails +peer1.org2.example.com | [44a1 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f2a0 gate 1602702150541890900 evaluation fails +peer1.org2.example.com | [44a2 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44a3 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44a4 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [44a5 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 gate 1602702150544400500 evaluation starts +peer1.org2.example.com | [44a6 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44a7 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [44a8 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [44a9 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 principal evaluation fails +peer1.org2.example.com | [44aa 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458f810 gate 1602702150544400500 evaluation fails +peer1.org2.example.com | [44ab 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44ac 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44ad 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44ae 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 gate 1602702150546044100 evaluation starts +peer1.org2.example.com | [44af 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44b0 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [44b1 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 principal matched by identity 0 +peer1.org2.example.com | [44b2 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer1.org2.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer1.org2.example.com | [44b3 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer1.org2.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer1.org2.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer1.org2.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer1.org2.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer1.org2.example.com | [44b4 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44b5 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458fd80 gate 1602702150546044100 evaluation succeeds +peer1.org2.example.com | [44b6 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44b7 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44b8 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44b9 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44ba 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [44bb 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [44bc 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [44bd 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [44be 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [44bf 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44c0 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44c1 10-14 19:02:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44c2 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [44c3 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44c4 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44c5 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44c6 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [44c7 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [44c9 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44c8 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > alive: alive: +peer1.org2.example.com | [44ca 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [44cb 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44cd 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [44ce 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44cf 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44cc 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [44d0 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44d1 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [44d2 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44d3 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [44d4 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44d5 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44d6 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44d7 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44d8 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [44d9 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 gate 1602702150582365800 evaluation starts +peer1.org2.example.com | [44da 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44db 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [44dc 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [44dd 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 principal evaluation fails +peer1.org2.example.com | [44de 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045b5f30 gate 1602702150582365800 evaluation fails +peer1.org2.example.com | [44df 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44e0 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [44e1 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [44e2 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 gate 1602702150586426700 evaluation starts +peer1.org2.example.com | [44e3 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44e4 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [44e5 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [44e6 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 principal evaluation fails +peer1.org2.example.com | [44e7 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d84a0 gate 1602702150586426700 evaluation fails +peer1.org2.example.com | [44e8 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44e9 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44ea 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44eb 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 gate 1602702150595378200 evaluation starts +peer1.org2.example.com | [44ec 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44ed 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [44ee 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 principal matched by identity 0 +peer1.org2.example.com | [44ef 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 cf 2a 01 0e 0f d6 15 b7 9e 3a 62 3b d8 83 dd |..*.......:b;...| +peer1.org2.example.com | 00000010 be c7 b9 d0 13 9c f4 1c 02 da f4 ec 7d 5a 41 87 |............}ZA.| +peer1.org2.example.com | [44f0 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 3b 0a bb 97 75 26 c1 e2 b5 df 80 |0D. M;...u&.....| +peer1.org2.example.com | 00000010 3c e4 ec 89 09 5a a0 a0 49 21 7d b3 ef 84 e6 cc |<....Z..I!}.....| +peer1.org2.example.com | 00000020 07 b1 d8 de 02 20 2d 29 ab d0 09 e2 a3 e5 fd dd |..... -)........| +peer1.org2.example.com | 00000030 e2 ec d0 9b 94 53 87 e8 c8 3b e3 2d 17 ab 5b 0f |.....S...;.-..[.| +peer1.org2.example.com | 00000040 2a 25 c6 d3 1c a2 |*%....| +peer1.org2.example.com | [44f1 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44f2 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d8a10 gate 1602702150595378200 evaluation succeeds +peer1.org2.example.com | [44f3 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f4 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f5 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44f6 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44f7 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [44f8 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [44f9 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [44fa 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [44fb 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4186 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4187 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4188 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4189 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [418a 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [418b 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 gate 1602702154229270500 evaluation starts +peer1.org1.example.com | [418c 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [418d 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [418e 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [418f 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 principal evaluation fails +peer1.org1.example.com | [4190 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003513ed0 gate 1602702154229270500 evaluation fails +peer1.org1.example.com | [4191 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4192 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4193 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4194 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 gate 1602702154247968900 evaluation starts +peer1.org1.example.com | [4195 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4196 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4197 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 principal matched by identity 0 +peer1.org1.example.com | [4198 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [4199 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [419a 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [419b 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003474440 gate 1602702154247968900 evaluation succeeds +peer1.org1.example.com | [419c 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [419d 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [419e 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [419f 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41a0 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41a1 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41a2 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41a3 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41a4 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41a5 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41a6 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41a7 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41a8 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 gate 1602702154249308000 evaluation starts +peer1.org1.example.com | [41a9 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41aa 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [41ab 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41ac 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 principal evaluation fails +peer1.org1.example.com | [41ad 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475650 gate 1602702154249308000 evaluation fails +peer1.org1.example.com | [41ae 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41af 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41b0 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41b1 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 gate 1602702154251873600 evaluation starts +peer1.org1.example.com | [41b2 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41b3 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [41b4 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 principal matched by identity 0 +peer1.org1.example.com | [41b5 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [41b6 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [41b7 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41b8 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003475bc0 gate 1602702154251873600 evaluation succeeds +peer1.org1.example.com | [41b9 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41ba 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41bb 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41bc 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41bd 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41be 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [41bf 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [41c0 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [41c1 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [41c2 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [41c3 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41c4 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41c5 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41c6 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44fc 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44fd 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44fe 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44ff 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4500 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4501 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4502 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4503 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4504 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4505 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4506 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4507 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [4508 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4509 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450a 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450b 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450c 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450d 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450e 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [450f 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4510 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4511 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4512 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4513 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4514 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4515 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4516 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4517 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4518 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4519 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [451a 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [451b 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [451c 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [451d 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [451e 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [451f 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4520 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4521 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4522 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 gate 1602702150647268300 evaluation starts +peer1.org2.example.com | [4523 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4524 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4525 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4526 10-14 19:02:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 principal evaluation fails +peer1.org2.example.com | [4527 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9f80 gate 1602702150647268300 evaluation fails +peer1.org2.example.com | [4528 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4529 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [452a 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [452b 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 gate 1602702150651250800 evaluation starts +peer1.org2.example.com | [452c 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [452d 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [452e 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [452f 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 principal evaluation fails +peer1.org2.example.com | [4530 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046124f0 gate 1602702150651250800 evaluation fails +peer1.org2.example.com | [4531 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4532 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4533 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4534 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 gate 1602702150652012600 evaluation starts +peer1.org2.example.com | [4535 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4536 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4537 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 principal matched by identity 0 +peer0.org1.example.com | [42eb 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42ec 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42ed 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42ee 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 gate 1602702142287927000 evaluation starts +peer0.org1.example.com | [42ef 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42f0 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [42f1 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42f2 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 principal evaluation fails +peer0.org1.example.com | [42f3 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 gate 1602702142287927000 evaluation fails +peer0.org1.example.com | [42f4 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42f5 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42f6 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42f7 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 gate 1602702142290923600 evaluation starts +peer0.org1.example.com | [42f8 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42f9 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [42fa 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 principal matched by identity 0 +peer0.org1.example.com | [42fb 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer0.org1.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer0.org1.example.com | [42fc 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer0.org1.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer0.org1.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer0.org1.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer0.org1.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer0.org1.example.com | [42fd 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42fe 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 gate 1602702142290923600 evaluation succeeds +peer0.org1.example.com | [42ff 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4300 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4301 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4302 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4303 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4304 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4305 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4306 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4307 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4308 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4309 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [430a 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [430b 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [430c 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [430d 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [430e 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [430f 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [41c7 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41c8 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41c9 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41ca 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41cb 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 gate 1602702154258815700 evaluation starts +peer1.org1.example.com | [41cc 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41cd 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [41ce 10-14 19:02:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41cf 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 principal evaluation fails +peer1.org1.example.com | [41d0 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003467dc0 gate 1602702154258815700 evaluation fails +peer1.org1.example.com | [41d1 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41d2 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41d3 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41d4 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 gate 1602702154261432000 evaluation starts +peer1.org1.example.com | [41d5 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41d6 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [41d7 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 principal matched by identity 0 +peer1.org1.example.com | [41d8 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [41d9 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [41da 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41db 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c0330 gate 1602702154261432000 evaluation succeeds +peer1.org1.example.com | [41dc 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41dd 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41de 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41df 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41e0 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41e1 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41e2 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41e3 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41e4 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41e5 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41e6 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41e7 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41e8 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 gate 1602702154267362800 evaluation starts +peer1.org1.example.com | [41e9 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41ea 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4310 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: +peer0.org1.example.com | [4311 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4312 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4313 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4314 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4315 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4316 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4317 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4318 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4319 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [431a 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [431b 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [431c 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [431d 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [431e 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [431f 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4320 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4321 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4322 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer0.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer0.org1.example.com | [4323 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer0.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer0.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer0.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer0.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer0.org1.example.com | [4324 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4325 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 66 6a 22 e4 2a 3f 43 f6 12 83 30 |0D. .fj".*?C...0| +peer0.org1.example.com | 00000010 02 1a 30 4c 0a db 85 48 5b 9c 6c 8b 58 97 3c 02 |..0L...H[.l.X.<.| +peer0.org1.example.com | 00000020 b1 7d 81 a3 02 20 3d a8 6a fb 9d 08 9b 29 a9 33 |.}... =.j....).3| +peer0.org1.example.com | 00000030 93 6b de 95 e0 55 9b 3a f4 a6 d8 d4 58 64 1a ea |.k...U.:....Xd..| +peer0.org1.example.com | 00000040 b8 49 3d a8 8d bd |.I=...| +peer0.org1.example.com | [4326 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4538 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer1.org2.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer1.org2.example.com | [4539 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer1.org2.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer1.org2.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer1.org2.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer1.org2.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer1.org2.example.com | [453a 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [453b 10-14 19:02:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [453c 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004612a60 gate 1602702150652012600 evaluation succeeds +peer1.org2.example.com | [453d 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [453e 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [453f 10-14 19:02:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4540 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4541 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4542 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [4543 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4544 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4545 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4546 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4547 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4548 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [4549 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454a 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454b 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454c 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [454d 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [454e 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [454f 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4550 10-14 19:02:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4551 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4552 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4553 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4554 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4555 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4556 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4557 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4558 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4559 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [455a 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [455b 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [455c 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [455d 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [455e 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [455f 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4560 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4561 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4562 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4563 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4564 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4565 10-14 19:02:30.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4566 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [4567 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [4568 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4569 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [456a 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4327 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4328 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4329 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [432a 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [432b 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [432c 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [432d 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [432e 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [432f 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4330 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4331 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4332 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > alive: +peer0.org1.example.com | [4333 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4334 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4335 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4336 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4337 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4338 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4339 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [433a 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [433b 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [433d 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [433e 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [433c 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [433f 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4340 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4341 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4342 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4343 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41eb 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41ec 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 principal evaluation fails +peer1.org1.example.com | [41ed 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1550 gate 1602702154267362800 evaluation fails +peer1.org1.example.com | [41ee 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41ef 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41f0 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41f1 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 gate 1602702154268938400 evaluation starts +peer1.org1.example.com | [41f2 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41f3 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [41f4 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 principal matched by identity 0 +peer1.org1.example.com | [41f5 10-14 19:02:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [41f6 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [41f7 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41f8 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c1ac0 gate 1602702154268938400 evaluation succeeds +peer1.org1.example.com | [41f9 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41fa 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41fb 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41fc 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41fd 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41fe 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [41ff 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4200 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org1.example.com | [4201 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org1.example.com | [4202 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org1.example.com | [4203 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org1.example.com | [4204 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4205 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4206 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4207 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4208 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4209 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [420a 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [420b 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [420c 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 gate 1602702154275570600 evaluation starts +peer1.org1.example.com | [420d 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [420e 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [420f 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4210 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 principal evaluation fails +peer1.org1.example.com | [4211 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cff40 gate 1602702154275570600 evaluation fails +peer1.org1.example.com | [4212 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4213 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4214 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4215 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 gate 1602702154279438900 evaluation starts +peer1.org1.example.com | [4216 10-14 19:02:34.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4217 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4218 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 principal matched by identity 0 +peer1.org1.example.com | [4219 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org1.example.com | [421a 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org1.example.com | [421b 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [421c 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328e4b0 gate 1602702154279438900 evaluation succeeds +peer1.org1.example.com | [421d 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421e 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421f 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4220 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4221 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4222 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4223 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4224 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4225 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4226 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4227 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4228 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4229 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 gate 1602702154286909400 evaluation starts +peer1.org1.example.com | [422a 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [422b 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [422c 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [422d 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 principal evaluation fails +peer1.org1.example.com | [422e 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328f6c0 gate 1602702154286909400 evaluation fails +peer1.org1.example.com | [422f 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4230 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4231 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4232 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 gate 1602702154288629600 evaluation starts +peer1.org2.example.com | [456b 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [456c 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [456d 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [456e 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [456f 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4570 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4571 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 gate 1602702150890979200 evaluation starts +peer1.org2.example.com | [4572 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4573 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4574 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4575 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 principal evaluation fails +peer1.org2.example.com | [4576 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648090 gate 1602702150890979200 evaluation fails +peer1.org2.example.com | [4577 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4578 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4579 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [457a 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 gate 1602702150891599600 evaluation starts +peer1.org2.example.com | [457b 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [457c 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [457d 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [457e 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 principal evaluation fails +peer1.org2.example.com | [457f 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648600 gate 1602702150891599600 evaluation fails +peer1.org2.example.com | [4580 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4581 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4582 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4583 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 gate 1602702150892763600 evaluation starts +peer1.org2.example.com | [4584 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4585 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4586 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 principal matched by identity 0 +peer1.org2.example.com | [4587 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [4588 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [4589 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [458a 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004648b70 gate 1602702150892763600 evaluation succeeds +peer1.org2.example.com | [458b 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [458c 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [458d 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [458e 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [458f 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4590 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4344 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4345 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4346 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4347 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4348 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4349 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [434a 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [434b 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [434c 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [434d 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [434e 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161037 +peer0.org1.example.com | [434f 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6561F37EB05658544072C19F30B0F1CE214505AFDECBE1C899AF279D638E8C15 +peer0.org1.example.com | [4350 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4351 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4352 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4353 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4354 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4355 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4356 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4357 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4358 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4359 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [435a 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [435c 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [435b 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [435d 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4233 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4234 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4235 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 principal matched by identity 0 +peer1.org1.example.com | [4236 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org1.example.com | [4237 10-14 19:02:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org1.example.com | [4238 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4239 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328fc30 gate 1602702154288629600 evaluation succeeds +peer1.org1.example.com | [423a 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [423b 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [423c 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [423d 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [423e 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [423f 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4240 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [4241 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4242 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4243 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4244 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4245 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4246 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4247 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [4248 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4249 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [424a 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [424b 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [424c 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [424d 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424e 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [424f 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4250 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4251 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4252 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4253 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4254 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 gate 1602702154347144800 evaluation starts +peer1.org1.example.com | [4255 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4256 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4257 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4258 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 principal evaluation fails +peer1.org1.example.com | [4259 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028ae530 gate 1602702154347144800 evaluation fails +peer1.org1.example.com | [425a 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [425b 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [425c 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [425d 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 gate 1602702154354265800 evaluation starts +peer1.org1.example.com | [425e 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [425f 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4260 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 principal matched by identity 0 +peer1.org1.example.com | [4261 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer1.org1.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer1.org1.example.com | [4262 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer1.org1.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer1.org1.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer1.org1.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer1.org1.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer1.org1.example.com | [4263 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4264 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028aead0 gate 1602702154354265800 evaluation succeeds +peer1.org1.example.com | [4265 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4266 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4267 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4268 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4269 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [426a 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [426b 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [426c 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [426d 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [426e 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [426f 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4270 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4271 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [4272 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4273 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4274 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4275 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4276 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4277 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [4278 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4279 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [427a 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [427b 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [427c 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [427d 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [427e 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4591 10-14 19:02:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4592 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4593 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4594 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4595 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4596 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4597 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 gate 1602702150902640100 evaluation starts +peer1.org2.example.com | [4598 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4599 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [459a 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [459b 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 principal evaluation fails +peer1.org2.example.com | [459c 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004649d70 gate 1602702150902640100 evaluation fails +peer1.org2.example.com | [459d 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [459e 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [459f 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45a0 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 gate 1602702150903561600 evaluation starts +peer1.org2.example.com | [45a1 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45a2 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45a3 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [45a4 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 principal evaluation fails +peer1.org2.example.com | [45a5 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046682e0 gate 1602702150903561600 evaluation fails +peer1.org2.example.com | [45a6 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45a7 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45a8 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [45a9 10-14 19:02:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 gate 1602702150909163900 evaluation starts +peer1.org2.example.com | [45aa 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45ab 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45ac 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 principal matched by identity 0 +peer1.org2.example.com | [45ad 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [45ae 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [45af 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [45b0 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004668850 gate 1602702150909163900 evaluation succeeds +peer1.org2.example.com | [45b1 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45b2 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45b3 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [45b4 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [45b5 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [45b6 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [45b7 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [45b8 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [45b9 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45ba 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [45bb 10-14 19:02:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45bc 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45bd 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45be 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45bf 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45c0 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45c1 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [45c2 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [45c3 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 gate 1602702150922493000 evaluation starts +peer1.org2.example.com | [45c4 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45c5 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45c6 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [45c7 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 principal evaluation fails +peer1.org2.example.com | [45c8 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046829d0 gate 1602702150922493000 evaluation fails +peer1.org2.example.com | [45c9 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45ca 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45cb 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45cc 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 gate 1602702150925541600 evaluation starts +peer1.org2.example.com | [45cd 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45ce 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45cf 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [45d0 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 principal evaluation fails +peer1.org2.example.com | [45d1 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004682f40 gate 1602702150925541600 evaluation fails +peer1.org2.example.com | [45d2 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45d3 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45d4 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [45d5 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 gate 1602702150928086700 evaluation starts +peer0.org1.example.com | [435e 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [435f 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4360 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4361 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4362 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4363 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer0.org1.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer0.org1.example.com | [4364 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer0.org1.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer0.org1.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer0.org1.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer0.org1.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4366 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4367 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4368 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4369 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer0.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer0.org1.example.com | [436a 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer0.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer0.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer0.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer0.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer0.org1.example.com | [436b 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [436c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [436d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [436e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [436f 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4370 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4371 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4372 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4373 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4374 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4375 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 gate 1602702142644918800 evaluation starts +peer0.org1.example.com | [4376 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4377 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [427f 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [4280 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4281 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [4282 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [4283 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4284 10-14 19:02:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [4285 10-14 19:02:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4286 10-14 19:02:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [4287 10-14 19:02:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4288 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4289 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [428a 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [428c 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [428d 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [428e 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [428b 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [45d6 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45d7 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45d8 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 principal matched by identity 0 +peer0.org1.example.com | [4378 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4379 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 principal evaluation fails +peer0.org1.example.com | [437a 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 gate 1602702142644918800 evaluation fails +peer0.org1.example.com | [437b 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [437c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [437d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [437e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 gate 1602702142649802800 evaluation starts +peer0.org1.example.com | [437f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4380 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4381 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 principal matched by identity 0 +peer0.org1.example.com | [4382 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +peer0.org1.example.com | 00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +peer0.org1.example.com | [4384 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +peer0.org1.example.com | 00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +peer0.org1.example.com | 00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +peer0.org1.example.com | 00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +peer0.org1.example.com | 00000040 6a cb ea af 6c ec |j...l.| +peer0.org1.example.com | [4383 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4385 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4386 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4387 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4388 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4389 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 gate 1602702142649802800 evaluation succeeds +peer0.org1.example.com | [438a 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [438b 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [438c 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [438d 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [438e 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [438f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4390 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4391 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4392 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4393 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4394 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4395 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4396 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer0.org1.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer0.org1.example.com | [4397 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer0.org1.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer0.org1.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer0.org1.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer0.org1.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4399 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 56 51 c5 ec af 26 f7 c1 e3 1e c7 |0D. KVQ...&.....| +peer0.org1.example.com | 00000010 a7 ed d0 b5 dc ad 88 03 d7 56 6d 4b 29 7f 09 3a |.........VmK)..:| +peer0.org1.example.com | 00000020 bc e3 38 c0 02 20 7b ea 40 31 5f db 89 27 43 ec |..8.. {.@1_..'C.| +peer1.org1.example.com | [428f 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4290 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4291 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4292 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4293 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4294 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [4295 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4296 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4297 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [4298 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4299 10-14 19:02:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [429a 10-14 19:02:34.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08A0FEBEDEDFA0FC9E161042 +peer1.org1.example.com | [429b 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1AE9CFE5AF961A8C8ABA7D5C7DE99D0FB948262517CC30C547C85EAE73C36A65 +peer1.org1.example.com | [429c 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [429d 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [429e 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [429f 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42a0 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [42a1 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [42a2 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a3 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a4 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45d9 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [45da 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [45db 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [45dc 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046834b0 gate 1602702150928086700 evaluation succeeds +peer1.org2.example.com | [45dd 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45de 10-14 19:02:30.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45df 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [45e0 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [45e1 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e2 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45e3 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [45e4 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45e5 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [45e6 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45e7 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [45e8 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [45e9 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 gate 1602702150932975300 evaluation starts +peer1.org2.example.com | [45ea 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45eb 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45ec 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [45ed 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 principal evaluation fails +peer1.org2.example.com | [45ee 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a06b0 gate 1602702150932975300 evaluation fails +peer1.org2.example.com | [45ef 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45f0 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45f1 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45f2 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 gate 1602702150935963100 evaluation starts +peer1.org2.example.com | [45f3 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45f4 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45f5 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [45f6 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 principal evaluation fails +peer1.org2.example.com | [45f7 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a0c20 gate 1602702150935963100 evaluation fails +peer1.org2.example.com | [45f8 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45f9 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45fa 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [45fb 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 gate 1602702150939472600 evaluation starts +peer1.org2.example.com | [45fc 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45fd 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [45fe 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 principal matched by identity 0 +peer1.org2.example.com | [45ff 10-14 19:02:30.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [4600 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [4601 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4602 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a1190 gate 1602702150939472600 evaluation succeeds +peer1.org2.example.com | [4603 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4604 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4605 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4606 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4607 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [4608 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [4609 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org1.example.com | [42a5 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a6 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a7 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a8 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a9 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [42aa 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [42ab 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer1.org1.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer1.org1.example.com | [42ac 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer1.org1.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer1.org1.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer1.org1.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer1.org1.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer1.org1.example.com | [42ad 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [42ae 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [42af 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [42b0 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42b1 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 4a 61 c9 43 26 ae e0 74 fd |0E.!..,Ja.C&..t.| +peer1.org1.example.com | 00000010 54 ec 32 a9 30 27 62 4a e0 da ba fa 74 67 e2 5e |T.2.0'bJ....tg.^| +peer1.org1.example.com | 00000020 fe 10 c8 30 43 02 20 39 6a cf 7b 75 fd 21 53 0a |...0C. 9j.{u.!S.| +peer1.org1.example.com | 00000030 a1 2f 28 ef 32 e7 77 d3 58 50 e5 5b 18 dc c5 6f |./(.2.w.XP.[...o| +peer1.org1.example.com | 00000040 66 04 f1 31 08 96 d9 |f..1...| +peer1.org1.example.com | [42b2 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [42b4 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [42b5 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [42b6 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42b7 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42b3 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42b8 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42b9 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42ba 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42bb 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:44620 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [42bc 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [42bd 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [42be 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer1.org1.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer1.org1.example.com | [42bf 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer1.org1.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer1.org1.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer1.org1.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer1.org1.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer1.org1.example.com | [42c0 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42c1 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 9d 9e 4c fe 40 e7 4c eb 31 41 f8 24 a0 98 7a f5 |..L.@.L.1A.$..z.| +peer0.org1.example.com | 00000040 9b 59 10 8a 1b f5 |.Y....| +peer0.org1.example.com | [439a 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [439b 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [439c 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [439d 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [439e 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [439f 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43a0 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a1 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [43a2 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +peer0.org1.example.com | 00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +peer0.org1.example.com | [43a3 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +peer0.org1.example.com | 00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +peer0.org1.example.com | 00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +peer0.org1.example.com | 00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +peer0.org1.example.com | 00000040 9e c2 38 3c 62 59 ed |..8 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a5 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [43a6 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43a7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [43a8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43a9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [43aa 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43ab 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43ac 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [43ad 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [43ae 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [43af 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 gate 1602702142712409300 evaluation starts +peer0.org1.example.com | [43b0 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43b1 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [43b2 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [43b3 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 principal evaluation fails +peer1.org1.example.com | [42c2 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42c3 10-14 19:02:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [42c4 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [42c5 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [42c6 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42c7 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42c8 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41816 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [42c9 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [42ca 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42cb 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [42cc 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42cd 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42ce 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [42cf 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [42d0 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [42d1 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 gate 1602702154658166300 evaluation starts +peer1.org1.example.com | [42d2 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42d3 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [42d4 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [42d5 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 principal evaluation fails +peer1.org1.example.com | [42d6 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418700 gate 1602702154658166300 evaluation fails +peer1.org1.example.com | [42d7 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42d8 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [42d9 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [42da 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 gate 1602702154662150300 evaluation starts +peer1.org1.example.com | [42db 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [42dc 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [42dd 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 principal matched by identity 0 +peer1.org1.example.com | [42de 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org1.example.com | [43b4 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 gate 1602702142712409300 evaluation fails +peer0.org1.example.com | [43b5 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43b6 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43b7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [43b8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 gate 1602702142713720000 evaluation starts +peer0.org1.example.com | [43b9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43ba 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [43bb 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 principal matched by identity 0 +peer0.org1.example.com | [43bc 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +peer0.org1.example.com | 00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +peer0.org1.example.com | [43bd 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +peer0.org1.example.com | 00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +peer0.org1.example.com | 00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +peer0.org1.example.com | 00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +peer0.org1.example.com | 00000040 6c a0 1b 6c 6b 34 |l..lk4| +peer0.org1.example.com | [43be 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [43bf 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 gate 1602702142713720000 evaluation succeeds +peer0.org1.example.com | [43c0 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43c1 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43c2 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [43c3 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [43c4 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43c5 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43c6 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [43c7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +peer0.org1.example.com | 00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +peer0.org1.example.com | [43c8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +peer0.org1.example.com | 00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +peer0.org1.example.com | 00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +peer0.org1.example.com | 00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +peer0.org1.example.com | 00000040 e2 a2 a4 e0 2f f0 |..../.| +peer0.org1.example.com | [43c9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43ca 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43cb 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43cc 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43cd 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43ce 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43cf 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d0 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d1 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43d2 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [460a 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [460b 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [460c 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [460d 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [460e 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [460f 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4610 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4611 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4612 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4613 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4614 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4615 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4616 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 gate 1602702150946210700 evaluation starts +peer1.org2.example.com | [4617 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4618 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4619 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer1.org1.example.com | [42df 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer1.org1.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer1.org1.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer1.org1.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer1.org1.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer1.org1.example.com | [42e0 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [42e1 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000418c70 gate 1602702154662150300 evaluation succeeds +peer1.org1.example.com | [42e2 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42e3 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [42e4 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [42e5 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [42e6 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [42e7 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42e8 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [42e9 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer1.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer1.org1.example.com | [42ea 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer1.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer1.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer1.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer1.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer1.org1.example.com | [42eb 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [42ec 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42ed 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42ee 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42ef 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [42f0 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [42f1 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 1a c9 aa 0e a0 c8 a0 f4 40 10 dc c7 69 0a dc |.........@...i..| +peer1.org1.example.com | 00000010 4a 10 32 ca 5b 61 a6 d6 55 69 b6 24 6b fe 41 fc |J.2.[a..Ui.$k.A.| +peer1.org1.example.com | [42f2 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 5e fc 9c 1a 86 51 94 43 88 9d |0D. xD^....Q.C..| +peer1.org1.example.com | 00000010 a4 02 40 2e 67 ca 4b 9a 59 dc 7f d7 dc 55 66 94 |..@.g.K.Y....Uf.| +peer1.org1.example.com | 00000020 7e 1f bf e0 02 20 6c 36 dc 0d 7c 63 4e b5 e4 77 |~.... l6..|cN..w| +peer1.org1.example.com | 00000030 80 f2 15 d6 32 ad 34 98 69 f2 14 72 92 1e 5b 6e |....2.4.i..r..[n| +peer1.org1.example.com | 00000040 65 e8 f8 e1 fa 82 |e.....| +peer1.org1.example.com | [42f3 10-14 19:02:34.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [42f4 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 93 82 66 87 bf 7b 24 31 d6 fb ad |0D. H..f..{$1...| +peer1.org1.example.com | 00000010 98 35 de 2e 4d 07 af c7 30 ab af 6c 22 39 de f4 |.5..M...0..l"9..| +peer0.org1.example.com | [43d3 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [43d4 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e fd 97 f7 1b d1 51 b5 cf 69 86 43 83 59 59 94 |......Q..i.C.YY.| +peer0.org1.example.com | 00000010 77 e3 c4 d2 80 7b bd f0 3a 40 0a 9f a2 85 f9 79 |w....{..:@.....y| +peer0.org1.example.com | [43d5 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e7 eb 04 86 6e 02 05 53 cf 7c c4 |0D. F....n..S.|.| +peer0.org1.example.com | 00000010 49 53 00 5e a2 05 3d b3 eb 76 9e fe 3a 7c d4 3d |IS.^..=..v..:|.=| +peer0.org1.example.com | 00000020 6a 1c ac 2f 02 20 2d 81 ab ad e9 76 bb b4 6e 28 |j../. -....v..n(| +peer0.org1.example.com | 00000030 a9 24 72 23 3f 7a 1f 90 16 86 ee 53 57 c5 8e 76 |.$r#?z.....SW..v| +peer0.org1.example.com | 00000040 7f bf d8 b9 d8 ca |......| +peer0.org1.example.com | [43d6 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43d7 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d8 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43d9 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [43da 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer1.org2.example.com | [461a 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 principal evaluation fails +peer1.org2.example.com | [461b 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c13c0 gate 1602702150946210700 evaluation fails +peer1.org2.example.com | [461c 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [461d 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [461e 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [461f 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 gate 1602702150947148800 evaluation starts +peer1.org2.example.com | [4620 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4621 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4622 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4623 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 principal evaluation fails +peer1.org2.example.com | [4624 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1930 gate 1602702150947148800 evaluation fails +peer1.org2.example.com | [4625 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4626 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4627 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4628 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 gate 1602702150949341200 evaluation starts +peer1.org2.example.com | [4629 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [462a 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [462b 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 principal matched by identity 0 +peer1.org2.example.com | [462c 10-14 19:02:30.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer1.org2.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer1.org2.example.com | [462d 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer1.org2.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer1.org2.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer1.org2.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer1.org2.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [462e 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [462f 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046c1ea0 gate 1602702150949341200 evaluation succeeds +peer1.org2.example.com | [4630 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4631 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4632 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4633 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4634 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4635 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4636 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4637 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4638 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 5a 4d 63 88 02 20 1f dc d6 c4 6f 5a 93 6a d1 f3 |ZMc.. ....oZ.j..| +peer1.org1.example.com | 00000030 1a ee 2a d6 f4 b7 4d 09 55 7d 59 55 fd 1a d5 7c |..*...M.U}YU...|| +peer1.org1.example.com | 00000040 d5 25 83 78 8c fc |.%.x..| +peer1.org1.example.com | [42f5 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [42f6 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [42f7 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [43db 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43dc 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43dd 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43de 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [43df 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43e0 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [43e1 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43e2 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43e3 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [43e4 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [43e5 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [43e6 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 gate 1602702145110286500 evaluation starts +peer0.org1.example.com | [43e7 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43e8 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [43e9 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [43ea 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 principal evaluation fails +peer0.org1.example.com | [43eb 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 gate 1602702145110286500 evaluation fails +peer0.org1.example.com | [43ec 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43ed 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43ee 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [43ef 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 gate 1602702145110717300 evaluation starts +peer0.org1.example.com | [43f0 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43f1 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [43f2 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 principal matched by identity 0 +peer0.org1.example.com | [43f3 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 5a 98 07 dc 3c 51 32 38 4e db d4 e0 9e a7 30 |.Z... DEBU Verify: sig = 00000000 30 44 02 20 31 3e d3 01 ba 14 e4 29 70 1c 6f 51 |0D. 1>.....)p.oQ| +peer0.org1.example.com | 00000010 27 f0 ce 5a 9d 40 9f c4 4a a6 14 dc a9 c2 10 e2 |'..Z.@..J.......| +peer0.org1.example.com | 00000020 67 5f 14 73 02 20 4b 8a b0 ae c5 ac 89 7e 50 91 |g_.s. K......~P.| +peer0.org1.example.com | 00000030 ff 85 a0 5a 65 12 96 c6 10 99 48 59 f4 49 f7 c4 |...Ze.....HY.I..| +peer0.org1.example.com | 00000040 42 69 25 01 0a e8 |Bi%...| +peer0.org1.example.com | [43f5 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [43f6 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 gate 1602702145110717300 evaluation succeeds +peer0.org1.example.com | [43f7 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43f8 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43f9 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [43fa 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [42f8 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [42f9 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [42fa 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42fb 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42fc 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42fd 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [42fe 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42ff 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4300 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4301 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [4302 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [4303 10-14 19:02:34.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4304 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:38708 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4305 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4306 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4307 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4308 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4309 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [430a 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [430b 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [430c 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [430d 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [430e 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [430f 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 gate 1602702154731682600 evaluation starts +peer1.org1.example.com | [4310 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4311 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [4312 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4313 10-14 19:02:34.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 principal evaluation fails +peer1.org1.example.com | [4314 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000419e90 gate 1602702154731682600 evaluation fails +peer1.org1.example.com | [4315 10-14 19:02:34.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4316 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4317 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4318 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 gate 1602702154750207700 evaluation starts +peer1.org1.example.com | [4319 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [431a 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 processing identity 0 with bytes of 115a6c0 +peer1.org1.example.com | [431b 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 principal matched by identity 0 +peer1.org1.example.com | [431c 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer1.org1.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer1.org1.example.com | [431d 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer1.org1.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer1.org1.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer1.org1.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer1.org1.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer1.org1.example.com | [431e 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [431f 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003d9690 gate 1602702154750207700 evaluation succeeds +peer1.org1.example.com | [4320 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4321 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4639 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [463a 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [463b 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [463c 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 gate 1602702150956448200 evaluation starts +peer1.org2.example.com | [463d 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [463e 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [463f 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4640 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 principal evaluation fails +peer1.org2.example.com | [4641 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df0a0 gate 1602702150956448200 evaluation fails +peer1.org2.example.com | [4642 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4643 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4644 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4645 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 gate 1602702150959906900 evaluation starts +peer1.org2.example.com | [4646 10-14 19:02:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4647 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4648 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4649 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 principal evaluation fails +peer1.org2.example.com | [464a 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046df610 gate 1602702150959906900 evaluation fails +peer1.org2.example.com | [464b 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [464c 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [464d 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [464e 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 gate 1602702150962453500 evaluation starts +peer1.org2.example.com | [464f 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4650 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4651 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 principal matched by identity 0 +peer1.org2.example.com | [4652 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer1.org2.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer1.org2.example.com | [4653 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer1.org2.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer1.org2.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer1.org2.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer1.org2.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer1.org2.example.com | [4654 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4655 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046dfb80 gate 1602702150962453500 evaluation succeeds +peer1.org2.example.com | [4656 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4657 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4658 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4659 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [465a 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [465b 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [465c 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [465d 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [465e 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [465f 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4660 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4661 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4662 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer1.org2.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer1.org2.example.com | [4663 10-14 19:02:30.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer1.org2.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer1.org2.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer1.org2.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer1.org1.example.com | [4322 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4323 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4324 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4325 10-14 19:02:34.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4326 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4327 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer1.org1.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer1.org1.example.com | [4328 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer1.org1.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer1.org1.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer1.org1.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer1.org1.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer1.org1.example.com | [4329 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [432a 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [432b 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [432c 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [432d 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer1.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer1.org1.example.com | [432e 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer1.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer1.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer1.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer1.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer1.org1.example.com | [432f 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4330 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1602702050573832200, 61 but got ts: inc_num:1602702050573832200 seq_num:59 +peer1.org1.example.com | [4331 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4332 10-14 19:02:34.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer1.org2.example.com | [4664 10-14 19:02:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer1.org2.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer1.org2.example.com | [4665 10-14 19:02:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer1.org2.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | [43fb 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [43fc 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [43fd 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [43fe 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [43ff 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4400 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4401 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4402 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4403 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4404 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4405 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4406 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4407 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4408 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4409 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [440a 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [440b 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [440c 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [440d 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [440e 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [440f 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4410 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4411 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4412 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4413 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4414 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4415 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4416 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4417 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4418 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4419 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [441a 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [441b 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer1.org2.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer1.org2.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer1.org2.example.com | [4666 10-14 19:02:30.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4667 10-14 19:02:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [4668 10-14 19:02:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [4669 10-14 19:02:30.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [466a 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [466b 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [466c 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [466d 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C088498A4D78EA1FC9E1610131801 +peer1.org2.example.com | [466e 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 794B3DC180F423A713F7742FB52221C7CFE244B02228FC1F8C8126E3EC59D52F +peer1.org2.example.com | [466f 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [4670 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4671 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4672 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4673 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4674 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4675 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4676 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4677 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [4678 10-14 19:02:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4679 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [467a 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467b 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467c 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467d 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [467e 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [467f 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4680 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4681 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4682 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4683 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4684 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [4685 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4686 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer1.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer1.org2.example.com | [4687 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org1.example.com | [441c 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [441d 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [441e 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [441f 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4420 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4421 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4422 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4423 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4424 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4425 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4426 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4427 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 gate 1602702145225156100 evaluation starts +peer0.org1.example.com | [4428 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4429 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [442a 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [442b 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 principal evaluation fails +peer0.org1.example.com | [442c 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 gate 1602702145225156100 evaluation fails +peer0.org1.example.com | [442d 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [442e 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4430 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [442f 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4431 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 gate 1602702145229848700 evaluation starts +peer0.org1.example.com | [4432 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4433 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4434 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 principal matched by identity 0 +peer0.org1.example.com | [4435 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 48 82 5a 01 18 1d 54 84 c1 05 96 cf e2 1c 74 |.H.Z...T.......t| +peer0.org1.example.com | 00000010 10 51 01 59 ca ee 6b f5 6a 1e 98 f6 51 fd 6c 42 |.Q.Y..k.j...Q.lB| +peer0.org1.example.com | [4436 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 2d 9e b8 8b fd cf 63 62 c1 |0E.!...-.....cb.| +peer0.org1.example.com | 00000010 23 da 96 9a 1e 72 d3 95 fb 60 78 04 6a 04 fe f6 |#....r...`x.j...| +peer0.org1.example.com | 00000020 3b 49 5c 50 2e 02 20 10 38 7f 7b bc 9e cb fd 4e |;I\P.. .8.{....N| +peer0.org1.example.com | 00000030 f6 57 fc db a3 43 39 d3 77 49 a8 4f f5 49 d5 64 |.W...C9.wI.O.I.d| +peer0.org1.example.com | 00000040 d4 8b 5e a4 3f e2 ff |..^.?..| +peer0.org1.example.com | [4437 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4438 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 gate 1602702145229848700 evaluation succeeds +peer0.org1.example.com | [4439 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [443a 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer1.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer1.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer1.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer1.org2.example.com | [4688 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4689 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a de b8 e9 2f 44 ba cc 91 26 3d |0E.!...../D...&=| +peer1.org2.example.com | 00000010 7d fd df de 5a 95 4f 29 0d 9d 99 38 90 2e 79 12 |}...Z.O)...8..y.| +peer1.org2.example.com | 00000020 5c 9b 61 86 d1 02 20 55 7c 4a a1 e4 39 d0 58 f8 |\.a... U|J..9.X.| +peer1.org2.example.com | 00000030 e1 9e f6 cd 0b 1e 6a 21 3c b0 80 b7 9b 80 f7 45 |......j!<......E| +peer1.org2.example.com | 00000040 da 2c 95 07 58 23 b7 |.,..X#.| +peer1.org2.example.com | [468a 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [468b 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [468c 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [468d 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [468e 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [468f 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4690 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4691 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4692 10-14 19:02:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [4693 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4694 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4695 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4696 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4697 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4698 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [4699 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [469a 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [469b 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469c 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469d 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469e 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [469f 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [46a0 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46a1 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [46a2 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46a3 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [46a4 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46a5 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [46a6 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [443b 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [443c 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [443d 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [443e 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [443f 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4440 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4441 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4442 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4443 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4444 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4445 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4446 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4447 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4448 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4449 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [444a 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444b 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [444c 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [444d 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [444e 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [444f 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4450 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4451 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4452 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4453 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4454 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4455 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4456 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4457 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4458 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4459 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [445a 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [445b 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [445c 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [445d 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [445e 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [46a7 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [46a8 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46a9 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [46aa 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46ab 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46ac 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46ad 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46ae 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46af 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46b0 10-14 19:02:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46b1 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46b2 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46b3 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [46b4 10-14 19:02:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46b5 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [46b6 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08C4D1D697DFA0FC9E16103B +peer1.org2.example.com | [46b7 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F138CB9CD39842F224AB335F6F8B79D7CD3BCB8B45072EB77D7221E2AB3AEB38 +peer1.org2.example.com | [46b8 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [46b9 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [46ba 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [46bb 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:I\2245" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46bc 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46bd 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [445f 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 15 a2 c3 03 13 3d 4d fb 4d 83 0d 01 e1 ce fc |b.....=M.M......| +peer0.org1.example.com | 00000010 48 25 1d 1c f9 29 f4 08 6e 05 91 df 4a 10 99 72 |H%...)..n...J..r| +peer0.org1.example.com | [4460 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 af 8e 67 61 c6 0a 88 43 e4 f0 |0E.!....ga...C..| +peer0.org1.example.com | 00000010 2b 5a 46 76 77 73 50 8b 0e 20 92 15 15 b0 36 cb |+ZFvwsP.. ....6.| +peer0.org1.example.com | 00000020 48 24 95 27 34 02 20 7f 96 c3 29 6a d7 13 fd 48 |H$.'4. ...)j...H| +peer0.org1.example.com | 00000030 df 5d c5 11 9d 48 5f 9e fd cb ee b3 b5 60 0a 4c |.]...H_......`.L| +peer0.org1.example.com | 00000040 25 bd a8 01 2e e7 ea |%......| +peer0.org1.example.com | [4461 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4462 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4463 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4464 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4465 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4466 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4467 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4468 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4469 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [446a 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [446b 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [446c 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [446d 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [446e 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [446f 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4470 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4471 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4472 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4473 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4474 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4475 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4476 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4477 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4478 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4479 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [447a 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [447b 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [447c 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [447d 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161038 +peer1.org2.example.com | [46be 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46bf 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46c0 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [46c1 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46c2 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:I\2245" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [46c3 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46c4 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [46c5 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46c6 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [46c7 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46c8 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [46c9 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [46ca 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46cb 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46cc 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46cd 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46ce 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46cf 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46d0 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [46d1 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 gate 1602702154337142300 evaluation starts +peer1.org2.example.com | [46d2 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46d3 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [46d4 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [46d5 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 principal evaluation fails +peer0.org1.example.com | [447e 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2047C84BD9306A5788AF25ABC72AF57839E60805BE6A36DAE7EA88E0C5625965 +peer0.org1.example.com | [447f 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4480 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4481 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4482 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4483 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4484 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4485 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4486 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4487 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4488 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4489 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [448a 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [448b 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [448c 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [448d 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [448e 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [448f 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4490 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4491 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4492 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4493 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4494 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4495 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4496 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4497 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4498 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4499 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [449a 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [449b 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [449c 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [449d 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [449e 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [449f 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [44a0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44a1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44a2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44a3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44a4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44a5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44a6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44a7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [44a8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 gate 1602702145863569400 evaluation starts +peer0.org1.example.com | [44a9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44aa 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44ab 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [44ac 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 principal evaluation fails +peer0.org1.example.com | [44ad 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 gate 1602702145863569400 evaluation fails +peer0.org1.example.com | [44ae 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44af 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44b0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44b1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 gate 1602702145864008400 evaluation starts +peer0.org1.example.com | [44b2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44b3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44b4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 principal matched by identity 0 +peer0.org1.example.com | [44b5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [44b6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [44b7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44b8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 gate 1602702145864008400 evaluation succeeds +peer0.org1.example.com | [44b9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44ba 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44bb 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44bc 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [44bd 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44be 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44bf 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44c0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44c1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44c2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44c3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44c4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [44c5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 gate 1602702145868026600 evaluation starts +peer0.org1.example.com | [44c6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44c7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44c8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [44c9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 principal evaluation fails +peer0.org1.example.com | [44ca 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 gate 1602702145868026600 evaluation fails +peer0.org1.example.com | [44cb 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44cc 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44cd 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44ce 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 gate 1602702145870046300 evaluation starts +peer0.org1.example.com | [44cf 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44d0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44d1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 principal matched by identity 0 +peer0.org1.example.com | [44d2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [44d3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [44d4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44d5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 gate 1602702145870046300 evaluation succeeds +peer0.org1.example.com | [44d6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44d7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44d8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44d9 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [44da 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44db 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [44dc 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44dd 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [44de 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [44df 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer1.org2.example.com | [46d6 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004796c40 gate 1602702154337142300 evaluation fails +peer1.org2.example.com | [46d7 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [46d8 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [46d9 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [46da 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 gate 1602702154338327200 evaluation starts +peer1.org2.example.com | [46db 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46dc 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [46dd 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46de 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 principal evaluation fails +peer1.org2.example.com | [46df 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047971b0 gate 1602702154338327200 evaluation fails +peer1.org2.example.com | [46e0 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46e1 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46e2 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46e3 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 gate 1602702154341488000 evaluation starts +peer1.org2.example.com | [46e4 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46e5 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [46e6 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 principal matched by identity 0 +peer1.org2.example.com | [46e7 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer1.org2.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer1.org2.example.com | [46e8 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer1.org2.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer1.org2.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer1.org2.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer1.org2.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer1.org2.example.com | [46e9 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [46ea 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [46eb 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004797720 gate 1602702154341488000 evaluation succeeds +peer1.org2.example.com | [46ec 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46ed 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46ee 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [46ef 10-14 19:02:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [46f0 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [46f1 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46f2 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [46f3 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer1.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer1.org2.example.com | [46f4 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer1.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer1.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer1.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer1.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer1.org2.example.com | [46f5 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [46f6 10-14 19:02:34.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46f7 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [46f8 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [46f9 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer1.org2.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer1.org2.example.com | [46fa 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer1.org2.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer1.org2.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer1.org2.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer1.org2.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer1.org2.example.com | [46fb 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44e0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [44e1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [44e2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44e3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44e4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44e5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44e6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44e7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44e8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44e9 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [44ea 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 gate 1602702145877189700 evaluation starts +peer0.org1.example.com | [44eb 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44ec 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44ed 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [44ee 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 principal evaluation fails +peer0.org1.example.com | [44ef 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 gate 1602702145877189700 evaluation fails +peer0.org1.example.com | [44f0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44f1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44f2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44f3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 gate 1602702145878206400 evaluation starts +peer0.org1.example.com | [44f4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44f5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [44f6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 principal matched by identity 0 +peer0.org1.example.com | [44f7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [44f8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [44f9 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44fa 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 gate 1602702145878206400 evaluation succeeds +peer0.org1.example.com | [44fb 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44fc 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [46fc 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [46fd 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46fe 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46ff 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4701 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4700 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4702 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4703 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer1.org2.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer1.org2.example.com | [4704 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer1.org2.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer1.org2.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer1.org2.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer1.org2.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer1.org2.example.com | [4705 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4706 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 ba 50 c1 9b 46 62 42 c8 11 47 48 |0D. w.P..FbB..GH| +peer1.org2.example.com | 00000010 34 6c 0d 02 75 84 99 7f 53 41 8e 45 2e d2 2f 82 |4l..u...SA.E../.| +peer1.org2.example.com | 00000020 35 57 47 05 02 20 72 f1 0a 4d f9 91 f1 21 6f 15 |5WG.. r..M...!o.| +peer1.org2.example.com | 00000030 42 01 29 ab 2c 27 0e 40 80 40 4a 0a 57 6a 32 e8 |B.).,'.@.@J.Wj2.| +peer1.org2.example.com | 00000040 cf ee 3e 49 94 35 |..>I.5| +peer1.org2.example.com | [4707 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4708 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4709 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [470a 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [470b 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [470c 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [470d 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [470e 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [470f 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4710 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4711 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4712 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4713 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4714 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4715 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 gate 1602702154372502600 evaluation starts +peer1.org2.example.com | [4716 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4717 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4718 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [4719 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 principal evaluation fails +peer1.org2.example.com | [471a 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd060 gate 1602702154372502600 evaluation fails +peer1.org2.example.com | [471b 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [471c 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [471d 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [471e 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 gate 1602702154373573800 evaluation starts +peer1.org2.example.com | [471f 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4720 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4721 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4722 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 principal evaluation fails +peer1.org2.example.com | [4723 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cd5d0 gate 1602702154373573800 evaluation fails +peer1.org2.example.com | [4724 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4725 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4726 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4727 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 gate 1602702154374425600 evaluation starts +peer1.org2.example.com | [4728 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4729 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [472a 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 principal matched by identity 0 +peer1.org2.example.com | [472b 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer1.org2.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer1.org2.example.com | [472c 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer1.org2.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer1.org2.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer1.org2.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer1.org2.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer1.org2.example.com | [472d 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [472e 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cdb40 gate 1602702154374425600 evaluation succeeds +peer1.org2.example.com | [472f 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4730 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4731 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4732 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4733 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4734 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4735 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4736 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer1.org2.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer1.org2.example.com | [4737 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer1.org2.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer1.org2.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer1.org2.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer1.org2.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer1.org2.example.com | [4738 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4739 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [473a 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [473b 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer1.org2.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer1.org2.example.com | [473c 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer1.org2.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer1.org2.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer1.org2.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer1.org2.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer1.org2.example.com | [473d 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44fd 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44fe 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [44ff 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4500 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4501 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4502 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4503 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4504 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4505 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4506 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4507 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 gate 1602702145890688200 evaluation starts +peer0.org1.example.com | [4508 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4509 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [450a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [450b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 principal evaluation fails +peer0.org1.example.com | [450c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 gate 1602702145890688200 evaluation fails +peer0.org1.example.com | [450d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [450e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [450f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4510 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 gate 1602702145891014200 evaluation starts +peer0.org1.example.com | [4511 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4512 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4513 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 principal matched by identity 0 +peer0.org1.example.com | [4514 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4515 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4516 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4517 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 gate 1602702145891014200 evaluation succeeds +peer0.org1.example.com | [4518 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4519 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [451a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [451b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [451c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [451d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [451e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [451f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4520 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4521 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4522 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4523 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4524 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4525 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4526 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4527 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4528 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4529 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [452a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 gate 1602702145893404100 evaluation starts +peer0.org1.example.com | [452b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [452c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [452d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [452e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 principal evaluation fails +peer0.org1.example.com | [452f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 gate 1602702145893404100 evaluation fails +peer0.org1.example.com | [4530 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4531 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4532 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4533 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 gate 1602702145893866600 evaluation starts +peer0.org1.example.com | [4534 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4535 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4536 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 principal matched by identity 0 +peer0.org1.example.com | [4537 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4538 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4539 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [453a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 gate 1602702145893866600 evaluation succeeds +peer1.org2.example.com | [473e 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [473f 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4740 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4741 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4742 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4743 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4744 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4745 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4746 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4747 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4748 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4749 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [474a 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [474b 10-14 19:02:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [474c 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [474d 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [474e 10-14 19:02:34.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [474f 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4750 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4751 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4752 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4753 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4754 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4755 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4756 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4757 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [4758 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 gate 1602702154550856100 evaluation starts +peer1.org2.example.com | [4759 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [453b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [453c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [453d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [475a 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [475b 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [475c 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 principal evaluation fails +peer1.org2.example.com | [475d 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804a80 gate 1602702154550856100 evaluation fails +peer1.org2.example.com | [475e 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [475f 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [4760 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4761 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 gate 1602702154553140800 evaluation starts +peer1.org2.example.com | [4762 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4763 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [4764 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4765 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 principal evaluation fails +peer1.org2.example.com | [4766 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004804ff0 gate 1602702154553140800 evaluation fails +peer1.org2.example.com | [4767 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4768 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4769 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [476a 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 gate 1602702154555859200 evaluation starts +peer1.org2.example.com | [476b 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [476c 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [476d 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 principal matched by identity 0 +peer1.org2.example.com | [476e 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer1.org2.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer1.org2.example.com | [476f 10-14 19:02:34.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer1.org2.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer1.org2.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer1.org2.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer1.org2.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer1.org2.example.com | [4770 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4771 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4772 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4773 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4774 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4775 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004805560 gate 1602702154555859200 evaluation succeeds +peer1.org2.example.com | [4776 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4777 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4778 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4779 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [477a 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [477b 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [453e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [453f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4540 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4541 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4542 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4543 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4544 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4545 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4546 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4547 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 gate 1602702145895772200 evaluation starts +peer0.org1.example.com | [4548 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4549 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [454a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [454b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 principal evaluation fails +peer0.org1.example.com | [454c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 gate 1602702145895772200 evaluation fails +peer0.org1.example.com | [454d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [454e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [454f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4550 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 gate 1602702145896306400 evaluation starts +peer0.org1.example.com | [4551 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4552 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4553 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 principal matched by identity 0 +peer0.org1.example.com | [4554 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4555 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4556 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4557 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 gate 1602702145896306400 evaluation succeeds +peer0.org1.example.com | [4558 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4559 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [455a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [455b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [455c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [455d 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [455e 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [455f 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4560 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [477c 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [477d 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [477e 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [477f 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4780 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4781 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4782 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4783 10-14 19:02:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4784 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4785 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4786 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4561 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4562 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4787 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [4788 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [4789 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [478a 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [478b 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [478c 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [478d 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [478e 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [478f 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4790 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4791 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4792 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [4793 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4794 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:45768 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4795 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4796 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [4797 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4798 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4799 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [479a 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [479b 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4563 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4564 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4565 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [4566 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [4567 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [4568 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4569 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [456a 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [456b 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [456c 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [456d 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [456e 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [456f 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4570 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4571 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4572 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4573 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4574 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4575 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4576 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4577 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4578 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4579 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [457a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [457b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [457c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [457d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [479c 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [479d 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [479e 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [479f 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 gate 1602702154656573700 evaluation starts +peer1.org2.example.com | [47a0 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47a1 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [47a2 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [47a3 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 principal evaluation fails +peer1.org2.example.com | [47a4 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004832d10 gate 1602702154656573700 evaluation fails +peer1.org2.example.com | [47a5 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [47a6 10-14 19:02:34.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [47a7 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [47a8 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 gate 1602702154660195200 evaluation starts +peer1.org2.example.com | [47a9 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47aa 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [47ab 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [47ac 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 principal evaluation fails +peer1.org2.example.com | [47ad 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004833280 gate 1602702154660195200 evaluation fails +peer1.org2.example.com | [47ae 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47af 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47b0 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [47b1 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 gate 1602702154664444300 evaluation starts +peer1.org2.example.com | [47b2 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47b3 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 processing identity 0 with bytes of 115a6c0 +peer1.org2.example.com | [47b4 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 principal matched by identity 0 +peer1.org2.example.com | [47b5 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 1a c9 aa 0e a0 c8 a0 f4 40 10 dc c7 69 0a dc |.........@...i..| +peer1.org2.example.com | 00000010 4a 10 32 ca 5b 61 a6 d6 55 69 b6 24 6b fe 41 fc |J.2.[a..Ui.$k.A.| +peer1.org2.example.com | [47b6 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 5e fc 9c 1a 86 51 94 43 88 9d |0D. xD^....Q.C..| +peer1.org2.example.com | 00000010 a4 02 40 2e 67 ca 4b 9a 59 dc 7f d7 dc 55 66 94 |..@.g.K.Y....Uf.| +peer1.org2.example.com | 00000020 7e 1f bf e0 02 20 6c 36 dc 0d 7c 63 4e b5 e4 77 |~.... l6..|cN..w| +peer1.org2.example.com | 00000030 80 f2 15 d6 32 ad 34 98 69 f2 14 72 92 1e 5b 6e |....2.4.i..r..[n| +peer1.org2.example.com | 00000040 65 e8 f8 e1 fa 82 |e.....| +peer1.org2.example.com | [47b7 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [47b8 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048337f0 gate 1602702154664444300 evaluation succeeds +peer1.org2.example.com | [47b9 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47ba 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47bb 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [47bc 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [47bd 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [47be 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [47bf 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [47c0 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [47c1 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [47c2 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c3 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c4 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c5 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [47c6 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c7 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c8 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c9 10-14 19:02:34.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [457e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 gate 1602702146172143200 evaluation starts +peer0.org1.example.com | [457f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4580 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4581 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4582 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 principal evaluation fails +peer0.org1.example.com | [4583 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 gate 1602702146172143200 evaluation fails +peer0.org1.example.com | [4584 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4585 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4586 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4587 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 gate 1602702146175855400 evaluation starts +peer0.org1.example.com | [4588 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4589 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [458a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 principal matched by identity 0 +peer0.org1.example.com | [458b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer0.org1.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer0.org1.example.com | [458c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer0.org1.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer0.org1.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer0.org1.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer0.org1.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org1.example.com | [458d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [458e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 gate 1602702146175855400 evaluation succeeds +peer0.org1.example.com | [458f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4590 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4591 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4592 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4593 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4594 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4595 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4596 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4597 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4598 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4599 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [459a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [459b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [459c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [459d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [459e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [459f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47ca 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [47cb 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cc 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47cd 10-14 19:02:34.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [47ce 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cf 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.7:37098 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [47d0 10-14 19:02:34.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45a0 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > alive: alive: alive: +peer0.org1.example.com | [45a1 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [45a2 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45a3 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [45a4 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [45a5 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45a6 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45a7 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45a8 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45a9 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45aa 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ab 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45ac 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45ad 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45ae 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45af 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b0 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b1 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [45b2 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45b3 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b4 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [45b7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45b9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45ba 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45bb 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [45bc 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [45bd 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [45be 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 gate 1602702146304367300 evaluation starts +peer0.org1.example.com | [45bf 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45c0 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [45c1 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [45c3 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45c2 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 principal evaluation fails +peer0.org1.example.com | [45c4 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 gate 1602702146304367300 evaluation fails +peer0.org1.example.com | [45c5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45c6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [45c7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [45c8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 gate 1602702146308371200 evaluation starts +peer0.org1.example.com | [45c9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45ca 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [45cb 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 principal matched by identity 0 +peer0.org1.example.com | [45cc 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer0.org1.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer0.org1.example.com | [45cd 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer0.org1.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer0.org1.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer0.org1.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer0.org1.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer0.org1.example.com | [45ce 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45cf 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 gate 1602702146308371200 evaluation succeeds +peer0.org1.example.com | [45d0 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45d1 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45d2 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45d3 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45d4 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [45d5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [45d6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [45d7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [45d8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [45d9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45da 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45db 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45dc 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [45dd 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45de 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45df 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45e0 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45e2 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e3 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45e1 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > alive: alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: +peer0.org1.example.com | [45e4 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e5 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e6 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e7 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [45e8 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45e9 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ea 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45eb 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ec 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [45ed 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ee 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ef 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f0 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45f1 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f2 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [45f3 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer0.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer0.org1.example.com | [45f4 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer0.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer0.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer0.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer0.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer0.org1.example.com | [45f5 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [45f6 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 be b5 38 5d ff ce d6 e9 6a 32 |0E.!....8]....j2| +peer0.org1.example.com | 00000010 2c 8e 4b 66 74 cc 02 cd b1 03 13 ef 03 ec 8d fd |,.Kft...........| +peer0.org1.example.com | 00000020 dd 42 65 e2 f6 02 20 12 c1 0d 32 1a 69 1f 26 f2 |.Be... ...2.i.&.| +peer0.org1.example.com | 00000030 12 c1 67 96 5e 2d d9 ea 96 d8 5d 4c 28 11 b4 d9 |..g.^-....]L(...| +peer0.org1.example.com | 00000040 57 93 27 ae eb d9 f3 |W.'....| +peer0.org1.example.com | [45f7 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [45f8 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [45f9 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [45fa 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [45fb 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [45fc 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45fd 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45fe 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ff 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4600 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4601 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4602 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4603 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [4604 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4605 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4606 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4607 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4608 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4609 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [460a 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [460b 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [460c 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [460d 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [460e 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [460f 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4610 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4611 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4612 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4613 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4614 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4615 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4616 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4617 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4618 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4619 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [461a 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [461b 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [461c 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [461d 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [461e 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [461f 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4620 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161039 +peer0.org1.example.com | [4621 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9B14E4E742B335A5608DFABF11505A115B4353D87D99F08C5B20305B3E5F89FB +peer0.org1.example.com | [4622 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4623 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4624 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4625 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4626 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4627 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4628 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4629 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [462a 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [462b 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [462c 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [462d 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [462e 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [462f 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4630 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4631 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4632 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4633 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4634 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4635 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer0.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer0.org1.example.com | [4636 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer0.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer0.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer0.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer0.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer0.org1.example.com | [4637 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4638 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4639 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [463a 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [463b 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [463c 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [463d 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [463e 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [463f 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4640 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4641 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 gate 1602702146640162700 evaluation starts +peer0.org1.example.com | [4642 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4643 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4644 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4645 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 principal evaluation fails +peer0.org1.example.com | [4646 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 gate 1602702146640162700 evaluation fails +peer0.org1.example.com | [4647 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4648 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4649 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [464a 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 gate 1602702146640487400 evaluation starts +peer0.org1.example.com | [464b 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [464c 10-14 19:02:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [464d 10-14 19:02:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [464e 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [464f 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 principal matched by identity 0 +peer0.org1.example.com | [4650 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +peer0.org1.example.com | 00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +peer0.org1.example.com | [4651 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +peer0.org1.example.com | 00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +peer0.org1.example.com | 00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +peer0.org1.example.com | 00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +peer0.org1.example.com | 00000040 09 e5 d5 79 4d e8 |...yM.| +peer0.org1.example.com | [4652 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4653 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 gate 1602702146640487400 evaluation succeeds +peer0.org1.example.com | [4654 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4655 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4656 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4657 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4658 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4659 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [465a 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [465b 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer0.org1.example.com | [465c 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer0.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer0.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer0.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer0.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer0.org1.example.com | [465d 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [465e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [465f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4660 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4661 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4662 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4663 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4664 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer0.org1.example.com | [4665 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer0.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer0.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer0.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer0.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer0.org1.example.com | [4666 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4667 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 ca 84 57 9a c6 34 e3 ad 46 c9 ed |0D. ...W..4..F..| +peer0.org1.example.com | 00000010 70 54 e6 fd f7 3d 59 f3 b0 27 1c ce 25 1d 16 d3 |pT...=Y..'..%...| +peer0.org1.example.com | 00000020 da cc 44 ce 02 20 3f e8 c0 a4 2d c2 d3 6c 17 ad |..D.. ?...-..l..| +peer0.org1.example.com | 00000030 d6 8d 3d 39 10 71 28 3d 45 ed d8 b6 d2 16 5c a1 |..=9.q(=E.....\.| +peer0.org1.example.com | 00000040 35 98 99 98 57 1a |5...W.| +peer0.org1.example.com | [4668 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4669 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [466a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [466b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [466c 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [466d 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [466e 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [466f 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [4670 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4671 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [4672 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4673 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +peer0.org1.example.com | 00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +peer0.org1.example.com | [4674 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +peer0.org1.example.com | 00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +peer0.org1.example.com | 00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +peer0.org1.example.com | 00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +peer0.org1.example.com | 00000040 39 81 9b 00 f6 36 |9....6| +peer0.org1.example.com | [4675 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4676 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4677 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4678 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4679 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [467a 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [467b 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [467c 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [467d 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [467e 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [467f 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4680 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 gate 1602702146739073400 evaluation starts +peer0.org1.example.com | [4681 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4682 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4683 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4684 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 principal evaluation fails +peer0.org1.example.com | [4685 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 gate 1602702146739073400 evaluation fails +peer0.org1.example.com | [4686 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4687 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4688 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4689 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 gate 1602702146739597700 evaluation starts +peer0.org1.example.com | [468a 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [468b 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [468c 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 principal matched by identity 0 +peer0.org1.example.com | [468d 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +peer0.org1.example.com | 00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +peer0.org1.example.com | [468e 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +peer0.org1.example.com | 00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +peer0.org1.example.com | 00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +peer0.org1.example.com | 00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +peer0.org1.example.com | 00000040 95 16 6f 3b 97 af |..o;..| +peer0.org1.example.com | [468f 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4690 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 gate 1602702146739597700 evaluation succeeds +peer0.org1.example.com | [4691 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4692 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4693 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4694 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4695 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4696 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4697 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4698 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +peer0.org1.example.com | 00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +peer0.org1.example.com | [4699 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +peer0.org1.example.com | 00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +peer0.org1.example.com | 00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +peer0.org1.example.com | 00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +peer0.org1.example.com | 00000040 83 51 6b da c9 10 |.Qk...| +peer0.org1.example.com | [469a 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [469b 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [469c 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [469d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [469e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [469f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46a0 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46a1 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46a2 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46a3 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41920 +peer0.org1.example.com | [46a4 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00571f130 +peer0.org1.example.com | [46a5 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [46a6 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [46a7 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [46a8 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [46a9 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 8f c0 44 97 76 b1 76 a2 7e 44 f9 5a 6e 3d ce |r..D.v.v.~D.Zn=.| +peer0.org1.example.com | 00000010 44 0f 77 8d 8d 13 4c f1 ea 03 00 ff 1a 4f 94 e4 |D.w...L......O..| +peer0.org1.example.com | [46aa 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f6 2a a2 d5 10 14 4c 60 66 2a b9 |0D. ..*....L`f*.| +peer0.org1.example.com | 00000010 ad 5c a7 c0 ea a0 8a 69 a1 97 73 4b f3 fc c4 ca |.\.....i..sK....| +peer0.org1.example.com | 00000020 7a a8 df 93 02 20 0b c7 5f 43 02 8d 75 48 bb 76 |z.... .._C..uH.v| +peer0.org1.example.com | 00000030 c7 cb 45 51 08 93 92 e8 51 a8 56 3d c4 d1 0a 8f |..EQ....Q.V=....| +peer0.org1.example.com | 00000040 4b 96 f2 21 99 f8 |K..!..| +peer0.org1.example.com | [46ab 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [46ac 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0054b1420, header 0xc0056e8af0 +peer0.org1.example.com | [46ad 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [46ae 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] processing txid: c59e06ab979bee906aa0d8487f64e368ded99c115c399267fe64360796095530 +peer0.org1.example.com | [46af 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] Entry chaincode: name:"cscc" +peer0.org1.example.com | [46b0 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO [][c59e06ab] Entry chaincode: name:"cscc" +peer0.org1.example.com | [46b1 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [46b2 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [46b3 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 8f c0 44 97 76 b1 76 a2 7e 44 f9 5a 6e 3d ce |r..D.v.v.~D.Zn=.| +peer0.org1.example.com | 00000010 44 0f 77 8d 8d 13 4c f1 ea 03 00 ff 1a 4f 94 e4 |D.w...L......O..| +peer0.org1.example.com | [46b4 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f6 2a a2 d5 10 14 4c 60 66 2a b9 |0D. ..*....L`f*.| +peer0.org1.example.com | 00000010 ad 5c a7 c0 ea a0 8a 69 a1 97 73 4b f3 fc c4 ca |.\.....i..sK....| +peer0.org1.example.com | 00000020 7a a8 df 93 02 20 0b c7 5f 43 02 8d 75 48 bb 76 |z.... .._C..uH.v| +peer0.org1.example.com | 00000030 c7 cb 45 51 08 93 92 e8 51 a8 56 3d c4 d1 0a 8f |..EQ....Q.V=....| +peer0.org1.example.com | 00000040 4b 96 f2 21 99 f8 |K..!..| +peer0.org1.example.com | [46b5 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [c59e06ab] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [46b6 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [c59e06ab] notifying Txid:c59e06ab979bee906aa0d8487f64e368ded99c115c399267fe64360796095530, channelID: +peer0.org1.example.com | [46b7 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [46b8 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO [][c59e06ab] Exit chaincode: name:"cscc" (3ms) +peer0.org1.example.com | [46b9 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] Exit +peer0.org1.example.com | [46ba 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41920 +peer0.org1.example.com | [46bb 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41920 grpc.code=OK grpc.call_duration=14.0425ms +peer0.org1.example.com | [46bc 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41920: read: connection reset by peer +peer0.org1.example.com | [46bd 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [46be 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [46bf 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [46c0 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [46c1 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [46c2 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [46c3 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 3e 40 d2 2f c0 be 56 45 1b 6b 5a 07 b3 23 56 |>>@./..VE.kZ..#V| +peer0.org1.example.com | 00000010 f6 5b ee a4 cf 5d 41 1d 70 bf 5e 20 f2 83 6b 10 |.[...]A.p.^ ..k.| +peer0.org1.example.com | [46c4 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 32 48 b0 d5 00 44 25 c1 19 57 4f |0D. J2H...D%..WO| +peer0.org1.example.com | 00000010 db 3d e6 54 f8 29 52 dc 9d 7c fa 40 ed f1 60 e7 |.=.T.)R..|.@..`.| +peer0.org1.example.com | 00000020 b3 a6 d4 74 02 20 33 50 fb f5 96 c8 51 b7 b2 5a |...t. 3P....Q..Z| +peer0.org1.example.com | 00000030 2c a2 19 62 8b 2c e4 e2 fb 1c ef 32 63 83 00 ca |,..b.,.....2c...| +peer0.org1.example.com | 00000040 a2 fb 43 c6 4e 39 |..C.N9| +peer0.org1.example.com | [46c5 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46c6 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46c7 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46c8 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [46c9 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [46ca 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41928 +peer0.org1.example.com | [46cb 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc005788640 +peer0.org1.example.com | [46cc 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [46cd 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [46ce 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [46cf 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [46d0 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 92 ba 45 a0 48 ef 6e 95 c2 ef c6 98 f7 7a cb |...E.H.n......z.| +peer0.org1.example.com | 00000010 eb 90 76 a1 a8 ba dc b4 e6 5c 74 20 69 2b a5 27 |..v......\t i+.'| +peer0.org1.example.com | [46d1 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 11 2e ba 66 e0 da 57 3a 62 60 d6 |0D. N...f..W:b`.| +peer0.org1.example.com | 00000010 75 f5 3b f4 0b bd 05 de 6a f4 20 5a e0 51 da 83 |u.;.....j. Z.Q..| +peer0.org1.example.com | 00000020 41 3e 09 62 02 20 02 88 ac d4 ad d7 94 a2 2c 79 |A>.b. ........,y| +peer0.org1.example.com | 00000030 47 c8 e4 4a f1 df 04 fd 64 72 30 c7 39 19 44 92 |G..J....dr0.9.D.| +peer0.org1.example.com | 00000040 a8 bd 18 d6 84 9c |......| +peer0.org1.example.com | [46d2 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [46d3 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc005716b60, header 0xc005788a50 +peer0.org1.example.com | [46d4 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [46d5 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] processing txid: a2892daa620bb920e1807518327b818fca2e601b6ed4ccacfdaa3d96ccf935f2 +peer0.org1.example.com | [46d6 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] Entry chaincode: name:"qscc" +peer0.org1.example.com | [46d7 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> INFO [][a2892daa] Entry chaincode: name:"qscc" +peer0.org1.example.com | [46d8 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [46d9 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [46da 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [46db 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [46dc 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [46dd 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [46de 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [46df 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46e0 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [46e1 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 gate 1602702149256769900 evaluation starts +peer0.org1.example.com | [46e2 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46e3 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [46e4 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [46e5 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [46e6 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [46e7 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 principal matched by identity 0 +peer0.org1.example.com | [46e8 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 92 ba 45 a0 48 ef 6e 95 c2 ef c6 98 f7 7a cb |...E.H.n......z.| +peer0.org1.example.com | 00000010 eb 90 76 a1 a8 ba dc b4 e6 5c 74 20 69 2b a5 27 |..v......\t i+.'| +peer0.org1.example.com | [46e9 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 11 2e ba 66 e0 da 57 3a 62 60 d6 |0D. N...f..W:b`.| +peer0.org1.example.com | 00000010 75 f5 3b f4 0b bd 05 de 6a f4 20 5a e0 51 da 83 |u.;.....j. Z.Q..| +peer0.org1.example.com | 00000020 41 3e 09 62 02 20 02 88 ac d4 ad d7 94 a2 2c 79 |A>.b. ........,y| +peer0.org1.example.com | 00000030 47 c8 e4 4a f1 df 04 fd 64 72 30 c7 39 19 44 92 |G..J....dr0.9.D.| +peer0.org1.example.com | 00000040 a8 bd 18 d6 84 9c |......| +peer0.org1.example.com | [46ea 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [46eb 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 gate 1602702149256769900 evaluation succeeds +peer0.org1.example.com | [46ec 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46ed 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46ee 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46ef 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [46f0 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [a2892daa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [46f1 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [a2892daa] notifying Txid:a2892daa620bb920e1807518327b818fca2e601b6ed4ccacfdaa3d96ccf935f2, channelID: +peer0.org1.example.com | [46f2 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [46f3 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> INFO [][a2892daa] Exit chaincode: name:"qscc" (11ms) +peer0.org1.example.com | [46f4 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] Exit +peer0.org1.example.com | [46f5 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41928 +peer0.org1.example.com | [46f6 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41928 grpc.code=OK grpc.call_duration=16.6469ms +peer0.org1.example.com | [46f7 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41928: read: connection reset by peer +peer0.org1.example.com | [46f8 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [46f9 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46fa 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46fb 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [46fc 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [46fd 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46fe 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [46ff 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4700 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4701 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4702 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4703 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4704 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [4705 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4706 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4707 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4708 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4709 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [470a 10-14 19:02:29.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [470b 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [470c 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [470d 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [470e 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [470f 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4710 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4711 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 gate 1602702149926070200 evaluation starts +peer0.org1.example.com | [4712 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4713 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4714 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4715 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 principal evaluation fails +peer0.org1.example.com | [4716 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 gate 1602702149926070200 evaluation fails +peer0.org1.example.com | [4717 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4718 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4719 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [471a 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 gate 1602702149929449100 evaluation starts +peer0.org1.example.com | [471b 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [471c 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [471d 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 principal matched by identity 0 +peer0.org1.example.com | [471e 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [471f 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4720 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4721 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 gate 1602702149929449100 evaluation succeeds +peer0.org1.example.com | [4722 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4723 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4724 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4725 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4726 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4727 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4728 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4729 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [472a 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [472b 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [472c 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [472d 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [472e 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 gate 1602702149939565200 evaluation starts +peer0.org1.example.com | [472f 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4730 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4731 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4732 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 principal evaluation fails +peer0.org1.example.com | [4733 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 gate 1602702149939565200 evaluation fails +peer0.org1.example.com | [4734 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4735 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4736 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4737 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 gate 1602702149941579500 evaluation starts +peer0.org1.example.com | [4738 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4739 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [473a 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 principal matched by identity 0 +peer0.org1.example.com | [473b 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [473c 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [473d 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [473e 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 gate 1602702149941579500 evaluation succeeds +peer0.org1.example.com | [473f 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4740 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4741 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4742 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4743 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4744 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4745 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4746 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [4747 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4748 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4749 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [474a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [474b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [474c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [474d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [474e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [474f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4750 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4751 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4752 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 gate 1602702149957193600 evaluation starts +peer0.org1.example.com | [4753 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4754 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4755 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4756 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 principal evaluation fails +peer0.org1.example.com | [4757 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 gate 1602702149957193600 evaluation fails +peer0.org1.example.com | [4758 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4759 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [475a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [475b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 gate 1602702149957498900 evaluation starts +peer0.org1.example.com | [475c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [475d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [475e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 principal matched by identity 0 +peer0.org1.example.com | [475f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4760 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4761 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4762 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 gate 1602702149957498900 evaluation succeeds +peer0.org1.example.com | [4763 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4764 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4765 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4766 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4767 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4768 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4769 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [476a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [476b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [476c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [476d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [476e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [476f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 gate 1602702149958634700 evaluation starts +peer0.org1.example.com | [4770 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4771 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4772 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4773 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 principal evaluation fails +peer0.org1.example.com | [4774 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 gate 1602702149958634700 evaluation fails +peer0.org1.example.com | [4775 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4776 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4777 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4778 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 gate 1602702149961390200 evaluation starts +peer0.org1.example.com | [4779 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [477a 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [477b 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 principal matched by identity 0 +peer0.org1.example.com | [477c 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [477e 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [477d 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [477f 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4780 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4781 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4782 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4783 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4785 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4786 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 gate 1602702149961390200 evaluation succeeds +peer0.org1.example.com | [4787 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4788 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4784 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4789 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [478a 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [478b 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [478c 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [478e 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [478d 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [478f 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4790 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [4791 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4792 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4793 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4794 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4795 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4796 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4797 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4798 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4799 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [479a 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [479b 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [479c 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 gate 1602702149973607300 evaluation starts +peer0.org1.example.com | [479d 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [479e 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [479f 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47a0 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 principal evaluation fails +peer0.org1.example.com | [47a1 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 gate 1602702149973607300 evaluation fails +peer0.org1.example.com | [47a2 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47a3 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47a4 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47a5 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 gate 1602702149976389000 evaluation starts +peer0.org1.example.com | [47a6 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47a7 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [47a8 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 principal matched by identity 0 +peer0.org1.example.com | [47a9 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [47aa 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [47ab 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47ac 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 gate 1602702149976389000 evaluation succeeds +peer0.org1.example.com | [47ad 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47ae 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47af 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47b0 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47b1 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47b2 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47b3 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [47b4 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47b5 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47b6 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47b7 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47b8 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47b9 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 gate 1602702149984008000 evaluation starts +peer0.org1.example.com | [47ba 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47bb 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [47bc 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47bd 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 principal evaluation fails +peer0.org1.example.com | [47be 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 gate 1602702149984008000 evaluation fails +peer0.org1.example.com | [47bf 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c0 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c1 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47c2 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 gate 1602702149989100300 evaluation starts +peer0.org1.example.com | [47c3 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47c4 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [47c5 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 principal matched by identity 0 +peer0.org1.example.com | [47c6 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [47c7 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [47c8 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47c9 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 gate 1602702149989100300 evaluation succeeds +peer0.org1.example.com | [47ca 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47cb 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47cc 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47cd 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47ce 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47cf 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [47d0 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [47d1 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47d2 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [47d3 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [47d4 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d5 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d6 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d7 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d8 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d9 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47da 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [47db 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47dc 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [47dd 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47de 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [47df 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [47e0 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47e1 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [47e2 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47e3 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47e4 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47e5 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47e6 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47e7 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 gate 1602702150118124100 evaluation starts +peer0.org1.example.com | [47e8 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47e9 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [47ea 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47eb 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 principal evaluation fails +peer0.org1.example.com | [47ec 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 gate 1602702150118124100 evaluation fails +peer0.org1.example.com | [47ed 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47ee 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47ef 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47f0 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 gate 1602702150120479300 evaluation starts +peer0.org1.example.com | [47f1 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47f2 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [47f3 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 principal matched by identity 0 +peer0.org1.example.com | [47f4 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c3 8a 1b e3 8c 28 2e 93 03 d9 f7 e6 03 c6 4e |......(........N| +peer0.org1.example.com | 00000010 61 84 42 83 e2 6b e9 3a a9 89 9b 25 b1 a4 0f 5f |a.B..k.:...%..._| +peer0.org1.example.com | [47f5 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 54 1c 9b 02 19 d7 98 02 1a 03 |0E.!..T.........| +peer0.org1.example.com | 00000010 54 46 e4 79 3d 4e 71 51 29 d1 2b da 66 7f e2 93 |TF.y=NqQ).+.f...| +peer0.org1.example.com | 00000020 20 a6 2b e3 a4 02 20 45 80 43 07 9d 9d ea a7 c1 | .+... E.C......| +peer0.org1.example.com | 00000030 0c cb 21 b6 2f 5a 46 6f e2 f8 76 4a bb 9f ae 25 |..!./ZFo..vJ...%| +peer0.org1.example.com | 00000040 e7 6b 24 f8 2a b4 7b |.k$.*.{| +peer0.org1.example.com | [47f6 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47f7 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 gate 1602702150120479300 evaluation succeeds +peer0.org1.example.com | [47f8 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47f9 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47fa 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47fb 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47fc 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [47fd 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [47fe 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [47ff 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4800 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4801 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4802 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4803 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4804 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4805 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4806 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4807 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4808 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4809 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480a 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480b 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480c 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480d 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480e 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480f 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4810 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4811 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4812 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4813 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4814 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4815 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4816 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4817 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4818 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4819 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [481a 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [481b 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [481c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [481d 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [481e 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [481f 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4820 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4821 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4822 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4823 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4824 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4825 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4826 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4827 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 gate 1602702150200355700 evaluation starts +peer0.org1.example.com | [4828 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4829 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [482a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [482b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 principal evaluation fails +peer0.org1.example.com | [482c 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 gate 1602702150200355700 evaluation fails +peer0.org1.example.com | [482d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [482e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [482f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4830 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 gate 1602702150200789600 evaluation starts +peer0.org1.example.com | [4831 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4832 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4833 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 principal matched by identity 0 +peer0.org1.example.com | [4834 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer0.org1.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer0.org1.example.com | [4835 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer0.org1.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer0.org1.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer0.org1.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer0.org1.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer0.org1.example.com | [4836 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4837 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 gate 1602702150200789600 evaluation succeeds +peer0.org1.example.com | [4838 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4839 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [483a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [483b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [483c 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [483d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [483e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [483f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4840 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4841 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4842 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4843 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4844 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4845 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4846 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4847 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4848 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4849 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: alive: alive: +peer0.org1.example.com | [484a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [484b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [484c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [484d 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [484e 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [484f 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4850 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4851 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4852 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4853 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4854 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4855 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4856 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4857 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4858 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 gate 1602702150219179500 evaluation starts +peer0.org1.example.com | [4859 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [485a 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [485b 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [485c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 principal evaluation fails +peer0.org1.example.com | [485d 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 gate 1602702150219179500 evaluation fails +peer0.org1.example.com | [485e 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [485f 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4860 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4861 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 gate 1602702150219427500 evaluation starts +peer0.org1.example.com | [4862 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4863 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4864 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 principal matched by identity 0 +peer0.org1.example.com | [4865 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 f6 04 cd 9b 51 7c ab 98 b4 8f 30 cf de 0c 59 |f....Q|....0...Y| +peer0.org1.example.com | 00000010 12 b8 0b 70 40 6d f4 a8 91 74 03 01 9b 9e 64 3d |...p@m...t....d=| +peer0.org1.example.com | [4866 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 2e a9 99 f1 3d 4b 1e e0 1d 00 bf |0D. .....=K.....| +peer0.org1.example.com | 00000010 0d 05 9b 41 66 b0 39 ff ca 77 b5 68 03 35 b4 d6 |...Af.9..w.h.5..| +peer0.org1.example.com | 00000020 61 a3 c8 89 02 20 29 85 1a b2 ac 78 ca 20 da c5 |a.... )....x. ..| +peer0.org1.example.com | 00000030 e1 b1 a4 03 a8 be ed 44 96 ca f6 70 5c 9b 29 b8 |.......D...p\.).| +peer0.org1.example.com | 00000040 19 0f c9 e0 2f e8 |..../.| +peer0.org1.example.com | [4867 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4868 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 gate 1602702150219427500 evaluation succeeds +peer0.org1.example.com | [4869 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [486a 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [486b 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [486c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [486d 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [486e 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [486f 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4870 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4871 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4872 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4873 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4874 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4875 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4876 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4877 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4878 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4879 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [487a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [487b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [487c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [487d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [487e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [487f 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4880 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4881 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4882 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4883 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4884 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4885 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4886 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4887 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4888 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4889 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488a 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488b 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488c 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [488d 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [488e 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [488f 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4890 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4891 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4892 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4893 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4894 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4895 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4896 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4897 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4898 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4899 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [489a 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [489b 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [489c 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [489d 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [489e 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [489f 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [48a0 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [48a1 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48a2 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [48a3 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48a4 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48a5 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [48a6 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [48a7 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [48a8 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 gate 1602702150305745200 evaluation starts +peer0.org1.example.com | [48a9 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48aa 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [48ab 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [48ac 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 principal evaluation fails +peer0.org1.example.com | [48ad 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 gate 1602702150305745200 evaluation fails +peer0.org1.example.com | [48ae 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48af 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48b0 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [48b1 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 gate 1602702150306156200 evaluation starts +peer0.org1.example.com | [48b2 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48b3 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [48b4 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 principal matched by identity 0 +peer0.org1.example.com | [48b5 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer0.org1.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer0.org1.example.com | [48b6 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer0.org1.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer0.org1.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer0.org1.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer0.org1.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer0.org1.example.com | [48b7 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [48b8 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 gate 1602702150306156200 evaluation succeeds +peer0.org1.example.com | [48b9 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48ba 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48bb 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [48bc 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [48bd 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [48be 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [48bf 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [48c0 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [48c1 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [48c2 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48c3 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48c4 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48c5 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [48c6 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48c7 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48c8 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48c9 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [48ca 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [48cb 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [48cc 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48cd 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ce 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [48cf 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [48d0 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [48d1 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48d2 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48d3 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48d4 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48d5 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48d6 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [48d7 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 5b 8b 8f 4b 7d c7 23 1b 45 b9 d5 fa 10 e5 d4 |I[..K}.#.E......| +peer0.org1.example.com | 00000010 a0 18 43 73 8e 23 c3 fe 33 77 ae bf ac a7 e0 09 |..Cs.#..3w......| +peer0.org1.example.com | [48d8 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 0b d5 56 da 56 04 61 ad 3f c3 1b |0D. [..V.V.a.?..| +peer0.org1.example.com | 00000010 b4 93 09 a5 41 7a d0 22 9b 28 1f 50 77 b8 32 b3 |....Az.".(.Pw.2.| +peer0.org1.example.com | 00000020 49 7f 2b 40 02 20 6f bb 95 b1 8e c1 12 8a dc da |I.+@. o.........| +peer0.org1.example.com | 00000030 4c 1d 8a 2f 29 65 b5 8c bc 33 b4 99 04 f3 37 c7 |L../)e...3....7.| +peer0.org1.example.com | 00000040 b8 84 bd 2f 32 42 |.../2B| +peer0.org1.example.com | [48d9 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48da 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [48db 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [48dc 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [48dd 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [48de 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48df 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e0 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e1 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e2 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e3 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e4 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [48e5 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e6 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [48e7 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48e8 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e9 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48ea 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48eb 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48ec 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ed 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48ee 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ef 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48f0 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48f1 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48f2 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48f3 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48f4 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [48f5 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f6 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f7 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [48f8 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [48f9 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48fa 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [48fb 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [48fc 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48fd 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [48fe 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [48ff 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer0.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer0.org1.example.com | [4900 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer0.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer0.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer0.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer0.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer0.org1.example.com | [4901 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4902 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 77 72 57 e4 83 e1 49 ae d9 aa 64 |0D. iwrW...I...d| +peer0.org1.example.com | 00000010 1b 62 ac a0 78 92 7b 41 89 63 87 df b8 be d0 8b |.b..x.{A.c......| +peer0.org1.example.com | 00000020 f0 ca d0 a0 02 20 09 c4 46 18 a4 92 8e 59 41 15 |..... ..F....YA.| +peer0.org1.example.com | 00000030 db f3 4d 41 73 18 c2 c5 e5 81 b1 22 3d ae 0e ee |..MAs......"=...| +peer0.org1.example.com | 00000040 e8 88 8c c4 22 9c |....".| +peer0.org1.example.com | [4903 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4904 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4905 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4906 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4907 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4908 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4909 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [490a 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [490b 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [490c 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [490d 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [490e 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [490f 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4910 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4911 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4912 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4913 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16103A +peer0.org1.example.com | [4914 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3CF2A010E0FD615B79E3A623BD883DDBEC7B9D0139CF41C02DAF4EC7D5A4187 +peer0.org1.example.com | [4915 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4916 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4917 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4918 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4919 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491a 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491b 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491c 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [491d 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491e 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [491f 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4920 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4921 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4922 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4923 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4924 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4925 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4926 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4927 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4928 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4929 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [492a 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [492b 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [492c 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [492d 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [492e 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [492f 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4930 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4931 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4932 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4933 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4934 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4935 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4936 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4937 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4938 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4939 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [493a 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [493b 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [493c 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16103B +peer0.org1.example.com | [493d 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 44387D65EAFB7CB9799C3D8DD846857D891DC6E7C2DF75C1A1A472DED0355769 +peer0.org1.example.com | [493e 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [493f 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4940 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4941 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4942 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4943 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4944 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4945 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4946 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4947 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4948 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4949 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [494a 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [494b 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [494c 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [494d 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [494e 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [494f 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4950 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [4951 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [4952 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4953 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [4954 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4955 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4956 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4957 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4958 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4959 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [495a 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [495b 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [495c 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 gate 1602702150692405400 evaluation starts +peer0.org1.example.com | [495d 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [495e 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [495f 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4960 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 principal evaluation fails +peer0.org1.example.com | [4961 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 gate 1602702150692405400 evaluation fails +peer0.org1.example.com | [4962 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4963 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4964 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4965 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 gate 1602702150697563300 evaluation starts +peer0.org1.example.com | [4966 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4967 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4968 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 principal matched by identity 0 +peer0.org1.example.com | [4969 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +peer0.org1.example.com | 00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +peer0.org1.example.com | [496a 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +peer0.org1.example.com | 00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +peer0.org1.example.com | 00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +peer0.org1.example.com | 00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +peer0.org1.example.com | 00000040 55 5a bc 1a ba d6 |UZ....| +peer0.org1.example.com | [496b 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [496c 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 gate 1602702150697563300 evaluation succeeds +peer0.org1.example.com | [496d 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [496e 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [496f 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4970 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4971 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4972 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4973 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4974 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer0.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer0.org1.example.com | [4975 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer0.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer0.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer0.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer0.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer0.org1.example.com | [4976 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4977 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4978 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4979 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [497a 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer0.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer0.org1.example.com | [497b 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer0.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer0.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer0.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer0.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer0.org1.example.com | [497c 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [497d 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [497e 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [497f 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4980 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4981 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4982 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4983 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4984 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer0.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer0.org1.example.com | [4985 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer0.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer0.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer0.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer0.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer0.org1.example.com | [4986 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4987 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b c9 ce 09 7b bb 5a fc 89 fc 0b ea |0D. ....{.Z.....| +peer0.org1.example.com | 00000010 cb c9 71 ce 29 5c de 32 9e cb c5 70 de df 52 33 |..q.)\.2...p..R3| +peer0.org1.example.com | 00000020 41 5a 13 fa 02 20 30 78 8e dd ef 4e 75 e4 04 e1 |AZ... 0x...Nu...| +peer0.org1.example.com | 00000030 e5 6c 1e 42 fe ac da 13 03 e6 c5 87 95 62 81 81 |.l.B.........b..| +peer0.org1.example.com | 00000040 fb 8e 8d 13 9d f8 |......| +peer0.org1.example.com | [4988 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [498a 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [498b 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4989 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [498c 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [498d 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [498e 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [498f 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4990 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4991 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4992 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4993 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +peer0.org1.example.com | 00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +peer0.org1.example.com | [4994 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +peer0.org1.example.com | 00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +peer0.org1.example.com | 00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +peer0.org1.example.com | 00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +peer0.org1.example.com | 00000040 66 4b dd 9d e6 c9 |fK....| +peer0.org1.example.com | [4995 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4996 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4997 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4998 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +peer0.org1.example.com | 00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +peer0.org1.example.com | [4999 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +peer0.org1.example.com | 00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +peer0.org1.example.com | 00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +peer0.org1.example.com | 00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +peer0.org1.example.com | 00000040 f0 a9 0d 0b 07 a8 |......| +peer0.org1.example.com | [499a 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [499b 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [499c 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [499d 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [499e 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [499f 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [49a0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49a1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49a2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [49a3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [49a4 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [49a5 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 gate 1602702150796981600 evaluation starts +peer0.org1.example.com | [49a6 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49a7 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [49a8 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49a9 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 principal evaluation fails +peer0.org1.example.com | [49aa 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 gate 1602702150796981600 evaluation fails +peer0.org1.example.com | [49ab 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49ac 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49ad 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [49ae 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 gate 1602702150798414800 evaluation starts +peer0.org1.example.com | [49af 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49b0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [49b1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 principal matched by identity 0 +peer0.org1.example.com | [49b2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +peer0.org1.example.com | 00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +peer0.org1.example.com | [49b3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +peer0.org1.example.com | 00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +peer0.org1.example.com | 00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +peer0.org1.example.com | 00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +peer0.org1.example.com | 00000040 b3 18 05 37 5f 6e 99 |...7_n.| +peer0.org1.example.com | [49b4 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49b5 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 gate 1602702150798414800 evaluation succeeds +peer0.org1.example.com | [49b6 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49b7 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49b8 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [49b9 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [49ba 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [49bb 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49bc 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49bd 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [49be 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [49bf 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c0 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c1 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c2 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49c3 10-14 19:02:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing request from 172.18.0.9:41936: authentication:tg\262n\302\216X\340\024\027\255\274\260\274\301\363\252\010" > queries: > > > +peer0.org1.example.com | [49c4 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [49c5 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [49c6 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [49c7 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 gate 1602702151081042300 evaluation starts +peer0.org1.example.com | [49c8 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49c9 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [49ca 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 principal matched by identity 0 +peer0.org1.example.com | [49cb 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 50 fd 85 13 59 7c c0 23 4d 67 c6 92 bd 53 52 |tP...Y|.#Mg...SR| +peer0.org1.example.com | 00000010 e4 01 c3 48 8e a8 08 14 b6 fc cf be 17 ce 67 9f |...H..........g.| +peer0.org1.example.com | [49cc 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a c6 db fd 17 50 dd a3 e9 c6 bd |0E.!......P.....| +peer0.org1.example.com | 00000010 c2 e1 6f c5 ff df 3c 29 1a e8 44 78 93 32 d4 76 |..o...<)..Dx.2.v| +peer0.org1.example.com | 00000020 5a 1b 86 c9 cd 02 20 70 91 45 05 f2 8a 7a de 57 |Z..... p.E...z.W| +peer0.org1.example.com | 00000030 86 84 cc 5c e5 65 c3 4f 66 28 93 e4 9d 78 6c ea |...\.e.Of(...xl.| +peer0.org1.example.com | 00000040 eb 2b e8 c4 1a a3 86 |.+.....| +peer0.org1.example.com | [49cd 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49ce 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 gate 1602702151081042300 evaluation succeeds +peer0.org1.example.com | [49cf 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [49d0 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [49d1 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [49d2 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [49d3 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +peer0.org1.example.com | [49d4 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +peer0.org1.example.com | [49d5 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: satisfies principal principal:"\n\007Org1MSP" +peer0.org1.example.com | [49d6 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49d7 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49d8 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49d9 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [49da 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [49db 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [49dc 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [49dd 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: satisfies principal principal:"\n\007Org1MSP" +peer0.org1.example.com | [49de 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [49df 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: satisfies principal principal:"\n\007Org2MSP" +peer0.org1.example.com | [49e0 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: satisfies principal principal:"\n\007Org2MSP" +peer0.org1.example.com | [49e1 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [49e2 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning to 172.18.0.9:41936 a response containing: [cc_query_res: membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > peers: membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > > > endorsers_by_groups: membership_info: identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" > peers: membership_info: identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" > > > layouts: > layouts: > > > ] +peer0.org1.example.com | [49e3 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=discovery.Discovery grpc.method=Discover grpc.request_deadline=2020-10-14T19:02:41.042Z grpc.peer_address=172.18.0.9:41936 grpc.peer_subject="CN=Admin@org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=19.0411ms +peer0.org1.example.com | [49e4 10-14 19:02:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41936: read: connection reset by peer +peer0.org1.example.com | [49e5 10-14 19:02:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [49e6 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [49e7 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [49e8 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 0d 14 2d 31 d5 26 9d 57 30 cf 27 52 ef ad 66 |...-1.&.W0.'R..f| +peer0.org1.example.com | 00000010 7d 69 d2 82 ad 6b c3 9f 96 68 17 00 30 e2 1f 6d |}i...k...h..0..m| +peer0.org1.example.com | [49e9 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 85 f3 5c 0d a5 c1 07 b6 28 88 |0E.!....\.....(.| +peer0.org1.example.com | 00000010 e9 20 fe 9b 6c 2d 31 52 d9 95 62 6a 88 99 c2 55 |. ..l-1R..bj...U| +peer0.org1.example.com | 00000020 04 a1 34 4b d6 02 20 4b a5 b9 f5 9c b9 e0 b8 41 |..4K.. K.......A| +peer0.org1.example.com | 00000030 f1 b7 c6 c1 e4 7a bf be b0 a5 75 71 bd bf 5f af |.....z....uq.._.| +peer0.org1.example.com | 00000040 2d 1b 18 ac 0d 15 d1 |-......| +peer0.org1.example.com | [49ea 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49eb 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49ec 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49ed 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +peer0.org1.example.com | [49ee 10-14 19:02:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +peer0.org1.example.com | [49ef 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49f0 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49f1 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [49f2 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [49f3 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f4 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [49f5 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f6 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [49f7 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49f8 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [49f9 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49fa 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [49fb 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [49fc 10-14 19:02:33.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [49fd 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [49fe 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [49ff 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a00 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a01 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a02 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a03 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a04 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a05 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a06 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a07 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 gate 1602702153863938500 evaluation starts +peer0.org1.example.com | [4a08 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a09 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a0a 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a0b 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 principal evaluation fails +peer0.org1.example.com | [4a0c 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb390 gate 1602702153863938500 evaluation fails +peer0.org1.example.com | [4a0d 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a0e 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a0f 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a10 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 gate 1602702153864338800 evaluation starts +peer0.org1.example.com | [4a11 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a12 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a13 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 principal matched by identity 0 +peer0.org1.example.com | [4a14 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4a15 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4a16 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a17 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005adb900 gate 1602702153864338800 evaluation succeeds +peer0.org1.example.com | [4a18 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a19 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a1a 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a1b 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a1c 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a1d 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a1e 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a1f 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a20 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a21 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a22 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a23 10-14 19:02:33.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a24 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 gate 1602702153870216400 evaluation starts +peer0.org1.example.com | [4a25 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a26 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a27 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a28 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 principal evaluation fails +peer0.org1.example.com | [4a29 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af6b00 gate 1602702153870216400 evaluation fails +peer0.org1.example.com | [4a2a 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a2b 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a2c 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a2d 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 gate 1602702153870525500 evaluation starts +peer0.org1.example.com | [4a2e 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a2f 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a30 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 principal matched by identity 0 +peer0.org1.example.com | [4a31 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4a32 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4a33 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a34 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a35 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005af7070 gate 1602702153870525500 evaluation succeeds +peer0.org1.example.com | [4a36 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a37 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a38 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a39 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a3a 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a3b 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a3c 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [4a3d 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4a3e 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4a3f 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4a40 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a41 10-14 19:02:33.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a42 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a43 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a44 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a45 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a46 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a47 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a48 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 gate 1602702153884409000 evaluation starts +peer0.org1.example.com | [4a49 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a4a 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a4b 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a4c 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 principal evaluation fails +peer0.org1.example.com | [4a4d 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b191f0 gate 1602702153884409000 evaluation fails +peer0.org1.example.com | [4a4e 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a4f 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a50 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a51 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 gate 1602702153889352700 evaluation starts +peer0.org1.example.com | [4a52 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a53 10-14 19:02:33.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a54 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 principal matched by identity 0 +peer0.org1.example.com | [4a55 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4a56 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4a57 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a58 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b19760 gate 1602702153889352700 evaluation succeeds +peer0.org1.example.com | [4a59 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a5a 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a5b 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a5c 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a5d 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5e 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a5f 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a60 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a61 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a62 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a63 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a64 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a65 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 gate 1602702153894332100 evaluation starts +peer0.org1.example.com | [4a66 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a67 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a68 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a69 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 principal evaluation fails +peer0.org1.example.com | [4a6a 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3c960 gate 1602702153894332100 evaluation fails +peer0.org1.example.com | [4a6b 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a6c 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a6d 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a6e 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 gate 1602702153895534200 evaluation starts +peer0.org1.example.com | [4a6f 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a70 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a71 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 principal matched by identity 0 +peer0.org1.example.com | [4a72 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4a73 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4a74 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a75 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b3ced0 gate 1602702153895534200 evaluation succeeds +peer0.org1.example.com | [4a76 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a77 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a78 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a79 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a7a 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a7b 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a7c 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a7d 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +peer0.org1.example.com | 00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +peer0.org1.example.com | [4a7e 10-14 19:02:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +peer0.org1.example.com | 00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +peer0.org1.example.com | 00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +peer0.org1.example.com | 00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +peer0.org1.example.com | 00000040 7f 2e 03 77 45 c4 a6 |...wE..| +peer0.org1.example.com | [4a7f 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +peer0.org1.example.com | 00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +peer0.org1.example.com | [4a80 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +peer0.org1.example.com | 00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +peer0.org1.example.com | 00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +peer0.org1.example.com | 00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +peer0.org1.example.com | 00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +peer0.org1.example.com | [4a81 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a82 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a83 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a84 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a85 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a86 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a87 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a88 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a89 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 gate 1602702153900706300 evaluation starts +peer0.org1.example.com | [4a8a 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a8b 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a8c 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a8d 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 principal evaluation fails +peer0.org1.example.com | [4a8e 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57100 gate 1602702153900706300 evaluation fails +peer0.org1.example.com | [4a8f 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a90 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a91 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a92 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 gate 1602702153901130000 evaluation starts +peer0.org1.example.com | [4a93 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a94 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4a95 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 principal matched by identity 0 +peer0.org1.example.com | [4a96 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +peer0.org1.example.com | 00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +peer0.org1.example.com | [4a97 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +peer0.org1.example.com | 00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +peer0.org1.example.com | 00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +peer0.org1.example.com | 00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +peer0.org1.example.com | 00000040 6d 9d 1e 25 1e 3b |m..%.;| +peer0.org1.example.com | [4a98 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a99 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b57670 gate 1602702153901130000 evaluation succeeds +peer0.org1.example.com | [4a9a 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a9b 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a9c 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a9d 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a9e 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a9f 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4aa0 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4aa1 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4aa2 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4aa3 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4aa4 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4aa5 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4aa6 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 gate 1602702153905319600 evaluation starts +peer0.org1.example.com | [4aa7 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4aa8 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4aa9 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4aaa 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 principal evaluation fails +peer0.org1.example.com | [4aab 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74870 gate 1602702153905319600 evaluation fails +peer0.org1.example.com | [4aac 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4aad 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4aae 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4aaf 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 gate 1602702153908299000 evaluation starts +peer0.org1.example.com | [4ab0 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ab1 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4ab2 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 principal matched by identity 0 +peer0.org1.example.com | [4ab3 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +peer0.org1.example.com | 00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +peer0.org1.example.com | [4ab4 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +peer0.org1.example.com | 00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +peer0.org1.example.com | 00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +peer0.org1.example.com | 00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +peer0.org1.example.com | 00000040 e2 43 81 4d f4 e3 0e |.C.M...| +peer0.org1.example.com | [4ab5 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4ab6 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b74de0 gate 1602702153908299000 evaluation succeeds +peer0.org1.example.com | [4ab7 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ab8 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ab9 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4aba 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4abb 10-14 19:02:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4abc 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4abd 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4abe 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4abf 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac0 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac1 10-14 19:02:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4ac2 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac3 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ac4 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac5 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac6 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac7 10-14 19:02:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ac8 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ac9 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4aca 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4acb 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4acc 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4acd 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ace 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4acf 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ad0 10-14 19:02:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4ad1 10-14 19:02:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ad2 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ad3 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ad4 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ad5 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4ad6 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ad7 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4ad8 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ad9 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ada 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4adb 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4adc 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4add 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 gate 1602702154183793800 evaluation starts +peer0.org1.example.com | [4ade 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4adf 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4ae0 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4ae1 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 principal evaluation fails +peer0.org1.example.com | [4ae2 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005ad3e10 gate 1602702154183793800 evaluation fails +peer0.org1.example.com | [4ae3 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4ae4 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4ae5 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4ae6 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 gate 1602702154184330000 evaluation starts +peer0.org1.example.com | [4ae7 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ae8 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4ae9 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 principal matched by identity 0 +peer0.org1.example.com | [4aea 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org1.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer0.org1.example.com | [4aeb 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org1.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer0.org1.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer0.org1.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer0.org1.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer0.org1.example.com | [4aec 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4aed 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bae380 gate 1602702154184330000 evaluation succeeds +peer0.org1.example.com | [4aee 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4aef 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4af0 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4af1 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4af2 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4af3 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4af4 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4af5 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4af6 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4af7 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4af8 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4af9 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4afa 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4afb 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4afc 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4afd 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4afe 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4aff 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4b00 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b01 10-14 19:02:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b02 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b03 10-14 19:02:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b04 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b05 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b06 10-14 19:02:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b07 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b08 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b09 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b0a 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b0b 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b0c 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b0d 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b0e 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b0f 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b10 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4b11 10-14 19:02:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b12 10-14 19:02:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b13 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b14 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b15 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b16 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4b17 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b18 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4b19 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b1a 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b1b 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4b1c 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4b1d 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b1e 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 gate 1602702154321910400 evaluation starts +peer0.org1.example.com | [4b1f 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b20 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4b21 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4b22 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 principal evaluation fails +peer0.org1.example.com | [4b23 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdea50 gate 1602702154321910400 evaluation fails +peer0.org1.example.com | [4b24 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b25 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b26 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4b27 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 gate 1602702154322470100 evaluation starts +peer0.org1.example.com | [4b28 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b29 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4b2a 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 principal matched by identity 0 +peer0.org1.example.com | [4b2b 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer0.org1.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer0.org1.example.com | [4b2c 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| +peer0.org1.example.com | 00000010 9c 6e 5f a1 b5 57 c1 5d 16 5d 33 73 cd df ad 74 |.n_..W.].]3s...t| +peer0.org1.example.com | 00000020 e7 29 63 78 f8 02 20 4c da 9f df 66 52 4c 11 8e |.)cx.. L...fRL..| +peer0.org1.example.com | 00000030 f3 40 e1 bc b1 3c 31 a9 ab 74 d8 2b 84 ac 0f 2e |.@...<1..t.+....| +peer0.org1.example.com | 00000040 1f 40 21 69 eb 95 38 |.@!i..8| +peer0.org1.example.com | [4b2d 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b2e 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bdefc0 gate 1602702154322470100 evaluation succeeds +peer0.org1.example.com | [4b2f 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4b30 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4b31 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4b32 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b33 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b34 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4b35 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4b36 10-14 19:02:34.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4b37 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4b38 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b39 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b3a 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b3b 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [4b3c 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b3d 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b3e 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b3f 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b40 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4b41 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b42 10-14 19:02:34.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b43 10-14 19:02:34.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b44 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b45 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b46 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4b47 10-14 19:02:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b48 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b49 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b4a 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b4b 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4b4c 10-14 19:02:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b4d 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b4e 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b4f 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b50 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b51 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4b52 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer0.org1.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer0.org1.example.com | [4b53 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer0.org1.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer0.org1.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer0.org1.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer0.org1.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer0.org1.example.com | [4b54 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4b55 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 2c 4a 61 c9 43 26 ae e0 74 fd |0E.!..,Ja.C&..t.| +peer0.org1.example.com | 00000010 54 ec 32 a9 30 27 62 4a e0 da ba fa 74 67 e2 5e |T.2.0'bJ....tg.^| +peer0.org1.example.com | 00000020 fe 10 c8 30 43 02 20 39 6a cf 7b 75 fd 21 53 0a |...0C. 9j.{u.!S.| +peer0.org1.example.com | 00000030 a1 2f 28 ef 32 e7 77 d3 58 50 e5 5b 18 dc c5 6f |./(.2.w.XP.[...o| +peer0.org1.example.com | 00000040 66 04 f1 31 08 96 d9 |f..1...| +peer0.org1.example.com | [4b56 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4b57 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [4b58 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4b59 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4b5a 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4b5b 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b5c 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b5d 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b5e 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4b5f 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b60 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b61 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b62 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [4b63 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b64 10-14 19:02:34.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b65 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b66 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b67 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b68 10-14 19:02:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b69 10-14 19:02:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b6a 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4b6b 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b6c 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4b6d 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b6e 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4b6f 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b70 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b71 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b72 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b73 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b74 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b75 10-14 19:02:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b76 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b77 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b78 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b79 10-14 19:02:34.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b7a 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b7b 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b7c 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b7d 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b7e 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4b7f 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16103D +peer0.org1.example.com | [4b80 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F01AC9AA0EA0C8A0F44010DCC7690ADC4A1032CA5B61A6D65569B6246BFE41FC +peer0.org1.example.com | [4b81 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4b82 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4b83 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4b84 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b85 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b86 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b87 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b88 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b89 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8a 10-14 19:02:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b8b 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8d 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b8c 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8e 10-14 19:02:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b8f 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b90 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b91 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b92 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b93 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4b94 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 1a c9 aa 0e a0 c8 a0 f4 40 10 dc c7 69 0a dc |.........@...i..| +peer0.org1.example.com | 00000010 4a 10 32 ca 5b 61 a6 d6 55 69 b6 24 6b fe 41 fc |J.2.[a..Ui.$k.A.| +peer0.org1.example.com | [4b95 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 5e fc 9c 1a 86 51 94 43 88 9d |0D. xD^....Q.C..| +peer0.org1.example.com | 00000010 a4 02 40 2e 67 ca 4b 9a 59 dc 7f d7 dc 55 66 94 |..@.g.K.Y....Uf.| +peer0.org1.example.com | 00000020 7e 1f bf e0 02 20 6c 36 dc 0d 7c 63 4e b5 e4 77 |~.... l6..|cN..w| +peer0.org1.example.com | 00000030 80 f2 15 d6 32 ad 34 98 69 f2 14 72 92 1e 5b 6e |....2.4.i..r..[n| +peer0.org1.example.com | 00000040 65 e8 f8 e1 fa 82 |e.....| +peer0.org1.example.com | [4b96 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4b97 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4b98 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b99 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4b9a 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a e9 cf e5 af 96 1a 8c 8a ba 7d 5c 7d e9 9d 0f |..........}\}...| +peer0.org1.example.com | 00000010 b9 48 26 25 17 cc 30 c5 47 c8 5e ae 73 c3 6a 65 |.H&%..0.G.^.s.je| +peer0.org1.example.com | [4b9b 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 9f 36 08 76 6d c2 7f 55 23 48 1c |0D. ..6.vm..U#H.| +peer0.org1.example.com | 00000010 14 22 67 47 fd 95 32 5d 78 1f eb f5 e2 57 3b 7b |."gG..2]x....W;{| +peer0.org1.example.com | 00000020 4f 2c c2 4b 02 20 1a f8 66 8c 72 a2 a0 ad 0b 8c |O,.K. ..f.r.....| +peer0.org1.example.com | 00000030 90 9f 6b f1 9b 71 b6 0f 55 98 4d fd dd b7 e7 64 |..k..q..U.M....d| +peer0.org1.example.com | 00000040 70 07 3a 13 52 93 |p.:.R.| +peer0.org1.example.com | [4b9c 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4b9d 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b9e 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4b9f 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba0 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4ba1 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ba2 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4ba3 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4ba4 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4ba5 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4ba6 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 gate 1602702154674736700 evaluation starts +peer0.org1.example.com | [4ba7 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ba8 10-14 19:02:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4ba9 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4baa 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 principal evaluation fails +peer0.org1.example.com | [4bab 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c557c0 gate 1602702154674736700 evaluation fails +peer0.org1.example.com | [4bac 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bad 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bae 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4baf 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 gate 1602702154688569400 evaluation starts +peer0.org1.example.com | [4bb0 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bb1 10-14 19:02:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4bb2 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 principal matched by identity 0 +peer0.org1.example.com | [4bb3 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 b4 c2 51 c7 4a 37 a9 85 c3 12 14 bb 31 49 b6 |...Q.J7......1I.| +peer0.org1.example.com | 00000010 65 f8 f3 11 09 e1 6a b9 ae fa f9 90 21 88 4d ac |e.....j.....!.M.| +peer0.org1.example.com | [4bb4 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c b8 10 63 3a 70 2e 68 a2 22 da |0E.!....c:p.h.".| +peer0.org1.example.com | 00000010 7c 9f 06 11 e4 09 98 00 a2 90 be 6e 30 77 9f 20 ||..........n0w. | +peer0.org1.example.com | 00000020 1f 24 1a 9a d0 02 20 65 d3 18 54 69 3d 6d fd 60 |.$.... e..Ti=m.`| +peer0.org1.example.com | 00000030 79 5e 6f fc 07 a5 c0 b4 6a 10 95 c7 0a e0 c2 57 |y^o.....j......W| +peer0.org1.example.com | 00000040 33 48 10 53 6d 12 23 |3H.Sm.#| +peer0.org1.example.com | [4bb5 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4bb6 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005bd7330 gate 1602702154688569400 evaluation succeeds +peer0.org1.example.com | [4bb7 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4bb8 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4bb9 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4bba 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4bbb 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bbc 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bbd 10-14 19:02:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bbe 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bbf 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bc0 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bc1 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bc2 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4bc3 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 1a c9 aa 0e a0 c8 a0 f4 40 10 dc c7 69 0a dc |.........@...i..| +peer0.org1.example.com | 00000010 4a 10 32 ca 5b 61 a6 d6 55 69 b6 24 6b fe 41 fc |J.2.[a..Ui.$k.A.| +peer0.org1.example.com | [4bc4 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 44 5e fc 9c 1a 86 51 94 43 88 9d |0D. xD^....Q.C..| +peer0.org1.example.com | 00000010 a4 02 40 2e 67 ca 4b 9a 59 dc 7f d7 dc 55 66 94 |..@.g.K.Y....Uf.| +peer0.org1.example.com | 00000020 7e 1f bf e0 02 20 6c 36 dc 0d 7c 63 4e b5 e4 77 |~.... l6..|cN..w| +peer0.org1.example.com | 00000030 80 f2 15 d6 32 ad 34 98 69 f2 14 72 92 1e 5b 6e |....2.4.i..r..[n| +peer0.org1.example.com | 00000040 65 e8 f8 e1 fa 82 |e.....| +peer0.org1.example.com | [4bc5 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4bc6 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 93 82 66 87 bf 7b 24 31 d6 fb ad |0D. H..f..{$1...| +peer0.org1.example.com | 00000010 98 35 de 2e 4d 07 af c7 30 ab af 6c 22 39 de f4 |.5..M...0..l"9..| +peer0.org1.example.com | 00000020 5a 4d 63 88 02 20 1f dc d6 c4 6f 5a 93 6a d1 f3 |ZMc.. ....oZ.j..| +peer0.org1.example.com | 00000030 1a ee 2a d6 f4 b7 4d 09 55 7d 59 55 fd 1a d5 7c |..*...M.U}YU...|| +peer0.org1.example.com | 00000040 d5 25 83 78 8c fc |.%.x..| +peer0.org1.example.com | [4bc7 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4bc8 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4bc9 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bca 10-14 19:02:34.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bcb 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bcc 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bcd 10-14 19:02:34.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bce 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bcf 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bd0 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bd1 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4bd2 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bd3 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4bd4 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4bd5 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4bd6 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4bd7 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4bd8 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4bd9 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 gate 1602702154838192300 evaluation starts +peer0.org1.example.com | [4bda 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bdb 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4bdc 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4bdd 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 principal evaluation fails +peer0.org1.example.com | [4bde 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8e9b0 gate 1602702154838192300 evaluation fails +peer0.org1.example.com | [4bdf 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4be0 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4be1 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4be2 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8ef20 gate 1602702154838459000 evaluation starts +peer0.org1.example.com | [4be3 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8ef20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4be4 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8ef20 processing identity 0 with bytes of 115a6c0 +peer0.org1.example.com | [4be5 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005c8ef20 principal matched by identity 0 +peer0.org1.example.com | [4be6 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 38 cb 9c d3 98 42 f2 24 ab 33 5f 6f 8b 79 d7 |.8....B.$.3_o.y.| +peer0.org1.example.com | 00000010 cd 3b cb 8b 45 07 2e b7 7d 72 21 e2 ab 3a eb 38 |.;..E...}r!..:.8| +peer0.org1.example.com | [4be7 10-14 19:02:34.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 1d 09 cb da a0 02 9a 18 2d 3f |0E.!..........-?| diff --git a/hyperledger_fabric/v1.4.9/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.9/raft/logs/dev_orderer.log new file mode 100644 index 00000000..5c2621d0 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/logs/dev_orderer.log @@ -0,0 +1,8716 @@ +2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for consensus +2020-10-14 19:00:47.366 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2020-10-14 19:00:47.366 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.366 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for general +2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for general.BCCSP +2020-10-14 19:00:47.367 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for general.BCCSP.Default setting to string SW +2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for general.BCCSP.SW +2020-10-14 19:00:47.367 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: 256 +2020-10-14 19:00:47.367 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for general.BCCSP.SW.Security setting to int 256 +2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 00d Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 012 Found map[string]interface{} value for general.BCCSP.PKCS11 +2020-10-14 19:00:47.368 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.368 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.BCCSP.PKCS11.Library setting to +2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for general.BCCSP.PKCS11.Label setting to +2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for general.BCCSP.PKCS11.Pin setting to +2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.369 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for general.BCCSP.PKCS11.Hash setting to +2020-10-14 19:00:47.369 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for general.BCCSP.PKCS11.Security setting to +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 020 Found map[string]interface{} value for general.Keepalive +2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2020-10-14 19:00:47.370 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-10-14 19:00:47.370 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.ListenPort setting to string 7050 +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.LocalMSPID setting to string OrdererMSP +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.SystemChannel setting to +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.ListenAddress setting to string 0.0.0.0 +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 02f Found map[string]interface{} value for general.Cluster +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Cluster.RPCTimeout setting to +2020-10-14 19:00:47.371 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.371 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.Cluster.ReplicationBufferSize setting to +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.TLSHandshakeTimeShift setting to +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.Cluster.ListenPort setting to string 7055 +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 044 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.372 UTC [viperutil] getKeysRecursively -> DEBU 045 Found real value for general.Cluster.ReplicationMaxRetries setting to +2020-10-14 19:00:47.372 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Cluster.DialTimeout setting to +2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value is not a string: 10 +2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Cluster.SendBufferSize setting to int 10 +2020-10-14 19:00:47.373 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.373 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.Cluster.ReplicationPullTimeout setting to +2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 04e Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 04f Found real value for general.Cluster.ReplicationRetryTimeout setting to +2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 050 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 051 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2020-10-14 19:00:47.374 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[string]interface{} value for general.TLS +2020-10-14 19:00:47.374 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.TLS.ClientRootCAs setting to +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.TLS.TLSHandshakeTimeShift setting to +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.TLS.Enabled setting to string true +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 05f Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.375 UTC [viperutil] getKeysRecursively -> DEBU 060 Found real value for general.TLS.ClientAuthRequired setting to bool false +2020-10-14 19:00:47.375 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.ConnectionTimeout setting to +2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.Authentication +2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.Authentication.TimeWindow setting to string 15m +2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.Authentication.NoExpirationChecks setting to +2020-10-14 19:00:47.376 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.GenesisMethod setting to string file +2020-10-14 19:00:47.376 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[string]interface{} value for general.Profile +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for general.Profile.Enabled setting to bool false +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for general.LedgerType setting to string file +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 075 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 076 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2020-10-14 19:00:47.377 UTC [viperutil] getKeysRecursively -> DEBU 077 Found map[interface{}]interface{} value for fileledger +2020-10-14 19:00:47.377 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07c Found map[interface{}]interface{} value for ramledger +2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: 1000 +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for ramledger.HistorySize setting to int 1000 +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 07f Found map[interface{}]interface{} value for kafka +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 080 Found map[string]interface{} value for kafka.Retry +2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.Retry.LongInterval setting to string 5m +2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.LongTotal setting to string 12h +2020-10-14 19:00:47.378 UTC [viperutil] getKeysRecursively -> DEBU 085 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2020-10-14 19:00:47.378 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry.Metadata +2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2020-10-14 19:00:47.379 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.Producer +2020-10-14 19:00:47.379 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value is not a string: 3 +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[string]interface{} value for kafka.Retry.Consumer +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.ShortInterval setting to string 5s +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.ShortTotal setting to string 10m +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for kafka.Topic +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: 3 +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2020-10-14 19:00:47.380 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.380 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Verbose setting to bool false +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.TLS +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.TLS.RootCAs setting to +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.TLS.ClientAuthRequired setting to +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for kafka.TLS.ClientRootCAs setting to +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0a9 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0aa Found real value for kafka.TLS.TLSHandshakeTimeShift setting to +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0ab Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0ac Found real value for kafka.TLS.Enabled setting to bool false +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0ad Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.381 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found real value for kafka.TLS.PrivateKey setting to +2020-10-14 19:00:47.381 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.TLS.Certificate setting to +2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[string]interface{} value for kafka.SASLPlain +2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for kafka.SASLPlain.Enabled setting to bool false +2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for kafka.SASLPlain.User setting to +2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.382 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for kafka.SASLPlain.Password setting to +2020-10-14 19:00:47.382 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for kafka.Version setting to +2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found map[interface{}]interface{} value for debug +2020-10-14 19:00:47.383 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for debug.DeliverTraceDir setting to +2020-10-14 19:00:47.383 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for debug.BroadcastTraceDir setting to +2020-10-14 19:00:47.383 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found map[interface{}]interface{} value for operations +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c2 Found map[string]interface{} value for operations.TLS +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c3 Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found real value for operations.TLS.ClientAuthRequired setting to bool false +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: [] +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: false +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for operations.TLS.Enabled setting to bool false +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0c9 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0ca Found real value for operations.TLS.RootCAs setting to +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0cb Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0cc Found real value for operations.TLS.TLSHandshakeTimeShift setting to +2020-10-14 19:00:47.384 UTC [viperutil] unmarshalJSON -> DEBU 0cd Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.384 UTC [viperutil] getKeysRecursively -> DEBU 0ce Found real value for operations.TLS.Certificate setting to +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0cf Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d0 Found real value for operations.TLS.PrivateKey setting to +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found map[interface{}]interface{} value for metrics +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d2 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d3 Found real value for metrics.Provider setting to string prometheus +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found map[string]interface{} value for metrics.Statsd +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d7 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0d8 Found real value for metrics.Statsd.WriteInterval setting to string 30s +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0d9 Unmarshal JSON: value is not a string: +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0da Found real value for metrics.Statsd.Prefix setting to +2020-10-14 19:00:47.385 UTC [viperutil] unmarshalJSON -> DEBU 0db Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2020-10-14 19:00:47.385 UTC [viperutil] getKeysRecursively -> DEBU 0dc Found real value for metrics.Statsd.Network setting to string udp +2020-10-14 19:00:47.386 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0dd map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt] TLSHandshakeTimeShift:]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs: TLSHandshakeTimeShift:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs: TLSHandshakeTimeShift:]] ramledger:map[HistorySize:1000]] +2020-10-14 19:00:47.387 UTC [localconfig] completeInitialization -> INFO 0de Kafka.Version unset, setting to 0.10.2.0 +"2020-10-14 19:00:47.416 UTC [bccsp_sw] openKeyStore -> DEBU 0df KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +"2020-10-14 19:00:47.416 UTC [bccsp] initBCCSP -> DEBU 0e0 Initialize BCCSP [SW]" +"2020-10-14 19:00:47.416 UTC [msp] getPemMaterialFromDir -> DEBU 0e1 Reading directory /var/hyperledger/orderer/msp/signcerts" +"2020-10-14 19:00:47.421 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2020-10-14 19:00:47.434 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Reading directory /var/hyperledger/orderer/msp/cacerts" +"2020-10-14 19:00:47.441 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2020-10-14 19:00:47.454 UTC [msp] getPemMaterialFromDir -> DEBU 0e5 Reading directory /var/hyperledger/orderer/msp/admincerts" +"2020-10-14 19:00:47.460 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2020-10-14 19:00:47.461 UTC [msp] getMspConfig -> DEBU 0e7 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2020-10-14 19:00:47.462 UTC [msp] getPemMaterialFromDir -> DEBU 0e8 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2020-10-14 19:00:47.468 UTC [msp] getPemMaterialFromDir -> DEBU 0e9 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2020-10-14 19:00:47.478 UTC [msp] getPemMaterialFromDir -> DEBU 0ea Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2020-10-14 19:00:47.479 UTC [msp] getMspConfig -> DEBU 0eb TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2020-10-14 19:00:47.480 UTC [msp] getPemMaterialFromDir -> DEBU 0ec Reading directory /var/hyperledger/orderer/msp/crls" +"2020-10-14 19:00:47.481 UTC [msp] getMspConfig -> DEBU 0ed crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2020-10-14 19:00:47.486 UTC [msp] getMspConfig -> DEBU 0ee Loading NodeOUs" +"2020-10-14 19:00:47.501 UTC [msp] newBccspMsp -> DEBU 0ef Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.501 UTC [msp] New -> DEBU 0f0 Creating Cache-MSP instance" +"2020-10-14 19:00:47.502 UTC [msp] loadLocaMSP -> DEBU 0f1 Created new local MSP" +"2020-10-14 19:00:47.502 UTC [msp] Setup -> DEBU 0f2 Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:47.504 UTC [msp.identity] newIdentity -> DEBU 0f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.505 UTC [msp.identity] newIdentity -> DEBU 0f4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.534 UTC [bccsp_sw] loadPrivateKey -> DEBU 0f5 Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +"2020-10-14 19:00:47.542 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.551 UTC [msp] setupSigningIdentity -> DEBU 0f7 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +"2020-10-14 19:00:47.555 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f8 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.TLS.TLSHandshakeTimeShift = 0s + General.Cluster.ListenAddress = "0.0.0.0" + General.Cluster.ListenPort = 7055 + General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Cluster.TLSHandshakeTimeShift = 0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + General.Authentication.NoExpirationChecks = false + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.TLS.TLSHandshakeTimeShift = 0s + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Operations.TLS.TLSHandshakeTimeShift = 0s + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2020-10-14 19:00:47.563 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:47.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: HashingAlgorithm" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fb Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: OrdererAddresses" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fd Processing field: Consortium" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fe Processing field: Capabilities" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] NewStandardValues -> DEBU 0ff Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 100 Processing field: ConsensusType" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: BatchSize" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 102 Processing field: BatchTimeout" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: KafkaBrokers" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 104 Processing field: ChannelRestrictions" +"2020-10-14 19:00:47.564 UTC [common.channelconfig] initializeProtosStruct -> DEBU 105 Processing field: Capabilities" +"2020-10-14 19:00:47.565 UTC [common.channelconfig] NewStandardValues -> DEBU 106 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:47.565 UTC [common.channelconfig] initializeProtosStruct -> DEBU 107 Processing field: Endpoints" +"2020-10-14 19:00:47.565 UTC [common.channelconfig] NewStandardValues -> DEBU 108 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.566 UTC [common.channelconfig] initializeProtosStruct -> DEBU 109 Processing field: MSP" +"2020-10-14 19:00:47.566 UTC [common.channelconfig] validateMSP -> DEBU 10a Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:47.566 UTC [msp] newBccspMsp -> DEBU 10b Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.566 UTC [msp] New -> DEBU 10c Creating Cache-MSP instance" +"2020-10-14 19:00:47.566 UTC [msp] Setup -> DEBU 10d Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:47.567 UTC [msp.identity] newIdentity -> DEBU 10e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.568 UTC [common.channelconfig] NewStandardValues -> DEBU 10f Initializing protos for *channelconfig.ConsortiumProtos" +"2020-10-14 19:00:47.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 110 Processing field: ChannelCreationPolicy" +"2020-10-14 19:00:47.569 UTC [common.channelconfig] NewStandardValues -> DEBU 111 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.569 UTC [common.channelconfig] initializeProtosStruct -> DEBU 112 Processing field: MSP" +"2020-10-14 19:00:47.569 UTC [common.channelconfig] validateMSP -> DEBU 113 Setting up MSP for org Org1MSP" +"2020-10-14 19:00:47.569 UTC [msp] newBccspMsp -> DEBU 114 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.569 UTC [msp] New -> DEBU 115 Creating Cache-MSP instance" +"2020-10-14 19:00:47.570 UTC [msp] Setup -> DEBU 116 Setting up MSP instance Org1MSP" +"2020-10-14 19:00:47.570 UTC [msp.identity] newIdentity -> DEBU 117 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.571 UTC [common.channelconfig] NewStandardValues -> DEBU 118 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 119 Processing field: MSP" +"2020-10-14 19:00:47.571 UTC [common.channelconfig] validateMSP -> DEBU 11a Setting up MSP for org Org2MSP" +"2020-10-14 19:00:47.571 UTC [msp] newBccspMsp -> DEBU 11b Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.572 UTC [msp] New -> DEBU 11c Creating Cache-MSP instance" +"2020-10-14 19:00:47.572 UTC [msp] Setup -> DEBU 11d Setting up MSP instance Org2MSP" +"2020-10-14 19:00:47.572 UTC [msp.identity] newIdentity -> DEBU 11e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.573 UTC [msp] Setup -> DEBU 11f Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:47.574 UTC [msp] Setup -> DEBU 120 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.574 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.575 UTC [policies] NewManagerImpl -> DEBU 12b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 130 Proposed new policy Admins for Channel/Consortiums" +"2020-10-14 19:00:47.576 UTC [policies] GetPolicy -> DEBU 131 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 132 Proposed new policy Writers for Channel" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 133 Proposed new policy Admins for Channel" +"2020-10-14 19:00:47.576 UTC [policies] GetPolicy -> DEBU 134 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-10-14 19:00:47.576 UTC [policies] NewManagerImpl -> DEBU 135 Proposed new policy Readers for Channel" +"2020-10-14 19:00:47.581 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Group] /Channel" +"2020-10-14 19:00:47.581 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:47.584 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:47.585 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:47.586 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:47.588 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:47.589 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Group] /Channel/Consortiums" +"2020-10-14 19:00:47.589 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-10-14 19:00:47.590 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-10-14 19:00:47.591 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-10-14 19:00:47.592 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 157 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:47.593 UTC [common.configtx] addToMap -> DEBU 158 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:47.594 UTC [common.configtx] addToMap -> DEBU 159 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:47.594 UTC [common.configtx] addToMap -> DEBU 15a Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:47.595 UTC [common.configtx] addToMap -> DEBU 15b Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:47.595 UTC [common.configtx] addToMap -> DEBU 15c Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:47.598 UTC [orderer.common.server] createLedgerFactory -> DEBU 15d Ledger dir: /var/hyperledger/production/orderer" +"2020-10-14 19:00:47.598 UTC [kvledger.util] CreateDirIfMissing -> DEBU 15e CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2020-10-14 19:00:47.598 UTC [kvledger.util] logDirStatus -> DEBU 15f Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2020-10-14 19:00:47.601 UTC [kvledger.util] logDirStatus -> DEBU 160 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2020-10-14 19:00:47.723 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 161 Bootstrapping because no existing channels" +"2020-10-14 19:00:47.723 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 162 Selected bootstrap block, because system channel last config block is nil" +"2020-10-14 19:00:47.777 UTC [orderer.common.server] initializeServerConfig -> INFO 163 Starting orderer with TLS enabled" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: HashingAlgorithm" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166 Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: OrdererAddresses" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168 Processing field: Consortium" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 169 Processing field: Capabilities" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 16a Initializing protos for *channelconfig.ConsortiumProtos" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16b Processing field: ChannelCreationPolicy" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: MSP" +"2020-10-14 19:00:47.778 UTC [common.channelconfig] validateMSP -> DEBU 16e Setting up MSP for org Org1MSP" +"2020-10-14 19:00:47.778 UTC [msp] newBccspMsp -> DEBU 16f Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.778 UTC [msp] New -> DEBU 170 Creating Cache-MSP instance" +"2020-10-14 19:00:47.778 UTC [msp] Setup -> DEBU 171 Setting up MSP instance Org1MSP" +"2020-10-14 19:00:47.778 UTC [msp.identity] newIdentity -> DEBU 172 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.779 UTC [common.channelconfig] NewStandardValues -> DEBU 173 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.779 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174 Processing field: MSP" +"2020-10-14 19:00:47.779 UTC [common.channelconfig] validateMSP -> DEBU 175 Setting up MSP for org Org2MSP" +"2020-10-14 19:00:47.779 UTC [msp] newBccspMsp -> DEBU 176 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.779 UTC [msp] New -> DEBU 177 Creating Cache-MSP instance" +"2020-10-14 19:00:47.779 UTC [msp] Setup -> DEBU 178 Setting up MSP instance Org2MSP" +"2020-10-14 19:00:47.779 UTC [msp.identity] newIdentity -> DEBU 179 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 17a Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17b Processing field: ConsensusType" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: BatchSize" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17d Processing field: BatchTimeout" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: KafkaBrokers" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17f Processing field: ChannelRestrictions" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 180 Processing field: Capabilities" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 181 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 182 Processing field: Endpoints" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] NewStandardValues -> DEBU 183 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] initializeProtosStruct -> DEBU 184 Processing field: MSP" +"2020-10-14 19:00:47.780 UTC [common.channelconfig] validateMSP -> DEBU 185 Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:47.780 UTC [msp] newBccspMsp -> DEBU 186 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.780 UTC [msp] New -> DEBU 187 Creating Cache-MSP instance" +"2020-10-14 19:00:47.781 UTC [msp] Setup -> DEBU 188 Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:47.792 UTC [msp.identity] newIdentity -> DEBU 189 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.807 UTC [msp] Setup -> DEBU 18a Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:47.808 UTC [msp] Setup -> DEBU 18b MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:47.808 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:47.812 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.813 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 196 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 199 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.815 UTC [policies] NewManagerImpl -> DEBU 19b Proposed new policy Admins for Channel/Consortiums" +"2020-10-14 19:00:47.816 UTC [policies] GetPolicy -> DEBU 19c Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 19d Proposed new policy Writers for Channel" +"2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 19e Proposed new policy Admins for Channel" +"2020-10-14 19:00:47.816 UTC [policies] GetPolicy -> DEBU 19f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-10-14 19:00:47.816 UTC [policies] NewManagerImpl -> DEBU 1a0 Proposed new policy Readers for Channel" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Group] /Channel" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Group] /Channel/Consortiums" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-10-14 19:00:47.816 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:47.817 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c2 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c3 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c5 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c6 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:47.818 UTC [common.configtx] addToMap -> DEBU 1c7 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: HashingAlgorithm" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ca Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: OrdererAddresses" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: Consortium" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: Capabilities" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1ce Initializing protos for *channelconfig.ConsortiumProtos" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: ChannelCreationPolicy" +"2020-10-14 19:00:47.819 UTC [common.channelconfig] NewStandardValues -> DEBU 1d0 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d1 Processing field: MSP" +"2020-10-14 19:00:47.820 UTC [common.channelconfig] validateMSP -> DEBU 1d2 Setting up MSP for org Org1MSP" +"2020-10-14 19:00:47.820 UTC [msp] newBccspMsp -> DEBU 1d3 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.820 UTC [msp] New -> DEBU 1d4 Creating Cache-MSP instance" +"2020-10-14 19:00:47.823 UTC [msp] Setup -> DEBU 1d5 Setting up MSP instance Org1MSP" +"2020-10-14 19:00:47.824 UTC [msp.identity] newIdentity -> DEBU 1d6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.825 UTC [common.channelconfig] NewStandardValues -> DEBU 1d7 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.825 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: MSP" +"2020-10-14 19:00:47.825 UTC [common.channelconfig] validateMSP -> DEBU 1d9 Setting up MSP for org Org2MSP" +"2020-10-14 19:00:47.825 UTC [msp] newBccspMsp -> DEBU 1da Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.826 UTC [msp] New -> DEBU 1db Creating Cache-MSP instance" +"2020-10-14 19:00:47.826 UTC [msp] Setup -> DEBU 1dc Setting up MSP instance Org2MSP" +"2020-10-14 19:00:47.826 UTC [msp.identity] newIdentity -> DEBU 1dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.828 UTC [common.channelconfig] NewStandardValues -> DEBU 1de Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:47.828 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: ConsensusType" +"2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: BatchSize" +"2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: BatchTimeout" +"2020-10-14 19:00:47.829 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: KafkaBrokers" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e3 Processing field: ChannelRestrictions" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Capabilities" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: Endpoints" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] NewStandardValues -> DEBU 1e7 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.830 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e8 Processing field: MSP" +"2020-10-14 19:00:47.831 UTC [common.channelconfig] validateMSP -> DEBU 1e9 Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:47.831 UTC [msp] newBccspMsp -> DEBU 1ea Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.831 UTC [msp] New -> DEBU 1eb Creating Cache-MSP instance" +"2020-10-14 19:00:47.831 UTC [msp] Setup -> DEBU 1ec Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:47.832 UTC [msp.identity] newIdentity -> DEBU 1ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.834 UTC [msp] Setup -> DEBU 1ee Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:47.835 UTC [msp] Setup -> DEBU 1ef MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.835 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Admins for Channel/Consortiums" +"2020-10-14 19:00:47.836 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:47.837 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:47.838 UTC [policies] GetPolicy -> DEBU 200 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Writers for Channel" +"2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Admins for Channel" +"2020-10-14 19:00:47.838 UTC [policies] GetPolicy -> DEBU 203 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-10-14 19:00:47.838 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Readers for Channel" +"2020-10-14 19:00:47.838 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Group] /Channel" +"2020-10-14 19:00:47.838 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Group] /Channel/Consortiums" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-10-14 19:00:47.839 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-10-14 19:00:47.840 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:47.841 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:47.842 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:47.843 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:47.843 UTC [orderer.common.server] Start -> INFO 22c Setting up cluster for orderer type etcdraft" +"2020-10-14 19:00:47.878 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 22d Booted with a genesis block, replication isn't an option" +"2020-10-14 19:00:47.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 22e Obtaining default signing identity" +"2020-10-14 19:00:47.894 UTC [certmonitor] trackCertExpiration -> INFO 22f The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +"2020-10-14 19:00:47.895 UTC [certmonitor] trackCertExpiration -> INFO 230 The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +"2020-10-14 19:00:47.895 UTC [certmonitor] trackCertExpiration -> INFO 231 The client TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC" +"2020-10-14 19:00:47.898 UTC [fsblkstorage] newBlockfileMgr -> DEBU 232 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2020-10-14 19:00:47.898 UTC [kvledger.util] CreateDirIfMissing -> DEBU 233 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2020-10-14 19:00:47.898 UTC [kvledger.util] logDirStatus -> DEBU 234 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2020-10-14 19:00:47.899 UTC [kvledger.util] logDirStatus -> DEBU 235 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] newBlockfileMgr -> INFO 236 Getting block information from block storage" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 237 Retrieving checkpoint info from block files" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 238 retrieveLastFileSuffix()" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 239 retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 23a Last file number found = -1" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 23b No block file found" +"2020-10-14 19:00:47.899 UTC [fsblkstorage] newBlockfileMgr -> DEBU 23c Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000322720)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-10-14 19:00:47.940 UTC [fsblkstorage] newBlockIndex -> DEBU 23d newBlockIndex() - indexItems:[[BlockNum]]" +"2020-10-14 19:00:47.966 UTC [fsblkstorage] indexBlock -> DEBU 23e Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +]" +"2020-10-14 19:00:47.979 UTC [fsblkstorage] updateCheckpoint -> DEBU 23f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] NewStandardValues -> DEBU 240 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: HashingAlgorithm" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: OrdererAddresses" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: Consortium" +"2020-10-14 19:00:47.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: Capabilities" +"2020-10-14 19:00:47.980 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-10-14 19:00:47.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: ChannelCreationPolicy" +"2020-10-14 19:00:47.980 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: MSP" +"2020-10-14 19:00:47.980 UTC [common.channelconfig] validateMSP -> DEBU 24a Setting up MSP for org Org1MSP" +"2020-10-14 19:00:47.980 UTC [msp] newBccspMsp -> DEBU 24b Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.980 UTC [msp] New -> DEBU 24c Creating Cache-MSP instance" +"2020-10-14 19:00:47.980 UTC [msp] Setup -> DEBU 24d Setting up MSP instance Org1MSP" +"2020-10-14 19:00:47.980 UTC [msp.identity] newIdentity -> DEBU 24e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.989 UTC [common.channelconfig] NewStandardValues -> DEBU 24f Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: MSP" +"2020-10-14 19:00:47.989 UTC [common.channelconfig] validateMSP -> DEBU 251 Setting up MSP for org Org2MSP" +"2020-10-14 19:00:47.989 UTC [msp] newBccspMsp -> DEBU 252 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.989 UTC [msp] New -> DEBU 253 Creating Cache-MSP instance" +"2020-10-14 19:00:47.989 UTC [msp] Setup -> DEBU 254 Setting up MSP instance Org2MSP" +"2020-10-14 19:00:47.989 UTC [msp.identity] newIdentity -> DEBU 255 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: ConsensusType" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 258 Processing field: BatchSize" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: BatchTimeout" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25a Processing field: KafkaBrokers" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25b Processing field: ChannelRestrictions" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25c Processing field: Capabilities" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 25d Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25e Processing field: Endpoints" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] NewStandardValues -> DEBU 25f Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] initializeProtosStruct -> DEBU 260 Processing field: MSP" +"2020-10-14 19:00:47.990 UTC [common.channelconfig] validateMSP -> DEBU 261 Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:47.990 UTC [msp] newBccspMsp -> DEBU 262 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:47.990 UTC [msp] New -> DEBU 263 Creating Cache-MSP instance" +"2020-10-14 19:00:47.996 UTC [msp] Setup -> DEBU 264 Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:48.001 UTC [msp.identity] newIdentity -> DEBU 265 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:48.009 UTC [msp] Setup -> DEBU 266 Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:48.010 UTC [msp] Setup -> DEBU 267 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:48.010 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.010 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.977 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.977 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.978 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.980 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.981 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Admins for Channel/Consortiums" +"2020-10-14 19:00:47.981 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:47.982 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:47.983 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:47.983 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:47.984 UTC [policies] GetPolicy -> DEBU 278 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Readers for Channel" +"2020-10-14 19:00:47.984 UTC [policies] GetPolicy -> DEBU 27a Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Writers for Channel" +"2020-10-14 19:00:47.984 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Admins for Channel" +"2020-10-14 19:00:47.985 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel" +"2020-10-14 19:00:47.989 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Group] /Channel/Consortiums" +"2020-10-14 19:00:47.989 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-10-14 19:00:47.992 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:47.992 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:47.993 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-10-14 19:00:47.994 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:47.995 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:47.996 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:48.003 UTC [fsblkstorage] Next -> DEBU 2a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:00:48.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a6 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a7 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a8 blockbytes [22927] read from file [0]" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] Next -> DEBU 2a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] newBlockfileStream -> DEBU 2aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ab Remaining bytes=[22930], Going to peek [8] bytes" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ac Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:00:48.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ad blockbytes [22927] read from file [0]" +"2020-10-14 19:00:48.015 UTC [common.channelconfig] NewStandardValues -> DEBU 2ae Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2af Processing field: HashingAlgorithm" +"2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b0 Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:48.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b1 Processing field: OrdererAddresses" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b2 Processing field: Consortium" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b3 Processing field: Capabilities" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: ChannelCreationPolicy" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] NewStandardValues -> DEBU 2b6 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:48.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b7 Processing field: MSP" +"2020-10-14 19:00:48.017 UTC [common.channelconfig] validateMSP -> DEBU 2b8 Setting up MSP for org Org2MSP" +"2020-10-14 19:00:48.017 UTC [msp] newBccspMsp -> DEBU 2b9 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:48.018 UTC [msp] New -> DEBU 2ba Creating Cache-MSP instance" +"2020-10-14 19:00:48.018 UTC [msp] Setup -> DEBU 2bb Setting up MSP instance Org2MSP" +"2020-10-14 19:00:48.018 UTC [msp.identity] newIdentity -> DEBU 2bc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] NewStandardValues -> DEBU 2bd Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: MSP" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] validateMSP -> DEBU 2bf Setting up MSP for org Org1MSP" +"2020-10-14 19:00:48.019 UTC [msp] newBccspMsp -> DEBU 2c0 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:48.019 UTC [msp] New -> DEBU 2c1 Creating Cache-MSP instance" +"2020-10-14 19:00:48.019 UTC [msp] Setup -> DEBU 2c2 Setting up MSP instance Org1MSP" +"2020-10-14 19:00:48.019 UTC [msp.identity] newIdentity -> DEBU 2c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: ConsensusType" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c6 Processing field: BatchSize" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c7 Processing field: BatchTimeout" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c8 Processing field: KafkaBrokers" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c9 Processing field: ChannelRestrictions" +"2020-10-14 19:00:48.019 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ca Processing field: Capabilities" +"2020-10-14 19:00:48.020 UTC [common.channelconfig] NewStandardValues -> DEBU 2cb Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:48.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2cc Processing field: Endpoints" +"2020-10-14 19:00:48.020 UTC [common.channelconfig] NewStandardValues -> DEBU 2cd Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:48.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ce Processing field: MSP" +"2020-10-14 19:00:48.020 UTC [common.channelconfig] validateMSP -> DEBU 2cf Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:48.025 UTC [msp] newBccspMsp -> DEBU 2d0 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:48.025 UTC [msp] New -> DEBU 2d1 Creating Cache-MSP instance" +"2020-10-14 19:00:48.025 UTC [msp] Setup -> DEBU 2d2 Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:48.038 UTC [msp.identity] newIdentity -> DEBU 2d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:48.044 UTC [msp] Setup -> DEBU 2d4 Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:48.044 UTC [msp] Setup -> DEBU 2d5 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:48.044 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2dd Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.045 UTC [policies] NewManagerImpl -> DEBU 2de Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e2 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e3 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e4 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e5 Proposed new policy Admins for Channel/Consortiums" +"2020-10-14 19:00:48.046 UTC [policies] GetPolicy -> DEBU 2e6 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e7 Proposed new policy Writers for Channel" +"2020-10-14 19:00:48.046 UTC [policies] NewManagerImpl -> DEBU 2e8 Proposed new policy Admins for Channel" +"2020-10-14 19:00:48.047 UTC [policies] GetPolicy -> DEBU 2e9 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-10-14 19:00:48.047 UTC [policies] NewManagerImpl -> DEBU 2ea Proposed new policy Readers for Channel" +"2020-10-14 19:00:48.054 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Group] /Channel" +"2020-10-14 19:00:48.054 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Group] /Channel/Consortiums" +"2020-10-14 19:00:48.055 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-10-14 19:00:48.061 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-10-14 19:00:48.064 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-10-14 19:00:48.064 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-10-14 19:00:48.065 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-10-14 19:00:48.065 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:48.066 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:48.067 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:48.067 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:48.068 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 309 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:48.069 UTC [common.configtx] addToMap -> DEBU 30a Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30b Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30c Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30d Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:48.070 UTC [common.configtx] addToMap -> DEBU 30f Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:48.071 UTC [common.configtx] addToMap -> DEBU 310 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:48.071 UTC [common.configtx] addToMap -> DEBU 311 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:48.071 UTC [common.channelconfig] LogSanityChecks -> DEBU 312 As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:00:48.071 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 314 Manager Channel looking up path [Application]" +"2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 315 Manager Channel has managers Consortiums" +"2020-10-14 19:00:48.071 UTC [policies] Manager -> DEBU 316 Manager Channel has managers Orderer" +"2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 317 Manager Channel looking up path [Orderer]" +"2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 318 Manager Channel has managers Orderer" +"2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 319 Manager Channel has managers Consortiums" +"2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 31a Manager Channel/Orderer looking up path []" +"2020-10-14 19:00:48.072 UTC [policies] Manager -> DEBU 31b Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31c As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31d As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31e As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:00:48.072 UTC [common.channelconfig] LogSanityChecks -> DEBU 31f As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:00:48.073 UTC [common.capabilities] Supported -> DEBU 320 Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:00:48.073 UTC [common.capabilities] Supported -> DEBU 321 Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:00:48.073 UTC [orderer.common.server] func1 -> DEBU 322 Executing callback to update root CAs" +"2020-10-14 19:00:48.073 UTC [orderer.common.server] updateTrustedRoots -> DEBU 323 updating root CAs for channel [testchainid]" +"2020-10-14 19:00:48.073 UTC [orderer.common.server] updateTrustedRoots -> DEBU 324 adding app root CAs for MSP [Org1MSP]" +"2020-10-14 19:00:48.074 UTC [orderer.common.server] updateTrustedRoots -> DEBU 325 adding orderer root CAs for MSP [OrdererMSP]" +"2020-10-14 19:00:48.074 UTC [orderer.common.server] updateTrustedRoots -> DEBU 326 adding app root CAs for MSP [Org2MSP]" +"2020-10-14 19:00:48.074 UTC [fsblkstorage] Next -> DEBU 327 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:00:48.074 UTC [fsblkstorage] newBlockfileStream -> DEBU 328 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 329 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32a Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:00:48.074 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32b blockbytes [22927] read from file [0]" +"2020-10-14 19:00:48.074 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 32c [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 32d EvictionSuspicion not set, defaulting to 10m0s" +"2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 32e No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2020-10-14 19:00:48.075 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 32f No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2020-10-14 19:00:48.088 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 330 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2020-10-14 19:00:48.090 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 331 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2020-10-14 19:00:48.090 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 332 Appending 0 entries to memory storage" channel=testchainid node=1 +"2020-10-14 19:00:48.090 UTC [fsblkstorage] Next -> DEBU 333 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:00:48.090 UTC [fsblkstorage] newBlockfileStream -> DEBU 334 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:00:48.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-10-14 19:00:48.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 336 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:00:48.091 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 337 blockbytes [22927] read from file [0]" +"2020-10-14 19:00:48.091 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 338 [channel: testchainid] Done creating channel support resources" +"2020-10-14 19:00:48.091 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 339 Creating system channel msg processor for channel testchainid" +"2020-10-14 19:00:48.091 UTC [fsblkstorage] Next -> DEBU 33a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:00:48.092 UTC [fsblkstorage] newBlockfileStream -> DEBU 33b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33c Remaining bytes=[22930], Going to peek [8] bytes" +"2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:00:48.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 33e blockbytes [22927] read from file [0]" +"2020-10-14 19:00:48.093 UTC [orderer.commmon.multichannel] Initialize -> INFO 33f Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +"2020-10-14 19:00:48.093 UTC [orderer.consensus.etcdraft] Start -> INFO 340 Starting Raft node" channel=testchainid node=1 +"2020-10-14 19:00:48.104 UTC [orderer.common.cluster] Configure -> INFO 341 Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +]" +"2020-10-14 19:00:48.104 UTC [orderer.common.cluster] updateStubInMapping -> INFO 342 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2020-10-14 19:00:48.104 UTC [orderer.common.cluster] updateStubInMapping -> INFO 343 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-10-14 19:00:48.104 UTC [orderer.common.cluster] func1 -> DEBU 344 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel testchainid" +"2020-10-14 19:00:48.109 UTC [grpc] DialContext -> DEBU 345 parsed scheme: """ +"2020-10-14 19:00:48.109 UTC [grpc] DialContext -> DEBU 346 scheme "" not registered, fallback to default scheme" +"2020-10-14 19:00:48.113 UTC [grpc] watcher -> DEBU 347 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2020-10-14 19:00:48.113 UTC [grpc] switchBalancer -> DEBU 348 ClientConn switching balancer to "pick_first"" +"2020-10-14 19:00:48.114 UTC [grpc] HandleSubConnStateChange -> DEBU 349 pickfirstBalancer: HandleSubConnStateChange: 0xc0000aefb0, CONNECTING" +"2020-10-14 19:00:48.113 UTC [orderer.common.cluster] updateStubInMapping -> INFO 34a Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2020-10-14 19:00:48.116 UTC [orderer.common.cluster] updateStubInMapping -> INFO 34b Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-10-14 19:00:48.116 UTC [orderer.common.cluster] func1 -> DEBU 34c Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel testchainid" +"2020-10-14 19:00:48.117 UTC [grpc] DialContext -> DEBU 34d parsed scheme: """ +"2020-10-14 19:00:48.117 UTC [grpc] DialContext -> DEBU 34e scheme "" not registered, fallback to default scheme" +"2020-10-14 19:00:48.117 UTC [orderer.common.cluster] func1 -> INFO 34f 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-10-14 19:00:48.117 UTC [grpc] watcher -> DEBU 350 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2020-10-14 19:00:48.117 UTC [grpc] switchBalancer -> DEBU 351 ClientConn switching balancer to "pick_first"" +"2020-10-14 19:00:48.117 UTC [grpc] HandleSubConnStateChange -> DEBU 352 pickfirstBalancer: HandleSubConnStateChange: 0xc0000afc50, CONNECTING" +"2020-10-14 19:00:48.117 UTC [orderer.common.cluster] func1 -> INFO 353 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-10-14 19:00:48.118 UTC [orderer.common.cluster] Configure -> INFO 354 Exiting" +"2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] start -> DEBU 355 Starting raft node: #peers: 3" channel=testchainid node=1 +"2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] start -> INFO 356 Starting raft node as part of a new channel" channel=testchainid node=1 +"2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 357 1 became follower at term 0" channel=testchainid node=1 +"2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] newRaft -> INFO 358 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2020-10-14 19:00:48.118 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 359 1 became follower at term 1" channel=testchainid node=1 +"2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-10-14 19:00:48.120 UTC [orderer.consensus.etcdraft] apply -> INFO 35c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-10-14 19:00:48.118 UTC [orderer.common.server] Start -> INFO 35d Starting orderer: + Version: 1.4.9 + Commit SHA: development build + Go version: go1.13.15 + OS/Arch: linux/amd64" +"2020-10-14 19:00:48.120 UTC [orderer.common.server] Start -> INFO 35e Starting cluster listener on [::]:7055" +"2020-10-14 19:00:48.120 UTC [orderer.common.server] Start -> INFO 35f Beginning to serve requests" +"2020-10-14 19:00:48.129 UTC [grpc] HandleSubConnStateChange -> DEBU 360 pickfirstBalancer: HandleSubConnStateChange: 0xc0000aefb0, READY" +"2020-10-14 19:00:48.129 UTC [grpc] HandleSubConnStateChange -> DEBU 361 pickfirstBalancer: HandleSubConnStateChange: 0xc0000afc50, READY" +"2020-10-14 19:00:49.088 UTC [orderer.common.cluster] Step -> DEBU 362 Connection from orderer2.example.com(172.18.0.4:35132)" +"2020-10-14 19:00:49.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 363 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:49.089 UTC [orderer.consensus.etcdraft] Step -> INFO 364 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2020-10-14 19:00:49.092 UTC [orderer.common.cluster] NewStream -> DEBU 365 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-10-14 19:00:49.092 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 366 Sending msg of 28 bytes to 3 on channel testchainid took 2.9696ms" +"2020-10-14 19:00:49.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 367 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159µs " +"2020-10-14 19:00:49.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 368 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:49.094 UTC [orderer.consensus.etcdraft] Step -> INFO 369 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2020-10-14 19:00:49.095 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 36a 1 became follower at term 2" channel=testchainid node=1 +"2020-10-14 19:00:49.095 UTC [orderer.consensus.etcdraft] Step -> INFO 36b 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2020-10-14 19:00:49.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 16.2µs" +"2020-10-14 19:00:49.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.1µs " +"2020-10-14 19:00:49.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 36" +"2020-10-14 19:00:49.100 UTC [orderer.consensus.etcdraft] run -> INFO 36f raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2020-10-14 19:00:49.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 370 Sending msg of 28 bytes to 3 on channel testchainid took 126.8µs" +"2020-10-14 19:00:49.102 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 371 Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2020-10-14 19:00:49.102 UTC [orderer.common.cluster.step] sendMessage -> DEBU 372 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 493.8µs " +"2020-10-14 19:00:49.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 373 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:49.104 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 374 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-10-14 19:00:49.104 UTC [orderer.common.cluster.step] sendMessage -> DEBU 375 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 440.2µs " +"2020-10-14 19:00:49.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 376 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:49.592 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 377 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-10-14 19:00:49.593 UTC [orderer.common.cluster.step] sendMessage -> DEBU 378 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.6µs " +"2020-10-14 19:00:50.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 379 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:50.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37a Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2020-10-14 19:00:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 426.2µs " +"2020-10-14 19:00:50.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:50.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37d Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-10-14 19:00:50.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +"2020-10-14 19:00:51.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:51.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 380 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +"2020-10-14 19:00:51.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 381 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.5µs " +"2020-10-14 19:00:51.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 382 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:51.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 383 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-10-14 19:00:51.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU 384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2020-10-14 19:00:52.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 385 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:52.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 386 Sending msg of 28 bytes to 3 on channel testchainid took 44.1µs" +"2020-10-14 19:00:52.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 387 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +"2020-10-14 19:00:52.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 388 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:52.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 389 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-10-14 19:00:52.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.5µs " +"2020-10-14 19:00:53.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:53.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38c Sending msg of 28 bytes to 3 on channel testchainid took 11.3µs" +"2020-10-14 19:00:53.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.1µs " +"2020-10-14 19:00:53.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:53.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38f Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2020-10-14 19:00:53.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 390 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.8µs " +"2020-10-14 19:00:54.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 391 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:54.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 392 Sending msg of 28 bytes to 3 on channel testchainid took 32.2µs" +"2020-10-14 19:00:54.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 393 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +"2020-10-14 19:00:54.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 394 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:54.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 395 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2020-10-14 19:00:54.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 396 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 596.1µs " +"2020-10-14 19:00:55.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 397 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:55.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 398 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2020-10-14 19:00:55.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 399 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529µs " +"2020-10-14 19:00:55.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:55.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39b Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-10-14 19:00:55.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.9µs " +"2020-10-14 19:00:56.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:56.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39e Sending msg of 28 bytes to 3 on channel testchainid took 112.7µs" +"2020-10-14 19:00:56.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +"2020-10-14 19:00:56.588 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:56.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a1 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2020-10-14 19:00:56.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 961.4µs " +"2020-10-14 19:00:57.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:57.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a4 Sending msg of 28 bytes to 3 on channel testchainid took 23.4µs" +"2020-10-14 19:00:57.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.1µs " +"2020-10-14 19:00:57.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:57.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a7 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-10-14 19:00:57.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229µs " +"2020-10-14 19:00:57.997 UTC [orderer.common.server] replicateDisabledChains -> DEBU 3a9 No inactive chains to try to replicate" +"2020-10-14 19:00:58.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3aa Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:58.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ab Sending msg of 28 bytes to 3 on channel testchainid took 85.8µs" +"2020-10-14 19:00:58.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3ac Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.7µs " +"2020-10-14 19:00:58.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3ad Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:58.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3ae Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2020-10-14 19:00:58.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3af Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 552.4µs " +"2020-10-14 19:00:59.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3b0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:59.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3b1 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-10-14 19:00:59.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.3µs " +"2020-10-14 19:00:59.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3b3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:00:59.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3b4 Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2020-10-14 19:00:59.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 896.3µs " +"2020-10-14 19:00:59.899 UTC [orderer.common.server] Deliver -> DEBU 3b6 Starting new Deliver handler" +"2020-10-14 19:00:59.900 UTC [common.deliver] Handle -> DEBU 3b7 Starting new deliver loop for 172.18.0.9:39938" +"2020-10-14 19:00:59.900 UTC [common.deliver] Handle -> DEBU 3b8 Attempting to read seek info message from 172.18.0.9:39938" +"2020-10-14 19:00:59.964 UTC [orderer.common.server] Broadcast -> DEBU 3b9 Starting new Broadcast handler" +"2020-10-14 19:00:59.964 UTC [orderer.common.broadcast] Handle -> DEBU 3ba Starting new broadcast loop for 172.18.0.9:39940" +"2020-10-14 19:00:59.965 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3bb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39940" +"2020-10-14 19:00:59.965 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3bc Processing config update tx with system channel message processor for channel ID businesschannel" +"2020-10-14 19:00:59.965 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3bd Processing channel create tx for channel businesschannel on system channel testchainid" +"2020-10-14 19:00:59.966 UTC [common.channelconfig] NewStandardValues -> DEBU 3be Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: HashingAlgorithm" +"2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c0 Processing field: BlockDataHashingStructure" +"2020-10-14 19:00:59.966 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: OrdererAddresses" +"2020-10-14 19:00:59.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c2 Processing field: Consortium" +"2020-10-14 19:00:59.967 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: Capabilities" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] NewStandardValues -> DEBU 3c4 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c5 Processing field: ConsensusType" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c6 Processing field: BatchSize" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c7 Processing field: BatchTimeout" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c8 Processing field: KafkaBrokers" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c9 Processing field: ChannelRestrictions" +"2020-10-14 19:00:59.969 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ca Processing field: Capabilities" +"2020-10-14 19:00:59.970 UTC [common.channelconfig] NewStandardValues -> DEBU 3cb Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:00:59.970 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cc Processing field: Endpoints" +"2020-10-14 19:00:59.970 UTC [common.channelconfig] NewStandardValues -> DEBU 3cd Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:59.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ce Processing field: MSP" +"2020-10-14 19:00:59.971 UTC [common.channelconfig] validateMSP -> DEBU 3cf Setting up MSP for org OrdererOrg" +"2020-10-14 19:00:59.972 UTC [msp] newBccspMsp -> DEBU 3d0 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:59.972 UTC [msp] New -> DEBU 3d1 Creating Cache-MSP instance" +"2020-10-14 19:00:59.973 UTC [msp] Setup -> DEBU 3d2 Setting up MSP instance OrdererMSP" +"2020-10-14 19:00:59.975 UTC [msp.identity] newIdentity -> DEBU 3d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:00:59.978 UTC [common.channelconfig] NewStandardValues -> DEBU 3d4 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:00:59.978 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d5 Processing field: ACLs" +"2020-10-14 19:00:59.979 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6 Processing field: Capabilities" +"2020-10-14 19:00:59.979 UTC [common.channelconfig] NewStandardValues -> DEBU 3d7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:00:59.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d8 Processing field: AnchorPeers" +"2020-10-14 19:00:59.980 UTC [common.channelconfig] NewStandardValues -> DEBU 3d9 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:59.980 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3da Processing field: MSP" +"2020-10-14 19:00:59.981 UTC [common.channelconfig] Validate -> DEBU 3db Anchor peers for org Org2MSP are " +"2020-10-14 19:00:59.981 UTC [common.channelconfig] validateMSP -> DEBU 3dc Setting up MSP for org Org2MSP" +"2020-10-14 19:00:59.981 UTC [msp] newBccspMsp -> DEBU 3dd Creating BCCSP-based MSP instance" +"2020-10-14 19:00:59.981 UTC [msp] New -> DEBU 3de Creating Cache-MSP instance" +"2020-10-14 19:00:59.981 UTC [msp] Setup -> DEBU 3df Setting up MSP instance Org2MSP" +"2020-10-14 19:00:59.982 UTC [msp.identity] newIdentity -> DEBU 3e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:00:59.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3e1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:00:59.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3e2 Processing field: AnchorPeers" +"2020-10-14 19:00:59.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3e3 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:00:59.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3e4 Processing field: MSP" +"2020-10-14 19:00:59.983 UTC [common.channelconfig] Validate -> DEBU 3e5 Anchor peers for org Org1MSP are " +"2020-10-14 19:00:59.983 UTC [common.channelconfig] validateMSP -> DEBU 3e6 Setting up MSP for org Org1MSP" +"2020-10-14 19:00:59.984 UTC [msp] newBccspMsp -> DEBU 3e7 Creating BCCSP-based MSP instance" +"2020-10-14 19:00:59.984 UTC [msp] New -> DEBU 3e8 Creating Cache-MSP instance" +"2020-10-14 19:00:59.984 UTC [msp] Setup -> DEBU 3e9 Setting up MSP instance Org1MSP" +"2020-10-14 19:00:59.984 UTC [msp.identity] newIdentity -> DEBU 3ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:00:59.986 UTC [msp] Setup -> DEBU 3eb Setting up the MSP manager (3 msps)" +"2020-10-14 19:00:59.986 UTC [msp] Setup -> DEBU 3ec MSP manager setup complete, setup 3 msps" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:00:59.986 UTC [policies] NewManagerImpl -> DEBU 3f2 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:00:59.987 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:00:59.988 UTC [policies] NewManagerImpl -> DEBU 3f4 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:00:59.989 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:00:59.990 UTC [policies] NewManagerImpl -> DEBU 3f6 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f8 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3f9 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3fa Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:00:59.991 UTC [policies] NewManagerImpl -> DEBU 3fb Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 3fc Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 3fd Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 3fe Proposed new policy Admins for Channel" +"2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 3ff Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 400 Proposed new policy Readers for Channel" +"2020-10-14 19:00:59.992 UTC [policies] GetPolicy -> DEBU 401 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-10-14 19:00:59.992 UTC [policies] NewManagerImpl -> DEBU 402 Proposed new policy Writers for Channel" +"2020-10-14 19:00:59.992 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Group] /Channel" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:00:59.993 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:00:59.994 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:00:59.995 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:00:59.996 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:00:59.997 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Group] /Channel" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:00:59.998 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Group] /Channel" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 42f Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 430 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 431 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 432 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:00:59.999 UTC [common.configtx] addToMap -> DEBU 433 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 434 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 435 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 436 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 437 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 438 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.000 UTC [common.configtx] addToMap -> DEBU 439 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43a Processing change to key: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43b Processing change to key: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.001 UTC [common.configtx] verifyDeltaSet -> DEBU 43c Processing change to key: [Group] /Channel/Application" +"2020-10-14 19:01:00.001 UTC [common.configtx] policyForItem -> DEBU 43d Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 43e Manager Channel looking up path []" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 43f Manager Channel has managers Orderer" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 440 Manager Channel has managers Application" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 441 Manager Channel looking up path [Application]" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 442 Manager Channel has managers Orderer" +"2020-10-14 19:01:00.001 UTC [policies] Manager -> DEBU 443 Manager Channel has managers Application" +"2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 444 Manager Channel/Application looking up path []" +"2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 445 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:00.002 UTC [policies] Manager -> DEBU 446 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 447 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 448 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:00.002 UTC [policies] Evaluate -> DEBU 449 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:01:00.002 UTC [msp] DeserializeIdentity -> DEBU 44a Obtaining identity" +"2020-10-14 19:01:00.003 UTC [msp.identity] newIdentity -> DEBU 44b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.003 UTC [cauthdsl] func1 -> DEBU 44c 0xc000c707d0 gate 1602702060003938200 evaluation starts" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44d 0xc000c707d0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44e 0xc000c707d0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 44f 0xc000c707d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func2 -> DEBU 450 0xc000c707d0 principal evaluation fails" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func1 -> DEBU 451 0xc000c707d0 gate 1602702060003938200 evaluation fails" +"2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 452 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 453 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.004 UTC [policies] Evaluate -> DEBU 454 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:01:00.004 UTC [cauthdsl] func1 -> DEBU 455 0xc000c71990 gate 1602702060004704800 evaluation starts" +"2020-10-14 19:01:00.005 UTC [cauthdsl] func2 -> DEBU 456 0xc000c71990 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:00.005 UTC [cauthdsl] func2 -> DEBU 457 0xc000c71990 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:00.005 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 458 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-10-14 19:01:00.005 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 459 Checking if identity carries the admin ou for Org1MSP" +"2020-10-14 19:01:00.005 UTC [msp] Validate -> DEBU 45a MSP Org1MSP validating identity" +"2020-10-14 19:01:00.005 UTC [msp] getCertificationChain -> DEBU 45b MSP Org1MSP getting certification chain" +"2020-10-14 19:01:00.006 UTC [msp] hasOURole -> DEBU 45c MSP Org1MSP checking if the identity is a client" +"2020-10-14 19:01:00.006 UTC [msp] getCertificationChain -> DEBU 45d MSP Org1MSP getting certification chain" +"2020-10-14 19:01:00.006 UTC [cauthdsl] func2 -> DEBU 45e 0xc000c71990 principal matched by identity 0" +"2020-10-14 19:01:00.006 UTC [msp.identity] Verify -> DEBU 45f Verify: digest = 00000000 8d 0c 30 bf 9e 22 01 dc 8d 32 f9 57 cc f4 45 f9 |..0.."...2.W..E.| +00000010 d4 24 db 30 5d 70 f7 ba a6 3e 37 f2 ff 17 bf b2 |.$.0]p...>7.....|" +"2020-10-14 19:01:00.006 UTC [msp.identity] Verify -> DEBU 460 Verify: sig = 00000000 30 45 02 21 00 fc 78 ec d9 43 1f f3 19 65 b0 3c |0E.!..x..C...e.<| +00000010 32 ba cd b0 cf f9 1a fe 51 c9 05 96 dc 57 88 f3 |2.......Q....W..| +00000020 ac 44 85 68 3c 02 20 2e 39 eb df 1d 72 ff 17 61 |.D.h<. .9...r..a| +00000030 80 28 c7 8f e8 21 e1 3f de 84 89 ba d7 5a 25 4b |.(...!.?.....Z%K| +00000040 92 4c 80 d6 72 30 74 |.L..r0t|" +"2020-10-14 19:01:00.006 UTC [cauthdsl] func2 -> DEBU 461 0xc000c71990 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:00.006 UTC [cauthdsl] func1 -> DEBU 462 0xc000c71990 gate 1602702060004704800 evaluation succeeds" +"2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 463 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 464 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 465 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:01:00.007 UTC [policies] Evaluate -> DEBU 466 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 467 Processing change to key: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 468 Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 469 Processing change to key: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 46a Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.008 UTC [common.configtx] verifyDeltaSet -> DEBU 46b Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 471 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.009 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 478 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 479 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.010 UTC [common.configtx] recurseConfigMap -> DEBU 47d Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 47e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 47f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 480 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 481 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [common.configtx] recurseConfigMap -> DEBU 482 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.011 UTC [msp] GetDefaultSigningIdentity -> DEBU 483 Obtaining default signing identity" +"2020-10-14 19:01:00.011 UTC [msp] GetDefaultSigningIdentity -> DEBU 484 Obtaining default signing identity" +"2020-10-14 19:01:00.011 UTC [msp.identity] Sign -> DEBU 485 Sign: plaintext: 0AEA060A1B08011A0608EC959DFC0522...433938FB9F6E8C6E0B851E2CF8548782 " +"2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 486 Sign: digest: B16181B4C0E4A604135765090A953E8BA7E62752FE5624315B95253E17D7E983 " +"2020-10-14 19:01:00.012 UTC [msp] GetDefaultSigningIdentity -> DEBU 487 Obtaining default signing identity" +"2020-10-14 19:01:00.012 UTC [msp] GetDefaultSigningIdentity -> DEBU 488 Obtaining default signing identity" +"2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 489 Sign: plaintext: 0AE6060A1708041A0608EC959DFC0522...9AC89DA5FAD94AE601D86A7642B2640B " +"2020-10-14 19:01:00.012 UTC [msp.identity] Sign -> DEBU 48a Sign: digest: FC13F66C1ACF484AC6E20D5E634B4E4CE5B679DC30C461BBE9023CFF4D25ABB3 " +"2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:00.013 UTC [policies] Evaluate -> DEBU 48f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:00.013 UTC [msp] DeserializeIdentity -> DEBU 490 Obtaining identity" +"2020-10-14 19:01:00.013 UTC [msp.identity] newIdentity -> DEBU 491 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.013 UTC [cauthdsl] func1 -> DEBU 492 0xc000cccdf0 gate 1602702060013840100 evaluation starts" +"2020-10-14 19:01:00.013 UTC [cauthdsl] func2 -> DEBU 493 0xc000cccdf0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:00.013 UTC [cauthdsl] func2 -> DEBU 494 0xc000cccdf0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:00.014 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 495 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:01:00.014 UTC [msp] Validate -> DEBU 496 MSP OrdererMSP validating identity" +"2020-10-14 19:01:00.014 UTC [msp] getCertificationChain -> DEBU 497 MSP OrdererMSP getting certification chain" +"2020-10-14 19:01:00.014 UTC [cauthdsl] func2 -> DEBU 498 0xc000cccdf0 principal matched by identity 0" +"2020-10-14 19:01:00.014 UTC [msp.identity] Verify -> DEBU 499 Verify: digest = 00000000 fc 13 f6 6c 1a cf 48 4a c6 e2 0d 5e 63 4b 4e 4c |...l..HJ...^cKNL| +00000010 e5 b6 79 dc 30 c4 61 bb e9 02 3c ff 4d 25 ab b3 |..y.0.a...<.M%..|" +"2020-10-14 19:01:00.014 UTC [msp.identity] Verify -> DEBU 49a Verify: sig = 00000000 30 44 02 20 5c ea bc 18 b3 30 07 fe ee 1c f3 e7 |0D. \....0......| +00000010 1c f1 e5 85 96 e8 db 91 20 e2 8a a6 a2 63 f3 bf |........ ....c..| +00000020 19 3f 33 6b 02 20 79 6c fd 49 69 1c 14 a8 05 32 |.?3k. yl.Ii....2| +00000030 65 4f 49 bf f0 51 9c f8 06 7b 18 58 12 ed bb 26 |eOI..Q...{.X...&| +00000040 8a 6d c8 85 e4 af |.m....|" +"2020-10-14 19:01:00.014 UTC [cauthdsl] func2 -> DEBU 49b 0xc000cccdf0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:00.014 UTC [cauthdsl] func1 -> DEBU 49c 0xc000cccdf0 gate 1602702060013840100 evaluation succeeds" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 49f Signature set satisfies policy /Channel/Orderer/Writers" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a1 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:00.015 UTC [policies] Evaluate -> DEBU 4a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:00.015 UTC [common.channelconfig] NewStandardValues -> DEBU 4a3 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a4 Processing field: HashingAlgorithm" +"2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a5 Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a6 Processing field: OrdererAddresses" +"2020-10-14 19:01:00.015 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a7 Processing field: Consortium" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a8 Processing field: Capabilities" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4a9 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4aa Processing field: ACLs" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ab Processing field: Capabilities" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4ac Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ad Processing field: AnchorPeers" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] NewStandardValues -> DEBU 4ae Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4af Processing field: MSP" +"2020-10-14 19:01:00.016 UTC [common.channelconfig] Validate -> DEBU 4b0 Anchor peers for org Org2MSP are " +"2020-10-14 19:01:00.016 UTC [common.channelconfig] validateMSP -> DEBU 4b1 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:00.016 UTC [msp] newBccspMsp -> DEBU 4b2 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.016 UTC [msp] New -> DEBU 4b3 Creating Cache-MSP instance" +"2020-10-14 19:01:00.016 UTC [msp] Setup -> DEBU 4b4 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:00.017 UTC [msp.identity] newIdentity -> DEBU 4b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: AnchorPeers" +"2020-10-14 19:01:00.018 UTC [common.channelconfig] NewStandardValues -> DEBU 4b8 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.018 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b9 Processing field: MSP" +"2020-10-14 19:01:00.018 UTC [common.channelconfig] Validate -> DEBU 4ba Anchor peers for org Org1MSP are " +"2020-10-14 19:01:00.019 UTC [common.channelconfig] validateMSP -> DEBU 4bb Setting up MSP for org Org1MSP" +"2020-10-14 19:01:00.019 UTC [msp] newBccspMsp -> DEBU 4bc Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.019 UTC [msp] New -> DEBU 4bd Creating Cache-MSP instance" +"2020-10-14 19:01:00.019 UTC [msp] Setup -> DEBU 4be Setting up MSP instance Org1MSP" +"2020-10-14 19:01:00.019 UTC [msp.identity] newIdentity -> DEBU 4bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c0 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c1 Processing field: ConsensusType" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c2 Processing field: BatchSize" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c3 Processing field: BatchTimeout" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c4 Processing field: KafkaBrokers" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c5 Processing field: ChannelRestrictions" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c6 Processing field: Capabilities" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c7 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4c8 Processing field: Endpoints" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] NewStandardValues -> DEBU 4c9 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ca Processing field: MSP" +"2020-10-14 19:01:00.020 UTC [common.channelconfig] validateMSP -> DEBU 4cb Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:00.020 UTC [msp] newBccspMsp -> DEBU 4cc Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.021 UTC [msp] New -> DEBU 4cd Creating Cache-MSP instance" +"2020-10-14 19:01:00.021 UTC [msp] Setup -> DEBU 4ce Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:00.021 UTC [msp.identity] newIdentity -> DEBU 4cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.023 UTC [msp] Setup -> DEBU 4d0 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:00.023 UTC [msp] Setup -> DEBU 4d1 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:00.023 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d7 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4d9 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4db Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4dd Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4de Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4df Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e0 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e1 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-10-14 19:01:00.024 UTC [policies] GetPolicy -> DEBU 4e2 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-10-14 19:01:00.024 UTC [policies] NewManagerImpl -> DEBU 4e3 Proposed new policy Writers for Channel" +"2020-10-14 19:01:00.025 UTC [policies] GetPolicy -> DEBU 4e4 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-10-14 19:01:00.025 UTC [policies] NewManagerImpl -> DEBU 4e5 Proposed new policy Admins for Channel" +"2020-10-14 19:01:00.025 UTC [policies] GetPolicy -> DEBU 4e6 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-10-14 19:01:00.025 UTC [policies] NewManagerImpl -> DEBU 4e7 Proposed new policy Readers for Channel" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:00.025 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:00.026 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:00.027 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Group] /Channel" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:00.028 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 512 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 514 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 515 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.029 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.030 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.030 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.030 UTC [common.configtx] verifyDeltaSet -> DEBU 51f Processing change to key: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.030 UTC [common.configtx] verifyDeltaSet -> DEBU 520 Processing change to key: [Group] /Channel/Application" +"2020-10-14 19:01:00.030 UTC [common.configtx] policyForItem -> DEBU 521 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 522 Manager Channel looking up path []" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 523 Manager Channel has managers Orderer" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 524 Manager Channel has managers Application" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 525 Manager Channel looking up path [Application]" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 526 Manager Channel has managers Orderer" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 527 Manager Channel has managers Application" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 528 Manager Channel/Application looking up path []" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 529 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:00.030 UTC [policies] Manager -> DEBU 52a Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:00.030 UTC [policies] Evaluate -> DEBU 52b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-10-14 19:01:00.030 UTC [policies] Evaluate -> DEBU 52c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:00.031 UTC [policies] Evaluate -> DEBU 52d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:01:00.031 UTC [msp] DeserializeIdentity -> DEBU 52e Obtaining identity" +"2020-10-14 19:01:00.031 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.031 UTC [cauthdsl] func1 -> DEBU 530 0xc00056c0b0 gate 1602702060031806500 evaluation starts" +"2020-10-14 19:01:00.031 UTC [cauthdsl] func2 -> DEBU 531 0xc00056c0b0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:00.031 UTC [cauthdsl] func2 -> DEBU 532 0xc00056c0b0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 533 0xc00056c0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 534 0xc00056c0b0 principal evaluation fails" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func1 -> DEBU 535 0xc00056c0b0 gate 1602702060031806500 evaluation fails" +"2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 536 Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.032 UTC [policies] Evaluate -> DEBU 538 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func1 -> DEBU 539 0xc00056d270 gate 1602702060032372300 evaluation starts" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 53a 0xc00056d270 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:00.032 UTC [cauthdsl] func2 -> DEBU 53b 0xc00056d270 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:00.032 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 53c Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-10-14 19:01:00.032 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 53d Checking if identity carries the admin ou for Org1MSP" +"2020-10-14 19:01:00.032 UTC [msp] Validate -> DEBU 53e MSP Org1MSP validating identity" +"2020-10-14 19:01:00.033 UTC [msp] getCertificationChain -> DEBU 53f MSP Org1MSP getting certification chain" +"2020-10-14 19:01:00.033 UTC [msp] hasOURole -> DEBU 540 MSP Org1MSP checking if the identity is a client" +"2020-10-14 19:01:00.033 UTC [msp] getCertificationChain -> DEBU 541 MSP Org1MSP getting certification chain" +"2020-10-14 19:01:00.033 UTC [cauthdsl] func2 -> DEBU 542 0xc00056d270 principal matched by identity 0" +"2020-10-14 19:01:00.033 UTC [msp.identity] Verify -> DEBU 543 Verify: digest = 00000000 8d 0c 30 bf 9e 22 01 dc 8d 32 f9 57 cc f4 45 f9 |..0.."...2.W..E.| +00000010 d4 24 db 30 5d 70 f7 ba a6 3e 37 f2 ff 17 bf b2 |.$.0]p...>7.....|" +"2020-10-14 19:01:00.033 UTC [msp.identity] Verify -> DEBU 544 Verify: sig = 00000000 30 45 02 21 00 fc 78 ec d9 43 1f f3 19 65 b0 3c |0E.!..x..C...e.<| +00000010 32 ba cd b0 cf f9 1a fe 51 c9 05 96 dc 57 88 f3 |2.......Q....W..| +00000020 ac 44 85 68 3c 02 20 2e 39 eb df 1d 72 ff 17 61 |.D.h<. .9...r..a| +00000030 80 28 c7 8f e8 21 e1 3f de 84 89 ba d7 5a 25 4b |.(...!.?.....Z%K| +00000040 92 4c 80 d6 72 30 74 |.L..r0t|" +"2020-10-14 19:01:00.034 UTC [cauthdsl] func2 -> DEBU 545 0xc00056d270 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:00.034 UTC [cauthdsl] func1 -> DEBU 546 0xc00056d270 gate 1602702060032372300 evaluation succeeds" +"2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 547 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 549 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:01:00.035 UTC [policies] Evaluate -> DEBU 54a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54b Processing change to key: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54c Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54d Processing change to key: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.035 UTC [common.configtx] verifyDeltaSet -> DEBU 54e Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.036 UTC [common.configtx] verifyDeltaSet -> DEBU 54f Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.036 UTC [common.configtx] verifyDeltaSet -> DEBU 550 Processing change to key: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.036 UTC [common.configtx] recurseConfigMap -> DEBU 554 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.037 UTC [common.configtx] recurseConfigMap -> DEBU 555 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 556 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 557 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 558 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 559 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.038 UTC [common.configtx] recurseConfigMap -> DEBU 55a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.039 UTC [common.configtx] recurseConfigMap -> DEBU 55f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 560 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 561 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 562 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 563 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 564 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 565 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.040 UTC [common.configtx] recurseConfigMap -> DEBU 566 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.041 UTC [common.configtx] recurseConfigMap -> DEBU 567 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:00.041 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: HashingAlgorithm" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56a Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: OrdererAddresses" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Consortium" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56d Processing field: Capabilities" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] NewStandardValues -> DEBU 56e Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:00.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56f Processing field: ConsensusType" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: BatchSize" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 571 Processing field: BatchTimeout" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 572 Processing field: KafkaBrokers" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 573 Processing field: ChannelRestrictions" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 574 Processing field: Capabilities" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] NewStandardValues -> DEBU 575 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: Endpoints" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] NewStandardValues -> DEBU 577 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: MSP" +"2020-10-14 19:01:00.042 UTC [common.channelconfig] validateMSP -> DEBU 579 Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:00.042 UTC [msp] newBccspMsp -> DEBU 57a Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.042 UTC [msp] New -> DEBU 57b Creating Cache-MSP instance" +"2020-10-14 19:01:00.042 UTC [msp] Setup -> DEBU 57c Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:00.043 UTC [msp.identity] newIdentity -> DEBU 57d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.043 UTC [common.channelconfig] NewStandardValues -> DEBU 57e Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:00.043 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57f Processing field: ACLs" +"2020-10-14 19:01:00.043 UTC [common.channelconfig] initializeProtosStruct -> DEBU 580 Processing field: Capabilities" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 581 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] initializeProtosStruct -> DEBU 582 Processing field: AnchorPeers" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 583 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] initializeProtosStruct -> DEBU 584 Processing field: MSP" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] Validate -> DEBU 585 Anchor peers for org Org2MSP are " +"2020-10-14 19:01:00.044 UTC [common.channelconfig] validateMSP -> DEBU 586 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:00.044 UTC [msp] newBccspMsp -> DEBU 587 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.044 UTC [msp] New -> DEBU 588 Creating Cache-MSP instance" +"2020-10-14 19:01:00.044 UTC [msp] Setup -> DEBU 589 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:00.044 UTC [msp.identity] newIdentity -> DEBU 58a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.044 UTC [common.channelconfig] NewStandardValues -> DEBU 58b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.045 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58c Processing field: AnchorPeers" +"2020-10-14 19:01:00.045 UTC [common.channelconfig] NewStandardValues -> DEBU 58d Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.045 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: MSP" +"2020-10-14 19:01:00.045 UTC [common.channelconfig] Validate -> DEBU 58f Anchor peers for org Org1MSP are " +"2020-10-14 19:01:00.045 UTC [common.channelconfig] validateMSP -> DEBU 590 Setting up MSP for org Org1MSP" +"2020-10-14 19:01:00.045 UTC [msp] newBccspMsp -> DEBU 591 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.045 UTC [msp] New -> DEBU 592 Creating Cache-MSP instance" +"2020-10-14 19:01:00.045 UTC [msp] Setup -> DEBU 593 Setting up MSP instance Org1MSP" +"2020-10-14 19:01:00.045 UTC [msp.identity] newIdentity -> DEBU 594 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.046 UTC [msp] Setup -> DEBU 595 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:00.046 UTC [msp] Setup -> DEBU 596 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:00.046 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.046 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59d Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59e Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 59f Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a1 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a2 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.047 UTC [policies] NewManagerImpl -> DEBU 5a3 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a4 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a5 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a6 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a7 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a8 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5a9 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5aa Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ab Proposed new policy Writers for Channel" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ac Proposed new policy Admins for Channel" +"2020-10-14 19:01:00.048 UTC [policies] NewManagerImpl -> DEBU 5ad Proposed new policy Readers for Channel" +"2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Group] /Channel" +"2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:00.049 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:00.050 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:00.051 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cc Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cd Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5ce Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5cf Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.052 UTC [common.configtx] addToMap -> DEBU 5d0 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d1 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d3 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d6 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d7 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d8 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:00.053 UTC [common.configtx] addToMap -> DEBU 5d9 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:00.053 UTC [common.capabilities] Supported -> DEBU 5da Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:00.053 UTC [common.capabilities] Supported -> DEBU 5db Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:00.054 UTC [orderer.common.cluster] NewStream -> DEBU 5dc Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2020-10-14 19:01:00.054 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5dd Sending msg of 29303 bytes to 3 on channel testchainid took 169µs" +"2020-10-14 19:01:00.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5de Send of SubmitRequest for channel testchainid with payload of size 29303 to orderer2.example.com(orderer2.example.com:7050) took 106.8µs " +"2020-10-14 19:01:00.054 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5df [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39940" +"2020-10-14 19:01:00.065 UTC [orderer.common.broadcast] Handle -> DEBU 5e0 Received EOF from 172.18.0.9:39940, hangup" +"2020-10-14 19:01:00.066 UTC [common.deliver] deliverBlocks -> DEBU 5e1 Rejecting deliver for 172.18.0.9:39938 because channel businesschannel not found" +"2020-10-14 19:01:00.066 UTC [orderer.common.server] func1 -> DEBU 5e2 Closing Broadcast stream" +"2020-10-14 19:01:00.066 UTC [comm.grpc.server] 1 -> INFO 5e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39940 grpc.code=OK grpc.call_duration=102.2832ms +"2020-10-14 19:01:00.066 UTC [orderer.common.server] func1 -> DEBU 5e4 Closing Deliver stream" +"2020-10-14 19:01:00.066 UTC [comm.grpc.server] 1 -> INFO 5e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39938 grpc.code=OK grpc.call_duration=166.5639ms +"2020-10-14 19:01:00.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5e6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 29513" +"2020-10-14 19:01:00.084 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5e7 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2020-10-14 19:01:00.084 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +"2020-10-14 19:01:00.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5e9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:00.085 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5ea Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2020-10-14 19:01:00.086 UTC [common.channelconfig] NewStandardValues -> DEBU 5eb Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:00.086 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ec Processing field: HashingAlgorithm" +"2020-10-14 19:01:00.087 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ed Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:00.090 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ee Processing field: OrdererAddresses" +"2020-10-14 19:01:00.092 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ef Processing field: Consortium" +"2020-10-14 19:01:00.092 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f0 Processing field: Capabilities" +"2020-10-14 19:01:00.092 UTC [common.channelconfig] NewStandardValues -> DEBU 5f1 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:00.093 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f2 Processing field: ConsensusType" +"2020-10-14 19:01:00.093 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f3 Processing field: BatchSize" +"2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f4 Processing field: BatchTimeout" +"2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: KafkaBrokers" +"2020-10-14 19:01:00.094 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f6 Processing field: ChannelRestrictions" +"2020-10-14 19:01:00.095 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f7 Processing field: Capabilities" +"2020-10-14 19:01:00.095 UTC [common.channelconfig] NewStandardValues -> DEBU 5f8 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:00.096 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f9 Processing field: Endpoints" +"2020-10-14 19:01:00.098 UTC [common.channelconfig] NewStandardValues -> DEBU 5fa Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.100 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fb Processing field: MSP" +"2020-10-14 19:01:00.100 UTC [common.channelconfig] validateMSP -> DEBU 5fc Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:00.101 UTC [msp] newBccspMsp -> DEBU 5fd Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.101 UTC [msp] New -> DEBU 5fe Creating Cache-MSP instance" +"2020-10-14 19:01:00.101 UTC [msp] Setup -> DEBU 5ff Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:00.102 UTC [msp.identity] newIdentity -> DEBU 600 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.104 UTC [common.channelconfig] NewStandardValues -> DEBU 601 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:00.106 UTC [common.channelconfig] initializeProtosStruct -> DEBU 605 Processing field: ACLs" +"2020-10-14 19:01:00.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 602 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-10-14 19:01:00.106 UTC [orderer.common.cluster.step] handleMessage -> DEBU 603 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:00.106 UTC [orderer.common.cluster.step] sendMessage -> DEBU 604 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676.3µs " +"2020-10-14 19:01:00.116 UTC [common.channelconfig] initializeProtosStruct -> DEBU 606 Processing field: Capabilities" +"2020-10-14 19:01:00.119 UTC [common.channelconfig] NewStandardValues -> DEBU 607 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 608 Processing field: AnchorPeers" +"2020-10-14 19:01:00.119 UTC [common.channelconfig] NewStandardValues -> DEBU 609 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 60a Processing field: MSP" +"2020-10-14 19:01:00.119 UTC [common.channelconfig] Validate -> DEBU 60b Anchor peers for org Org2MSP are " +"2020-10-14 19:01:00.120 UTC [common.channelconfig] validateMSP -> DEBU 60c Setting up MSP for org Org2MSP" +"2020-10-14 19:01:00.120 UTC [msp] newBccspMsp -> DEBU 60d Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.120 UTC [msp] New -> DEBU 60e Creating Cache-MSP instance" +"2020-10-14 19:01:00.120 UTC [msp] Setup -> DEBU 60f Setting up MSP instance Org2MSP" +"2020-10-14 19:01:00.121 UTC [msp.identity] newIdentity -> DEBU 610 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.124 UTC [common.channelconfig] NewStandardValues -> DEBU 611 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:00.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 612 Processing field: AnchorPeers" +"2020-10-14 19:01:00.125 UTC [orderer.common.server] Deliver -> DEBU 613 Starting new Deliver handler" +"2020-10-14 19:01:00.125 UTC [common.deliver] Handle -> DEBU 614 Starting new deliver loop for 172.18.0.9:39942" +"2020-10-14 19:01:00.126 UTC [common.deliver] Handle -> DEBU 615 Attempting to read seek info message from 172.18.0.9:39942" +"2020-10-14 19:01:00.125 UTC [common.channelconfig] NewStandardValues -> DEBU 616 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:00.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 617 Processing field: MSP" +"2020-10-14 19:01:00.132 UTC [common.channelconfig] Validate -> DEBU 618 Anchor peers for org Org1MSP are " +"2020-10-14 19:01:00.136 UTC [common.channelconfig] validateMSP -> DEBU 619 Setting up MSP for org Org1MSP" +"2020-10-14 19:01:00.137 UTC [msp] newBccspMsp -> DEBU 61a Creating BCCSP-based MSP instance" +"2020-10-14 19:01:00.138 UTC [msp] New -> DEBU 61b Creating Cache-MSP instance" +"2020-10-14 19:01:00.138 UTC [msp] Setup -> DEBU 61c Setting up MSP instance Org1MSP" +"2020-10-14 19:01:00.139 UTC [msp.identity] newIdentity -> DEBU 61d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:00.141 UTC [msp] Setup -> DEBU 61e Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:00.141 UTC [msp] Setup -> DEBU 61f MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:00.141 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.142 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.142 UTC [policies] NewManagerImpl -> DEBU 622 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 623 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 624 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 625 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 626 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:00.143 UTC [policies] NewManagerImpl -> DEBU 627 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 628 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 629 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62a Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62b Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62c Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.144 UTC [policies] NewManagerImpl -> DEBU 62d Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 62e Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 62f Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 630 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 631 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 632 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 633 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 634 Proposed new policy Admins for Channel" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 635 Proposed new policy Readers for Channel" +"2020-10-14 19:01:00.145 UTC [policies] NewManagerImpl -> DEBU 636 Proposed new policy Writers for Channel" +"2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:00.146 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:00.147 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:00.148 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 64e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 64f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 650 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 651 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:00.149 UTC [common.configtx] addToMap -> DEBU 652 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 653 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 654 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 655 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 656 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 657 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:00.150 UTC [common.configtx] addToMap -> DEBU 658 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 659 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65b Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65c Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:00.151 UTC [common.configtx] addToMap -> DEBU 65d Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:00.152 UTC [common.configtx] addToMap -> DEBU 65e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:00.153 UTC [common.configtx] addToMap -> DEBU 65f Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:00.153 UTC [common.configtx] addToMap -> DEBU 660 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:00.154 UTC [common.configtx] addToMap -> DEBU 661 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:00.154 UTC [common.configtx] addToMap -> DEBU 662 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:00.154 UTC [common.channelconfig] LogSanityChecks -> DEBU 663 As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:01:00.155 UTC [common.channelconfig] LogSanityChecks -> DEBU 664 As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:01:00.155 UTC [policies] Manager -> DEBU 665 Manager Channel looking up path [Application]" +"2020-10-14 19:01:00.156 UTC [policies] Manager -> DEBU 666 Manager Channel has managers Orderer" +"2020-10-14 19:01:00.157 UTC [policies] Manager -> DEBU 667 Manager Channel has managers Application" +"2020-10-14 19:01:00.157 UTC [policies] Manager -> DEBU 668 Manager Channel/Application looking up path []" +"2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 669 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 66a Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66b As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66c As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:01:00.158 UTC [common.channelconfig] LogSanityChecks -> DEBU 66d As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:01:00.158 UTC [policies] Manager -> DEBU 66e Manager Channel looking up path [Orderer]" +"2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 66f Manager Channel has managers Orderer" +"2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 670 Manager Channel has managers Application" +"2020-10-14 19:01:00.159 UTC [policies] Manager -> DEBU 671 Manager Channel/Orderer looking up path []" +"2020-10-14 19:01:00.160 UTC [policies] Manager -> DEBU 672 Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 673 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 674 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:01:00.160 UTC [common.channelconfig] LogSanityChecks -> DEBU 675 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:01:00.161 UTC [common.channelconfig] LogSanityChecks -> DEBU 676 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:01:00.161 UTC [common.capabilities] Supported -> DEBU 677 Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:00.161 UTC [common.capabilities] Supported -> DEBU 678 Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:00.161 UTC [fsblkstorage] newBlockfileMgr -> DEBU 679 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2020-10-14 19:01:00.161 UTC [kvledger.util] CreateDirIfMissing -> DEBU 67a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2020-10-14 19:01:00.161 UTC [kvledger.util] logDirStatus -> DEBU 67b Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2020-10-14 19:01:00.162 UTC [kvledger.util] logDirStatus -> DEBU 67c After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2020-10-14 19:01:00.162 UTC [fsblkstorage] newBlockfileMgr -> INFO 67d Getting block information from block storage" +"2020-10-14 19:01:00.162 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 67e Retrieving checkpoint info from block files" +"2020-10-14 19:01:00.162 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 67f retrieveLastFileSuffix()" +"2020-10-14 19:01:00.162 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 680 retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-10-14 19:01:00.163 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 681 Last file number found = -1" +"2020-10-14 19:01:00.163 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 682 No block file found" +"2020-10-14 19:01:00.163 UTC [fsblkstorage] newBlockfileMgr -> DEBU 683 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000d68940)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-10-14 19:01:00.166 UTC [fsblkstorage] newBlockIndex -> DEBU 684 newBlockIndex() - indexItems:[[BlockNum]]" +"2020-10-14 19:01:00.166 UTC [orderer.common.server] func1 -> DEBU 685 Executing callback to update root CAs" +"2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 686 updating root CAs for channel [businesschannel]" +"2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 687 adding app root CAs for MSP [Org2MSP]" +"2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 688 adding app root CAs for MSP [Org1MSP]" +"2020-10-14 19:01:00.167 UTC [orderer.common.server] updateTrustedRoots -> DEBU 689 adding orderer root CAs for MSP [OrdererMSP]" +"2020-10-14 19:01:00.170 UTC [fsblkstorage] indexBlock -> DEBU 68a Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +]" +"2020-10-14 19:01:00.175 UTC [fsblkstorage] updateCheckpoint -> DEBU 68b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28474], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-10-14 19:01:00.175 UTC [fsblkstorage] Next -> DEBU 68c Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:01:00.175 UTC [fsblkstorage] newBlockfileStream -> DEBU 68d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-10-14 19:01:00.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68e Remaining bytes=[28474], Going to peek [8] bytes" +"2020-10-14 19:01:00.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 68f Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:01:00.177 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 690 blockbytes [28471] read from file [0]" +"2020-10-14 19:01:00.177 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 691 [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 692 EvictionSuspicion not set, defaulting to 10m0s" +"2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 693 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2020-10-14 19:01:00.178 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 694 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2020-10-14 19:01:00.184 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 695 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2020-10-14 19:01:00.185 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 696 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2020-10-14 19:01:00.185 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 697 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2020-10-14 19:01:00.185 UTC [fsblkstorage] Next -> DEBU 698 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:01:00.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 699 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69a Remaining bytes=[28474], Going to peek [8] bytes" +"2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69b Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:01:00.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69c blockbytes [28471] read from file [0]" +"2020-10-14 19:01:00.186 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 69d [channel: businesschannel] Done creating channel support resources" +"2020-10-14 19:01:00.186 UTC [orderer.commmon.multichannel] newChain -> INFO 69e Created and starting new chain businesschannel" +"2020-10-14 19:01:00.186 UTC [orderer.consensus.etcdraft] Start -> INFO 69f Starting Raft node" channel=businesschannel node=1 +"2020-10-14 19:01:00.187 UTC [orderer.common.cluster] Configure -> INFO 6a0 Entering, channel: businesschannel, nodes: [ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +]" +"2020-10-14 19:01:00.187 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a1 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2020-10-14 19:01:00.188 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a2 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-10-14 19:01:00.189 UTC [orderer.common.cluster] func1 -> DEBU 6a3 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel businesschannel" +"2020-10-14 19:01:00.189 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a4 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2020-10-14 19:01:00.189 UTC [orderer.common.cluster] updateStubInMapping -> INFO 6a5 Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> DEBU 6a6 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel businesschannel" +"2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> INFO 6a7 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-10-14 19:01:00.190 UTC [orderer.common.cluster] func1 -> INFO 6a8 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-10-14 19:01:00.190 UTC [orderer.common.cluster] Configure -> INFO 6a9 Exiting" +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] start -> DEBU 6aa Starting raft node: #peers: 3" channel=businesschannel node=1 +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] start -> INFO 6ab Starting raft node as part of a new channel" channel=businesschannel node=1 +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ac 1 became follower at term 0" channel=businesschannel node=1 +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] newRaft -> INFO 6ad newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 6ae 1 became follower at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:00.190 UTC [orderer.consensus.etcdraft] run -> INFO 6af This node is picked to start campaign" channel=businesschannel node=1 +"2020-10-14 19:01:00.191 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 6b0 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2020-10-14 19:01:00.191 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b1 Obtaining default signing identity" +"2020-10-14 19:01:00.191 UTC [msp] GetDefaultSigningIdentity -> DEBU 6b2 Obtaining default signing identity" +"2020-10-14 19:01:00.192 UTC [msp.identity] Sign -> DEBU 6b3 Sign: plaintext: 0A00120B0A090A03010203100418050A...B6EDFD5003BA52B3E34B5BA68F98CF2C " +"2020-10-14 19:01:00.192 UTC [msp.identity] Sign -> DEBU 6b4 Sign: digest: BCDBF98787870E891D8E72FC1AB988DE19EE703CF5C320CDB488DD340AC377FF " +"2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b5 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b6 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-10-14 19:01:00.192 UTC [orderer.consensus.etcdraft] apply -> INFO 6b7 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-10-14 19:01:00.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b8 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2020-10-14 19:01:00.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +"2020-10-14 19:01:00.195 UTC [fsblkstorage] indexBlock -> DEBU 6ba Indexing block [blockNum=1, blockHash=[]byte{0x49, 0x5c, 0x4e, 0x7a, 0x80, 0x65, 0x31, 0xa5, 0xd3, 0x1c, 0x15, 0xdf, 0x29, 0xe4, 0x44, 0x7b, 0xe9, 0xdb, 0x86, 0x16, 0x63, 0xb0, 0xeb, 0x84, 0xc4, 0x31, 0xca, 0x89, 0xa6, 0xe0, 0x4, 0x2f} txOffsets= +txId=e45fb23359e93f3a57c3cab122fe68b9899dfd3932b999a4c095cf270478888d locPointer=offset=71, bytesLength=29382 +]" +"2020-10-14 19:01:00.198 UTC [fsblkstorage] updateCheckpoint -> DEBU 6bb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53338], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-10-14 19:01:00.198 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6bc [channel: testchainid] Wrote block [1]" +"2020-10-14 19:01:00.313 UTC [common.deliver] deliverBlocks -> WARN 6bd [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39942 because of consenter error" +"2020-10-14 19:01:00.314 UTC [orderer.common.server] func1 -> DEBU 6be Closing Deliver stream" +"2020-10-14 19:01:00.314 UTC [comm.grpc.server] 1 -> INFO 6bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39942 grpc.code=OK grpc.call_duration=198.1959ms +"2020-10-14 19:01:00.343 UTC [orderer.common.server] Deliver -> DEBU 6c0 Starting new Deliver handler" +"2020-10-14 19:01:00.343 UTC [common.deliver] Handle -> DEBU 6c1 Starting new deliver loop for 172.18.0.9:39944" +"2020-10-14 19:01:00.344 UTC [common.deliver] Handle -> DEBU 6c2 Attempting to read seek info message from 172.18.0.9:39944" +"2020-10-14 19:01:00.548 UTC [common.deliver] deliverBlocks -> WARN 6c3 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39944 because of consenter error" +"2020-10-14 19:01:00.549 UTC [orderer.common.server] func1 -> DEBU 6c4 Closing Deliver stream" +"2020-10-14 19:01:00.549 UTC [comm.grpc.server] 1 -> INFO 6c5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39944 grpc.code=OK grpc.call_duration=206.3015ms +"2020-10-14 19:01:00.572 UTC [orderer.common.server] Deliver -> DEBU 6c6 Starting new Deliver handler" +"2020-10-14 19:01:00.572 UTC [common.deliver] Handle -> DEBU 6c7 Starting new deliver loop for 172.18.0.9:39946" +"2020-10-14 19:01:00.572 UTC [common.deliver] Handle -> DEBU 6c8 Attempting to read seek info message from 172.18.0.9:39946" +"2020-10-14 19:01:00.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:00.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2020-10-14 19:01:00.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.1µs " +"2020-10-14 19:01:00.777 UTC [common.deliver] deliverBlocks -> WARN 6cc [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39946 because of consenter error" +"2020-10-14 19:01:00.777 UTC [orderer.common.server] func1 -> DEBU 6cd Closing Deliver stream" +"2020-10-14 19:01:00.778 UTC [comm.grpc.server] 1 -> INFO 6ce streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39946 grpc.code=OK grpc.call_duration=206.3126ms +"2020-10-14 19:01:00.795 UTC [orderer.common.server] Deliver -> DEBU 6cf Starting new Deliver handler" +"2020-10-14 19:01:00.795 UTC [common.deliver] Handle -> DEBU 6d0 Starting new deliver loop for 172.18.0.9:39948" +"2020-10-14 19:01:00.796 UTC [common.deliver] Handle -> DEBU 6d1 Attempting to read seek info message from 172.18.0.9:39948" +"2020-10-14 19:01:01.004 UTC [common.deliver] deliverBlocks -> WARN 6d2 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:39948 because of consenter error" +"2020-10-14 19:01:01.005 UTC [orderer.common.server] func1 -> DEBU 6d3 Closing Deliver stream" +"2020-10-14 19:01:01.005 UTC [comm.grpc.server] 1 -> INFO 6d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39948 grpc.code=OK grpc.call_duration=209.9811ms +"2020-10-14 19:01:01.034 UTC [orderer.common.server] Deliver -> DEBU 6d5 Starting new Deliver handler" +"2020-10-14 19:01:01.034 UTC [common.deliver] Handle -> DEBU 6d6 Starting new deliver loop for 172.18.0.9:39950" +"2020-10-14 19:01:01.035 UTC [common.deliver] Handle -> DEBU 6d7 Attempting to read seek info message from 172.18.0.9:39950" +"2020-10-14 19:01:01.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:01.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d9 Sending msg of 28 bytes to 3 on channel testchainid took 344.5µs" +"2020-10-14 19:01:01.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 560.6µs " +"2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] Step -> INFO 6db 1 is starting a new election at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6dc 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] poll -> INFO 6dd 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] campaign -> INFO 6de 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.193 UTC [orderer.consensus.etcdraft] campaign -> INFO 6df 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.194 UTC [orderer.common.cluster] NewStream -> DEBU 6e0 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2020-10-14 19:01:01.195 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e1 Sending msg of 28 bytes to 2 on channel businesschannel took 845.3µs" +"2020-10-14 19:01:01.195 UTC [orderer.common.cluster] NewStream -> DEBU 6e2 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-10-14 19:01:01.195 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e3 Sending msg of 28 bytes to 3 on channel businesschannel took 73.3µs" +"2020-10-14 19:01:01.195 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.6µs " +"2020-10-14 19:01:01.195 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +"2020-10-14 19:01:01.197 UTC [orderer.common.cluster] Step -> DEBU 6e6 Connection from orderer1.example.com(172.18.0.2:53736)" +"2020-10-14 19:01:01.198 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.198 UTC [orderer.common.cluster] Step -> DEBU 6e8 Connection from orderer2.example.com(172.18.0.4:35132)" +"2020-10-14 19:01:01.198 UTC [orderer.consensus.etcdraft] poll -> INFO 6e9 1 received MsgPreVoteResp from 2 at term 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6ea 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6eb 1 became candidate at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.199 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.199 UTC [orderer.consensus.etcdraft] poll -> INFO 6ed 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.201 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ee 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.201 UTC [orderer.consensus.etcdraft] campaign -> INFO 6ef 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.202 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2020-10-14 19:01:01.202 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +"2020-10-14 19:01:01.203 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.5µs " +"2020-10-14 19:01:01.203 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.7µs " +"2020-10-14 19:01:01.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] poll -> INFO 6f5 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6f6 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6f7 1 became leader at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.207 UTC [orderer.consensus.etcdraft] run -> INFO 6f8 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2020-10-14 19:01:01.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] run -> INFO 6fa Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fb Sending msg of 36 bytes to 3 on channel businesschannel took 16.7µs" +"2020-10-14 19:01:01.208 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6fc Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2020-10-14 19:01:01.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fd Sending msg of 36 bytes to 2 on channel businesschannel took 16.4µs" +"2020-10-14 19:01:01.209 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6fe There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2020-10-14 19:01:01.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ff Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 191.7µs " +"2020-10-14 19:01:01.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 700 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2020-10-14 19:01:01.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU 701 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2020-10-14 19:01:01.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.1µs " +"2020-10-14 19:01:01.212 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 704 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2020-10-14 19:01:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 705 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU 706 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.215 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 707 Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +"2020-10-14 19:01:01.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 708 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.4µs " +"2020-10-14 19:01:01.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU 709 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:01.240 UTC [policies] Evaluate -> DEBU 70e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:01:01.241 UTC [msp] DeserializeIdentity -> DEBU 70f Obtaining identity" +"2020-10-14 19:01:01.241 UTC [msp.identity] newIdentity -> DEBU 710 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-10-14 19:01:01.242 UTC [cauthdsl] func1 -> DEBU 711 0xc0009c9ef0 gate 1602702061242161200 evaluation starts" +"2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 712 0xc0009c9ef0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 713 0xc0009c9ef0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:01.242 UTC [cauthdsl] func2 -> DEBU 714 0xc0009c9ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-10-14 19:01:01.243 UTC [cauthdsl] func2 -> DEBU 715 0xc0009c9ef0 principal evaluation fails" +"2020-10-14 19:01:01.243 UTC [cauthdsl] func1 -> DEBU 716 0xc0009c9ef0 gate 1602702061242161200 evaluation fails" +"2020-10-14 19:01:01.243 UTC [policies] Evaluate -> DEBU 717 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:01.243 UTC [policies] Evaluate -> DEBU 718 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:01.244 UTC [policies] func1 -> DEBU 719 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71a Signature set did not satisfy policy /Channel/Orderer/Readers" +"2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:01:01.244 UTC [policies] Evaluate -> DEBU 71d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:01.245 UTC [policies] Evaluate -> DEBU 71e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:01:01.245 UTC [cauthdsl] func1 -> DEBU 71f 0xc000d0d7a0 gate 1602702061245372000 evaluation starts" +"2020-10-14 19:01:01.245 UTC [cauthdsl] func2 -> DEBU 720 0xc000d0d7a0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:01.246 UTC [cauthdsl] func2 -> DEBU 721 0xc000d0d7a0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:01.246 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 722 Checking if identity satisfies MEMBER role for Org1MSP" +"2020-10-14 19:01:01.246 UTC [msp] Validate -> DEBU 723 MSP Org1MSP validating identity" +"2020-10-14 19:01:01.247 UTC [msp] getCertificationChain -> DEBU 724 MSP Org1MSP getting certification chain" +"2020-10-14 19:01:01.247 UTC [cauthdsl] func2 -> DEBU 725 0xc000d0d7a0 principal matched by identity 0" +"2020-10-14 19:01:01.248 UTC [msp.identity] Verify -> DEBU 726 Verify: digest = 00000000 ab 3d 82 5c c0 99 3c 53 b5 85 2f 18 e2 91 33 9b |.=.\.. DEBU 727 Verify: sig = 00000000 30 44 02 20 4f 7c 32 90 af d1 4d 64 81 4d bc 69 |0D. O|2...Md.M.i| +00000010 83 4e c7 20 48 eb 43 b2 f1 09 aa 96 7e f4 28 be |.N. H.C.....~.(.| +00000020 45 d2 43 81 02 20 45 cf 9e 7c 50 43 b2 3d 55 b0 |E.C.. E..|PC.=U.| +00000030 0d dc ec e7 b3 b3 6c b6 00 41 bd 4c 78 54 f5 2e |......l..A.LxT..| +00000040 c1 16 58 66 89 ab |..Xf..|" +"2020-10-14 19:01:01.249 UTC [cauthdsl] func2 -> DEBU 728 0xc000d0d7a0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:01.250 UTC [cauthdsl] func1 -> DEBU 729 0xc000d0d7a0 gate 1602702061245372000 evaluation succeeds" +"2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:01.250 UTC [policies] Evaluate -> DEBU 72c Signature set satisfies policy /Channel/Application/Readers" +"2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72e Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:01:01.251 UTC [policies] Evaluate -> DEBU 72f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:01:01.251 UTC [common.deliver] deliverBlocks -> DEBU 730 [channel: businesschannel] Received seekInfo (0xc000d2a7c0) start: > stop: > from 172.18.0.9:39950" +"2020-10-14 19:01:01.251 UTC [fsblkstorage] Next -> DEBU 731 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-10-14 19:01:01.252 UTC [fsblkstorage] newBlockfileStream -> DEBU 732 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-10-14 19:01:01.252 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 733 Remaining bytes=[28474], Going to peek [8] bytes" +"2020-10-14 19:01:01.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 734 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:01:01.253 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 735 blockbytes [28471] read from file [0]" +"2020-10-14 19:01:01.253 UTC [common.deliver] deliverBlocks -> DEBU 736 [channel: businesschannel] Delivering block [0] for (0xc000d2a7c0) for 172.18.0.9:39950" +"2020-10-14 19:01:01.254 UTC [common.deliver] deliverBlocks -> DEBU 737 [channel: businesschannel] Done delivering to 172.18.0.9:39950 for (0xc000d2a7c0)" +"2020-10-14 19:01:01.255 UTC [common.deliver] Handle -> DEBU 738 Waiting for new SeekInfo from 172.18.0.9:39950" +"2020-10-14 19:01:01.257 UTC [common.deliver] Handle -> DEBU 739 Attempting to read seek info message from 172.18.0.9:39950" +"2020-10-14 19:01:01.258 UTC [common.deliver] Handle -> DEBU 73a Received EOF from 172.18.0.9:39950, hangup" +"2020-10-14 19:01:01.258 UTC [orderer.common.server] func1 -> DEBU 73b Closing Deliver stream" +"2020-10-14 19:01:01.258 UTC [comm.grpc.server] 1 -> INFO 73c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39950 grpc.code=OK grpc.call_duration=224.1848ms +"2020-10-14 19:01:01.262 UTC [grpc] warningf -> DEBU 73d transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:39950: read: connection reset by peer" +"2020-10-14 19:01:01.262 UTC [grpc] infof -> DEBU 73e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.263 UTC [grpc] infof -> DEBU 73f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 740 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 741 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.264 UTC [grpc] infof -> DEBU 742 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.265 UTC [grpc] infof -> DEBU 743 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.265 UTC [grpc] infof -> DEBU 744 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:01.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 745 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:01.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 746 Sending msg of 28 bytes to 3 on channel testchainid took 304.4µs" +"2020-10-14 19:01:01.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 747 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 297.4µs " +"2020-10-14 19:01:01.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 748 Sending msg of 28 bytes to 2 on channel businesschannel took 74.9µs" +"2020-10-14 19:01:01.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 749 Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +"2020-10-14 19:01:01.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +"2020-10-14 19:01:01.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.6µs " +"2020-10-14 19:01:01.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:01.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:02.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:02.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +"2020-10-14 19:01:02.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2020-10-14 19:01:02.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 751 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2020-10-14 19:01:02.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 753 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2020-10-14 19:01:02.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.9µs " +"2020-10-14 19:01:02.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 752 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.5µs " +"2020-10-14 19:01:02.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 755 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:02.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 756 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:02.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU 757 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:02.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 758 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-10-14 19:01:02.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 759 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.7µs " +"2020-10-14 19:01:02.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2020-10-14 19:01:02.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75c Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-10-14 19:01:02.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +"2020-10-14 19:01:02.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:02.697 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.6µs " +"2020-10-14 19:01:02.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:03.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 760 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:03.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 761 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2020-10-14 19:01:03.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 762 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 477.7µs " +"2020-10-14 19:01:03.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 763 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2020-10-14 19:01:03.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 764 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2020-10-14 19:01:03.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 765 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.8µs " +"2020-10-14 19:01:03.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.4µs " +"2020-10-14 19:01:03.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 767 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:03.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 768 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:03.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 769 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:03.588 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76a Sending msg of 28 bytes to 3 on channel testchainid took 556.2µs" +"2020-10-14 19:01:03.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.5µs " +"2020-10-14 19:01:03.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2020-10-14 19:01:03.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76d Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-10-14 19:01:03.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.9µs " +"2020-10-14 19:01:03.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 76f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.6µs " +"2020-10-14 19:01:03.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU 770 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:03.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU 771 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:04.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 772 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:04.085 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 773 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-10-14 19:01:04.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU 774 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.8µs " +"2020-10-14 19:01:04.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 775 Sending msg of 28 bytes to 3 on channel businesschannel took 50.8µs" +"2020-10-14 19:01:04.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 776 Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +"2020-10-14 19:01:04.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 777 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.3µs " +"2020-10-14 19:01:04.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU 778 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:04.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 779 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.7µs " +"2020-10-14 19:01:04.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:04.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 77b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:04.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77c Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-10-14 19:01:04.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 77d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.8398ms " +"2020-10-14 19:01:04.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77e Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +"2020-10-14 19:01:04.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 77f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-10-14 19:01:04.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 780 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0045ms " +"2020-10-14 19:01:04.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 781 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 660.5µs " +"2020-10-14 19:01:04.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 782 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:04.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU 783 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 784 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:05.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 785 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.1µs " +"2020-10-14 19:01:05.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 786 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-10-14 19:01:05.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 787 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-10-14 19:01:05.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 788 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +"2020-10-14 19:01:05.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 789 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.4µs " +"2020-10-14 19:01:05.198 UTC [orderer.common.cluster.step] handleMessage -> DEBU 78a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.206 UTC [orderer.common.cluster.step] handleMessage -> DEBU 78b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 78c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.9764ms " +"2020-10-14 19:01:05.376 UTC [orderer.common.server] Deliver -> DEBU 78d Starting new Deliver handler" +"2020-10-14 19:01:05.377 UTC [common.deliver] Handle -> DEBU 78e Starting new deliver loop for 172.18.0.9:39976" +"2020-10-14 19:01:05.377 UTC [common.deliver] Handle -> DEBU 78f Attempting to read seek info message from 172.18.0.9:39976" +"2020-10-14 19:01:05.397 UTC [orderer.common.server] Broadcast -> DEBU 790 Starting new Broadcast handler" +"2020-10-14 19:01:05.398 UTC [orderer.common.broadcast] Handle -> DEBU 791 Starting new broadcast loop for 172.18.0.9:39978" +"2020-10-14 19:01:05.398 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 792 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39978" +"2020-10-14 19:01:05.399 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 793 Processing config update message for exisitng channel businesschannel" +"2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 794 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 795 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:05.400 UTC [policies] Evaluate -> DEBU 796 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:05.401 UTC [policies] Evaluate -> DEBU 797 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:05.401 UTC [policies] Evaluate -> DEBU 798 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:05.401 UTC [cauthdsl] func1 -> DEBU 799 0xc0001b52c0 gate 1602702065401941500 evaluation starts" +"2020-10-14 19:01:05.402 UTC [cauthdsl] func2 -> DEBU 79a 0xc0001b52c0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:05.402 UTC [cauthdsl] func2 -> DEBU 79b 0xc0001b52c0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:05.403 UTC [cauthdsl] func2 -> DEBU 79c 0xc0001b52c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-10-14 19:01:05.403 UTC [cauthdsl] func2 -> DEBU 79d 0xc0001b52c0 principal evaluation fails" +"2020-10-14 19:01:05.404 UTC [cauthdsl] func1 -> DEBU 79e 0xc0001b52c0 gate 1602702065401941500 evaluation fails" +"2020-10-14 19:01:05.404 UTC [policies] Evaluate -> DEBU 79f Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.405 UTC [policies] Evaluate -> DEBU 7a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.405 UTC [policies] func1 -> DEBU 7a1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-10-14 19:01:05.405 UTC [policies] Evaluate -> DEBU 7a2 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:05.406 UTC [policies] Evaluate -> DEBU 7a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:05.407 UTC [policies] Evaluate -> DEBU 7a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:05.407 UTC [cauthdsl] func1 -> DEBU 7a7 0xc0000aee50 gate 1602702065407519600 evaluation starts" +"2020-10-14 19:01:05.407 UTC [cauthdsl] func2 -> DEBU 7a8 0xc0000aee50 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:05.408 UTC [cauthdsl] func2 -> DEBU 7a9 0xc0000aee50 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:05.408 UTC [cauthdsl] func2 -> DEBU 7aa 0xc0000aee50 principal matched by identity 0" +"2020-10-14 19:01:05.408 UTC [msp.identity] Verify -> DEBU 7ab Verify: digest = 00000000 77 e9 fa 5d 1e 1f bc cb 1d 51 c3 a8 4b 89 f3 cb |w..].....Q..K...| +00000010 d8 1b 00 79 bd 4c 6e 1b dd c4 1e 89 a7 7c 8a 13 |...y.Ln......|..|" +"2020-10-14 19:01:05.409 UTC [msp.identity] Verify -> DEBU 7ac Verify: sig = 00000000 30 44 02 20 2b ec 95 c5 67 c7 cf 7d c5 d3 eb 84 |0D. +...g..}....| +00000010 00 10 20 db 72 11 e0 63 56 66 94 c0 e6 3b ba 11 |.. .r..cVf...;..| +00000020 53 54 44 11 02 20 66 77 39 31 06 bd 76 c3 2a 40 |STD.. fw91..v.*@| +00000030 47 ea be f7 f6 df 80 43 b4 b4 1b 91 a0 9c 99 62 |G......C.......b| +00000040 2c 9a e4 55 08 24 |,..U.$|" +"2020-10-14 19:01:05.409 UTC [cauthdsl] func2 -> DEBU 7ad 0xc0000aee50 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:05.410 UTC [cauthdsl] func1 -> DEBU 7ae 0xc0000aee50 gate 1602702065407519600 evaluation succeeds" +"2020-10-14 19:01:05.410 UTC [policies] Evaluate -> DEBU 7af Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.410 UTC [policies] Evaluate -> DEBU 7b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b1 Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:05.411 UTC [policies] Evaluate -> DEBU 7b3 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:05.412 UTC [policies] Evaluate -> DEBU 7b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:05.412 UTC [common.configtx] addToMap -> DEBU 7b5 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b6 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7b9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.413 UTC [common.configtx] addToMap -> DEBU 7ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bc Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7bd Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.414 UTC [common.configtx] addToMap -> DEBU 7be Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7bf Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c0 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.415 UTC [common.configtx] addToMap -> DEBU 7c2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.416 UTC [common.configtx] addToMap -> DEBU 7c3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.416 UTC [common.configtx] verifyDeltaSet -> DEBU 7c4 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.416 UTC [common.configtx] policyForItem -> DEBU 7c5 Getting policy for item Org1MSP with mod_policy Admins" +"2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c6 Manager Channel looking up path [Application]" +"2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c7 Manager Channel has managers Orderer" +"2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c8 Manager Channel has managers Application" +"2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7c9 Manager Channel/Application looking up path []" +"2020-10-14 19:01:05.416 UTC [policies] Manager -> DEBU 7ca Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cb Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cc Manager Channel/Application looking up path [Org1MSP]" +"2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cd Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7ce Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.417 UTC [policies] Manager -> DEBU 7cf Manager Channel/Application/Org1MSP looking up path []" +"2020-10-14 19:01:05.417 UTC [policies] Evaluate -> DEBU 7d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:01:05.418 UTC [cauthdsl] func1 -> DEBU 7d1 0xc0002dece0 gate 1602702065417995900 evaluation starts" +"2020-10-14 19:01:05.418 UTC [cauthdsl] func2 -> DEBU 7d2 0xc0002dece0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:05.418 UTC [cauthdsl] func2 -> DEBU 7d3 0xc0002dece0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:05.418 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7d4 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-10-14 19:01:05.419 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7d5 Checking if identity carries the admin ou for Org1MSP" +"2020-10-14 19:01:05.419 UTC [msp] Validate -> DEBU 7d6 MSP Org1MSP validating identity" +"2020-10-14 19:01:05.419 UTC [msp] getCertificationChain -> DEBU 7d7 MSP Org1MSP getting certification chain" +"2020-10-14 19:01:05.420 UTC [msp] hasOURole -> DEBU 7d8 MSP Org1MSP checking if the identity is a client" +"2020-10-14 19:01:05.420 UTC [msp] getCertificationChain -> DEBU 7d9 MSP Org1MSP getting certification chain" +"2020-10-14 19:01:05.421 UTC [cauthdsl] func2 -> DEBU 7da 0xc0002dece0 principal matched by identity 0" +"2020-10-14 19:01:05.421 UTC [msp.identity] Verify -> DEBU 7db Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...|" +"2020-10-14 19:01:05.421 UTC [msp.identity] Verify -> DEBU 7dc Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +00000040 4b 9a 28 c2 f7 c3 |K.(...|" +"2020-10-14 19:01:05.421 UTC [cauthdsl] func2 -> DEBU 7dd 0xc0002dece0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:05.421 UTC [cauthdsl] func1 -> DEBU 7de 0xc0002dece0 gate 1602702065417995900 evaluation succeeds" +"2020-10-14 19:01:05.422 UTC [policies] Evaluate -> DEBU 7df Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.425 UTC [policies] Evaluate -> DEBU 7e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.425 UTC [common.configtx] verifyDeltaSet -> DEBU 7e1 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.425 UTC [common.configtx] recurseConfigMap -> DEBU 7e2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.426 UTC [common.configtx] recurseConfigMap -> DEBU 7e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.427 UTC [common.configtx] recurseConfigMap -> DEBU 7e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.428 UTC [common.configtx] recurseConfigMap -> DEBU 7e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7e9 Setting policy for key Admins to " +"2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7ea Setting policy for key Readers to " +"2020-10-14 19:01:05.432 UTC [common.configtx] recurseConfigMap -> DEBU 7eb Setting policy for key Writers to " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ec Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ed Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ee Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7ef Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7f0 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.433 UTC [common.configtx] recurseConfigMap -> DEBU 7f1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.configtx] recurseConfigMap -> DEBU 7f7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.434 UTC [common.channelconfig] NewStandardValues -> DEBU 7f8 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:05.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f9 Processing field: HashingAlgorithm" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fa Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fb Processing field: OrdererAddresses" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fc Processing field: Consortium" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fd Processing field: Capabilities" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] NewStandardValues -> DEBU 7fe Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ff Processing field: ACLs" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 800 Processing field: Capabilities" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] NewStandardValues -> DEBU 801 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 802 Processing field: AnchorPeers" +"2020-10-14 19:01:05.436 UTC [common.channelconfig] NewStandardValues -> DEBU 803 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 804 Processing field: MSP" +"2020-10-14 19:01:05.436 UTC [common.channelconfig] Validate -> DEBU 805 Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:05.436 UTC [common.channelconfig] validateMSP -> DEBU 806 Setting up MSP for org Org1MSP" +"2020-10-14 19:01:05.436 UTC [msp] newBccspMsp -> DEBU 807 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.436 UTC [msp] New -> DEBU 808 Creating Cache-MSP instance" +"2020-10-14 19:01:05.436 UTC [msp] Setup -> DEBU 809 Setting up MSP instance Org1MSP" +"2020-10-14 19:01:05.437 UTC [msp.identity] newIdentity -> DEBU 80a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.437 UTC [common.channelconfig] NewStandardValues -> DEBU 80b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80c Processing field: AnchorPeers" +"2020-10-14 19:01:05.437 UTC [common.channelconfig] NewStandardValues -> DEBU 80d Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 80e Processing field: MSP" +"2020-10-14 19:01:05.437 UTC [common.channelconfig] Validate -> DEBU 80f Anchor peers for org Org2MSP are " +"2020-10-14 19:01:05.438 UTC [common.channelconfig] validateMSP -> DEBU 810 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:05.438 UTC [msp] newBccspMsp -> DEBU 811 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.438 UTC [msp] New -> DEBU 812 Creating Cache-MSP instance" +"2020-10-14 19:01:05.438 UTC [msp] Setup -> DEBU 813 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:05.438 UTC [msp.identity] newIdentity -> DEBU 814 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.439 UTC [common.channelconfig] NewStandardValues -> DEBU 815 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:05.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 816 Processing field: ConsensusType" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 817 Processing field: BatchSize" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 818 Processing field: BatchTimeout" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 819 Processing field: KafkaBrokers" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81a Processing field: ChannelRestrictions" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81b Processing field: Capabilities" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] NewStandardValues -> DEBU 81c Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81d Processing field: Endpoints" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] NewStandardValues -> DEBU 81e Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 81f Processing field: MSP" +"2020-10-14 19:01:05.440 UTC [common.channelconfig] validateMSP -> DEBU 820 Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:05.440 UTC [msp] newBccspMsp -> DEBU 821 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.440 UTC [msp] New -> DEBU 822 Creating Cache-MSP instance" +"2020-10-14 19:01:05.440 UTC [msp] Setup -> DEBU 823 Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:05.441 UTC [msp.identity] newIdentity -> DEBU 824 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.442 UTC [msp] Setup -> DEBU 825 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:05.442 UTC [msp] Setup -> DEBU 826 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 827 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 828 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 829 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82a Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82b Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82c Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82d Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.442 UTC [policies] NewManagerImpl -> DEBU 82e Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:05.443 UTC [policies] GetPolicy -> DEBU 82f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 830 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:05.443 UTC [policies] GetPolicy -> DEBU 831 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 832 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 833 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 834 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:05.443 UTC [policies] NewManagerImpl -> DEBU 835 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 836 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 837 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 838 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 839 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83a Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83b Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83c Proposed new policy Writers for Channel" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83d Proposed new policy Admins for Channel" +"2020-10-14 19:01:05.444 UTC [policies] NewManagerImpl -> DEBU 83e Proposed new policy Readers for Channel" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 83f Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.444 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84b Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84d Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84e Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 84f Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:05.445 UTC [common.configtx] addToMap -> DEBU 850 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 851 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 852 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 853 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 854 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 855 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.446 UTC [common.configtx] addToMap -> DEBU 856 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:05.447 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 868 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 869 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:05.448 UTC [common.configtx] addToMap -> DEBU 86a Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:05.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 86b As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:01:05.448 UTC [common.channelconfig] LogSanityChecks -> DEBU 86c As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:01:05.448 UTC [policies] Manager -> DEBU 86d Manager Channel looking up path [Application]" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 86e Manager Channel has managers Application" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 86f Manager Channel has managers Orderer" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 870 Manager Channel/Application looking up path []" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 871 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 872 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 873 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 874 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:01:05.449 UTC [common.channelconfig] LogSanityChecks -> DEBU 875 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:01:05.449 UTC [policies] Manager -> DEBU 876 Manager Channel looking up path [Orderer]" +"2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 877 Manager Channel has managers Application" +"2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 878 Manager Channel has managers Orderer" +"2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 879 Manager Channel/Orderer looking up path []" +"2020-10-14 19:01:05.450 UTC [policies] Manager -> DEBU 87a Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87c As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87d As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:01:05.450 UTC [common.channelconfig] LogSanityChecks -> DEBU 87e As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:01:05.450 UTC [common.capabilities] Supported -> DEBU 87f Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:05.450 UTC [common.capabilities] Supported -> DEBU 880 Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:05.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 881 Obtaining default signing identity" +"2020-10-14 19:01:05.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 882 Obtaining default signing identity" +"2020-10-14 19:01:05.451 UTC [msp.identity] Sign -> DEBU 883 Sign: plaintext: 0AEA060A1B08011A0608F1959DFC0522...8043B4B41B91A09C99622C9AE4550824 " +"2020-10-14 19:01:05.452 UTC [msp.identity] Sign -> DEBU 884 Sign: digest: 95CC8808DB2345AC6DF1CF9675C26B838FF16A38164387492D22CAEBE12C91BA " +"2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 885 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 886 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 887 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 888 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:05.452 UTC [policies] Evaluate -> DEBU 889 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:05.452 UTC [msp] DeserializeIdentity -> DEBU 88a Obtaining identity" +"2020-10-14 19:01:05.453 UTC [msp.identity] newIdentity -> DEBU 88b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.453 UTC [cauthdsl] func1 -> DEBU 88c 0xc0004b6bf0 gate 1602702065453339500 evaluation starts" +"2020-10-14 19:01:05.453 UTC [cauthdsl] func2 -> DEBU 88d 0xc0004b6bf0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:05.453 UTC [cauthdsl] func2 -> DEBU 88e 0xc0004b6bf0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:05.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 88f Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:01:05.453 UTC [msp] Validate -> DEBU 890 MSP OrdererMSP validating identity" +"2020-10-14 19:01:05.454 UTC [msp] getCertificationChain -> DEBU 891 MSP OrdererMSP getting certification chain" +"2020-10-14 19:01:05.454 UTC [cauthdsl] func2 -> DEBU 892 0xc0004b6bf0 principal matched by identity 0" +"2020-10-14 19:01:05.454 UTC [msp.identity] Verify -> DEBU 893 Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..|" +"2020-10-14 19:01:05.454 UTC [msp.identity] Verify -> DEBU 894 Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +00000040 69 60 4d b6 27 ea |i`M.'.|" +"2020-10-14 19:01:05.455 UTC [cauthdsl] func2 -> DEBU 895 0xc0004b6bf0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:05.455 UTC [cauthdsl] func1 -> DEBU 896 0xc0004b6bf0 gate 1602702065453339500 evaluation succeeds" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 897 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 898 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 899 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89b Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:05.455 UTC [policies] Evaluate -> DEBU 89c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:05.455 UTC [orderer.common.msgprocessor] Apply -> DEBU 89d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-10-14 19:01:05.455 UTC [common.channelconfig] NewStandardValues -> DEBU 89e Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: HashingAlgorithm" +"2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: OrdererAddresses" +"2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a2 Processing field: Consortium" +"2020-10-14 19:01:05.455 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Capabilities" +"2020-10-14 19:01:05.456 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: ACLs" +"2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a6 Processing field: Capabilities" +"2020-10-14 19:01:05.456 UTC [common.channelconfig] NewStandardValues -> DEBU 8a7 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.456 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a8 Processing field: AnchorPeers" +"2020-10-14 19:01:05.457 UTC [common.channelconfig] NewStandardValues -> DEBU 8a9 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.457 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8aa Processing field: MSP" +"2020-10-14 19:01:05.457 UTC [common.channelconfig] Validate -> DEBU 8ab Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:05.457 UTC [common.channelconfig] validateMSP -> DEBU 8ac Setting up MSP for org Org1MSP" +"2020-10-14 19:01:05.457 UTC [msp] newBccspMsp -> DEBU 8ad Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.457 UTC [msp] New -> DEBU 8ae Creating Cache-MSP instance" +"2020-10-14 19:01:05.457 UTC [msp] Setup -> DEBU 8af Setting up MSP instance Org1MSP" +"2020-10-14 19:01:05.458 UTC [msp.identity] newIdentity -> DEBU 8b0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.459 UTC [common.channelconfig] NewStandardValues -> DEBU 8b1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b2 Processing field: AnchorPeers" +"2020-10-14 19:01:05.459 UTC [common.channelconfig] NewStandardValues -> DEBU 8b3 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8b4 Processing field: MSP" +"2020-10-14 19:01:05.459 UTC [common.channelconfig] Validate -> DEBU 8b5 Anchor peers for org Org2MSP are " +"2020-10-14 19:01:05.459 UTC [common.channelconfig] validateMSP -> DEBU 8b6 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:05.459 UTC [msp] newBccspMsp -> DEBU 8b7 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.459 UTC [msp] New -> DEBU 8b8 Creating Cache-MSP instance" +"2020-10-14 19:01:05.459 UTC [msp] Setup -> DEBU 8b9 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:05.460 UTC [msp.identity] newIdentity -> DEBU 8ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] NewStandardValues -> DEBU 8bb Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bc Processing field: ConsensusType" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bd Processing field: BatchSize" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8be Processing field: BatchTimeout" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8bf Processing field: KafkaBrokers" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c0 Processing field: ChannelRestrictions" +"2020-10-14 19:01:05.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c1 Processing field: Capabilities" +"2020-10-14 19:01:05.462 UTC [common.channelconfig] NewStandardValues -> DEBU 8c2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:05.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c3 Processing field: Endpoints" +"2020-10-14 19:01:05.462 UTC [common.channelconfig] NewStandardValues -> DEBU 8c4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c5 Processing field: MSP" +"2020-10-14 19:01:05.462 UTC [common.channelconfig] validateMSP -> DEBU 8c6 Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:05.462 UTC [msp] newBccspMsp -> DEBU 8c7 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.462 UTC [msp] New -> DEBU 8c8 Creating Cache-MSP instance" +"2020-10-14 19:01:05.462 UTC [msp] Setup -> DEBU 8c9 Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:05.463 UTC [msp.identity] newIdentity -> DEBU 8ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.463 UTC [msp] Setup -> DEBU 8cb Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:05.464 UTC [msp] Setup -> DEBU 8cc MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8cd Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8ce Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8cf Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d0 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d1 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.464 UTC [policies] NewManagerImpl -> DEBU 8d2 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d3 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.465 UTC [policies] GetPolicy -> DEBU 8d4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d5 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d6 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d7 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8d8 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:05.465 UTC [policies] GetPolicy -> DEBU 8d9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.465 UTC [policies] NewManagerImpl -> DEBU 8da Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8db Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8dd Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.466 UTC [policies] NewManagerImpl -> DEBU 8de Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8df Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e0 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy Writers for Channel" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Admins for Channel" +"2020-10-14 19:01:05.467 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Readers for Channel" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:05.467 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f2 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f3 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f4 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:05.468 UTC [common.configtx] addToMap -> DEBU 8f5 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f6 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:05.469 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:05.470 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:05.471 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:05.472 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 911 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39978" +"2020-10-14 19:01:05.472 UTC [orderer.consensus.etcdraft] propose -> INFO 912 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:01:05.473 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 913 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-10-14 19:01:05.474 UTC [orderer.consensus.etcdraft] 2 -> DEBU 914 Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:01:05.479 UTC [grpc] warningf -> DEBU 915 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:39978: read: connection reset by peer" +"2020-10-14 19:01:05.479 UTC [orderer.common.broadcast] Handle -> WARN 916 Error reading from 172.18.0.9:39978: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:05.479 UTC [orderer.common.server] func1 -> DEBU 917 Closing Broadcast stream" +"2020-10-14 19:01:05.479 UTC [comm.grpc.server] 1 -> INFO 918 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.0929ms +"2020-10-14 19:01:05.479 UTC [grpc] infof -> DEBU 919 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:05.479 UTC [common.deliver] Handle -> WARN 91a Error reading from 172.18.0.9:39976: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:05.480 UTC [orderer.common.server] func1 -> DEBU 91b Closing Deliver stream" +"2020-10-14 19:01:05.480 UTC [comm.grpc.server] 1 -> INFO 91c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39976 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.3878ms +"2020-10-14 19:01:05.480 UTC [grpc] infof -> DEBU 91d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:05.481 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 91e Sending msg of 27266 bytes to 2 on channel businesschannel took 22.5µs" +"2020-10-14 19:01:05.482 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 91f Sending msg of 27266 bytes to 3 on channel businesschannel took 720.9µs" +"2020-10-14 19:01:05.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 920 Send of ConsensusRequest for channel businesschannel with payload of size 27266 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +"2020-10-14 19:01:05.482 UTC [orderer.common.cluster.step] sendMessage -> DEBU 921 Send of ConsensusRequest for channel businesschannel with payload of size 27266 to orderer1.example.com(orderer1.example.com:7050) took 85µs " +"2020-10-14 19:01:05.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 922 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 923 Sending msg of 28 bytes to 2 on channel businesschannel took 13µs" +"2020-10-14 19:01:05.488 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 924 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2020-10-14 19:01:05.489 UTC [orderer.common.cluster.step] sendMessage -> DEBU 925 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 572.8µs " +"2020-10-14 19:01:05.490 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 926 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 927 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 928 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 929 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.491 UTC [common.configtx] addToMap -> DEBU 92d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 92e Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 92f Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.492 UTC [common.configtx] addToMap -> DEBU 930 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.493 UTC [common.configtx] addToMap -> DEBU 931 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.493 UTC [common.configtx] addToMap -> DEBU 932 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 933 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 934 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.494 UTC [common.configtx] addToMap -> DEBU 935 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.495 UTC [common.configtx] verifyDeltaSet -> DEBU 936 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.495 UTC [common.configtx] policyForItem -> DEBU 937 Getting policy for item Org1MSP with mod_policy Admins" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 938 Manager Channel looking up path [Application]" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 939 Manager Channel has managers Orderer" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93a Manager Channel has managers Application" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93b Manager Channel/Application looking up path []" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93c Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.495 UTC [policies] Manager -> DEBU 93d Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 93e Manager Channel/Application looking up path [Org1MSP]" +"2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 93f Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 940 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.496 UTC [policies] Manager -> DEBU 941 Manager Channel/Application/Org1MSP looking up path []" +"2020-10-14 19:01:05.496 UTC [policies] Evaluate -> DEBU 942 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:01:05.496 UTC [orderer.common.cluster.step] handleMessage -> DEBU 943 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 945 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " +"2020-10-14 19:01:05.496 UTC [cauthdsl] func1 -> DEBU 944 0xc000cf1a90 gate 1602702065496254900 evaluation starts" +"2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 946 0xc000cf1a90 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 947 0xc000cf1a90 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:05.497 UTC [cauthdsl] func2 -> DEBU 948 0xc000cf1a90 principal matched by identity 0" +"2020-10-14 19:01:05.498 UTC [msp.identity] Verify -> DEBU 949 Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...|" +"2020-10-14 19:01:05.498 UTC [msp.identity] Verify -> DEBU 94a Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +00000040 4b 9a 28 c2 f7 c3 |K.(...|" +"2020-10-14 19:01:05.498 UTC [cauthdsl] func2 -> DEBU 94b 0xc000cf1a90 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:05.498 UTC [cauthdsl] func1 -> DEBU 94c 0xc000cf1a90 gate 1602702065496254900 evaluation succeeds" +"2020-10-14 19:01:05.498 UTC [policies] Evaluate -> DEBU 94d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.498 UTC [policies] Evaluate -> DEBU 94e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.498 UTC [common.configtx] verifyDeltaSet -> DEBU 94f Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.500 UTC [orderer.common.cluster.step] handleMessage -> DEBU 950 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.503 UTC [common.configtx] recurseConfigMap -> DEBU 951 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.503 UTC [orderer.common.cluster.step] handleMessage -> DEBU 952 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 953 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 954 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.504 UTC [common.configtx] recurseConfigMap -> DEBU 955 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.505 UTC [common.configtx] recurseConfigMap -> DEBU 956 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.506 UTC [common.configtx] recurseConfigMap -> DEBU 957 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.506 UTC [common.configtx] recurseConfigMap -> DEBU 958 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.507 UTC [common.configtx] recurseConfigMap -> DEBU 959 Setting policy for key Admins to " +"2020-10-14 19:01:05.508 UTC [common.configtx] recurseConfigMap -> DEBU 95a Setting policy for key Readers to " +"2020-10-14 19:01:05.508 UTC [common.configtx] recurseConfigMap -> DEBU 95b Setting policy for key Writers to " +"2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 95f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.509 UTC [common.configtx] recurseConfigMap -> DEBU 960 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 961 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 962 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 963 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 964 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 965 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 966 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.510 UTC [common.configtx] recurseConfigMap -> DEBU 967 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 968 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 969 Processing field: HashingAlgorithm" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96a Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96b Processing field: OrdererAddresses" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96c Processing field: Consortium" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96d Processing field: Capabilities" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 96e Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96f Processing field: ACLs" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 970 Processing field: Capabilities" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 971 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 972 Processing field: AnchorPeers" +"2020-10-14 19:01:05.511 UTC [common.channelconfig] NewStandardValues -> DEBU 973 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 974 Processing field: MSP" +"2020-10-14 19:01:05.512 UTC [common.channelconfig] Validate -> DEBU 975 Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:05.512 UTC [common.channelconfig] validateMSP -> DEBU 976 Setting up MSP for org Org1MSP" +"2020-10-14 19:01:05.512 UTC [msp] newBccspMsp -> DEBU 977 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.512 UTC [msp] New -> DEBU 978 Creating Cache-MSP instance" +"2020-10-14 19:01:05.512 UTC [msp] Setup -> DEBU 979 Setting up MSP instance Org1MSP" +"2020-10-14 19:01:05.512 UTC [msp.identity] newIdentity -> DEBU 97a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.513 UTC [common.channelconfig] NewStandardValues -> DEBU 97b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:05.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97c Processing field: AnchorPeers" +"2020-10-14 19:01:05.513 UTC [common.channelconfig] NewStandardValues -> DEBU 97d Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.514 UTC [common.channelconfig] initializeProtosStruct -> DEBU 97e Processing field: MSP" +"2020-10-14 19:01:05.514 UTC [common.channelconfig] Validate -> DEBU 97f Anchor peers for org Org2MSP are " +"2020-10-14 19:01:05.514 UTC [common.channelconfig] validateMSP -> DEBU 980 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:05.514 UTC [msp] newBccspMsp -> DEBU 981 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.514 UTC [msp] New -> DEBU 982 Creating Cache-MSP instance" +"2020-10-14 19:01:05.514 UTC [msp] Setup -> DEBU 983 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:05.515 UTC [msp.identity] newIdentity -> DEBU 984 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] NewStandardValues -> DEBU 985 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 986 Processing field: ConsensusType" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 987 Processing field: BatchSize" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 988 Processing field: BatchTimeout" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 989 Processing field: KafkaBrokers" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98a Processing field: ChannelRestrictions" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98b Processing field: Capabilities" +"2020-10-14 19:01:05.516 UTC [common.channelconfig] NewStandardValues -> DEBU 98c Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:05.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98d Processing field: Endpoints" +"2020-10-14 19:01:05.517 UTC [common.channelconfig] NewStandardValues -> DEBU 98e Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:05.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 98f Processing field: MSP" +"2020-10-14 19:01:05.517 UTC [common.channelconfig] validateMSP -> DEBU 990 Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:05.517 UTC [msp] newBccspMsp -> DEBU 991 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:05.517 UTC [msp] New -> DEBU 992 Creating Cache-MSP instance" +"2020-10-14 19:01:05.517 UTC [msp] Setup -> DEBU 993 Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:05.518 UTC [msp.identity] newIdentity -> DEBU 994 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:05.519 UTC [msp] Setup -> DEBU 995 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:05.519 UTC [msp] Setup -> DEBU 996 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:05.519 UTC [policies] NewManagerImpl -> DEBU 997 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.519 UTC [policies] NewManagerImpl -> DEBU 998 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 999 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99a Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99b Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99c Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99d Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99e Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:05.520 UTC [policies] NewManagerImpl -> DEBU 99f Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:05.521 UTC [policies] GetPolicy -> DEBU 9a0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a1 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:05.521 UTC [policies] GetPolicy -> DEBU 9a2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a3 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a4 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a8 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9a9 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:05.521 UTC [policies] NewManagerImpl -> DEBU 9aa Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ab Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ac Proposed new policy Writers for Channel" +"2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ad Proposed new policy Admins for Channel" +"2020-10-14 19:01:05.522 UTC [policies] NewManagerImpl -> DEBU 9ae Proposed new policy Readers for Channel" +"2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Group] /Channel" +"2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:05.522 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:05.523 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bd Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9be Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:05.524 UTC [common.configtx] addToMap -> DEBU 9bf Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c0 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c2 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c3 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c4 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:05.525 UTC [common.configtx] addToMap -> DEBU 9c6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9ca Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cb Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cc Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:05.526 UTC [common.configtx] addToMap -> DEBU 9cd Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:05.527 UTC [common.configtx] addToMap -> DEBU 9ce Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:05.527 UTC [common.configtx] addToMap -> DEBU 9cf Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:05.528 UTC [common.configtx] addToMap -> DEBU 9d0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:05.528 UTC [common.configtx] addToMap -> DEBU 9d1 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d3 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d4 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:05.529 UTC [common.configtx] addToMap -> DEBU 9d5 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d7 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:05.530 UTC [common.configtx] addToMap -> DEBU 9d8 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:05.531 UTC [common.configtx] addToMap -> DEBU 9d9 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:05.531 UTC [common.configtx] addToMap -> DEBU 9da Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:05.532 UTC [common.channelconfig] LogSanityChecks -> DEBU 9db As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:01:05.533 UTC [common.channelconfig] LogSanityChecks -> DEBU 9dc As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9dd Manager Channel looking up path [Application]" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9de Manager Channel has managers Application" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9df Manager Channel has managers Orderer" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e0 Manager Channel/Application looking up path []" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e1 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:05.533 UTC [policies] Manager -> DEBU 9e2 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e3 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e4 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:01:05.534 UTC [common.channelconfig] LogSanityChecks -> DEBU 9e5 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:01:05.534 UTC [policies] Manager -> DEBU 9e6 Manager Channel looking up path [Orderer]" +"2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e7 Manager Channel has managers Application" +"2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e8 Manager Channel has managers Orderer" +"2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9e9 Manager Channel/Orderer looking up path []" +"2020-10-14 19:01:05.535 UTC [policies] Manager -> DEBU 9ea Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:01:05.535 UTC [common.channelconfig] LogSanityChecks -> DEBU 9eb As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:01:05.535 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ec As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:01:05.536 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ed As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:01:05.536 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ee As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:01:05.536 UTC [common.capabilities] Supported -> DEBU 9ef Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:05.536 UTC [common.capabilities] Supported -> DEBU 9f0 Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:05.536 UTC [orderer.common.server] func1 -> DEBU 9f1 Executing callback to update root CAs" +"2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f2 updating root CAs for channel [businesschannel]" +"2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f3 adding app root CAs for MSP [Org1MSP]" +"2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f4 adding app root CAs for MSP [Org2MSP]" +"2020-10-14 19:01:05.537 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9f5 adding orderer root CAs for MSP [OrdererMSP]" +"2020-10-14 19:01:05.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9f6 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2020-10-14 19:01:05.538 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9f7 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2020-10-14 19:01:05.538 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f8 Obtaining default signing identity" +"2020-10-14 19:01:05.539 UTC [msp] GetDefaultSigningIdentity -> DEBU 9f9 Obtaining default signing identity" +"2020-10-14 19:01:05.539 UTC [msp.identity] Sign -> DEBU 9fa Sign: plaintext: 0A020801120B0A090A03010203100418...9F8A9CB867850C906CF84D92ED5192DD " +"2020-10-14 19:01:05.539 UTC [msp.identity] Sign -> DEBU 9fb Sign: digest: 48A3FB2223D005174A2AC804628224A55755498C9936ECFCA12DA0565AFF0CD7 " +"2020-10-14 19:01:05.542 UTC [fsblkstorage] indexBlock -> DEBU 9fc Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +]" +"2020-10-14 19:01:05.544 UTC [fsblkstorage] updateCheckpoint -> DEBU 9fd Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56641], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-10-14 19:01:05.544 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9fe [channel: businesschannel] Wrote block [1]" +"2020-10-14 19:01:05.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ff Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:05.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a00 Sending msg of 28 bytes to 3 on channel testchainid took 41.8µs" +"2020-10-14 19:01:05.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU a01 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.9µs " +"2020-10-14 19:01:05.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a02 Sending msg of 28 bytes to 3 on channel businesschannel took 44µs" +"2020-10-14 19:01:05.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a03 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +"2020-10-14 19:01:05.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU a04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 243.5µs " +"2020-10-14 19:01:05.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 794µs " +"2020-10-14 19:01:05.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU a06 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:05.697 UTC [orderer.common.cluster.step] handleMessage -> DEBU a07 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:06.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU a08 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:06.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 3 on channel testchainid took 716.8µs" +"2020-10-14 19:01:06.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.4µs " +"2020-10-14 19:01:06.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0b Sending msg of 28 bytes to 2 on channel businesschannel took 48.2µs" +"2020-10-14 19:01:06.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0c Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-10-14 19:01:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 568.3µs " +"2020-10-14 19:01:06.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:06.196 UTC [orderer.common.cluster.step] handleMessage -> DEBU a10 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 604.1µs " +"2020-10-14 19:01:06.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU a11 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:06.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel testchainid took 180.2µs" +"2020-10-14 19:01:06.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.8µs " +"2020-10-14 19:01:06.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a14 Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-10-14 19:01:06.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a15 Sending msg of 28 bytes to 3 on channel businesschannel took 35.2µs" +"2020-10-14 19:01:06.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0952ms " +"2020-10-14 19:01:06.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU a17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +"2020-10-14 19:01:06.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU a18 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:06.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU a19 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU a1a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:07.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1b Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2020-10-14 19:01:07.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU a1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +"2020-10-14 19:01:07.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1d Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2020-10-14 19:01:07.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a1e Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2020-10-14 19:01:07.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU a1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 548.9µs " +"2020-10-14 19:01:07.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU a20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 734.3µs " +"2020-10-14 19:01:07.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU a21 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU a22 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU a23 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:07.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a24 Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +"2020-10-14 19:01:07.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU a25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 488µs " +"2020-10-14 19:01:07.652 UTC [orderer.common.server] Deliver -> DEBU a26 Starting new Deliver handler" +"2020-10-14 19:01:07.652 UTC [common.deliver] Handle -> DEBU a27 Starting new deliver loop for 172.18.0.9:39980" +"2020-10-14 19:01:07.652 UTC [common.deliver] Handle -> DEBU a28 Attempting to read seek info message from 172.18.0.9:39980" +"2020-10-14 19:01:07.670 UTC [orderer.common.server] Broadcast -> DEBU a29 Starting new Broadcast handler" +"2020-10-14 19:01:07.670 UTC [orderer.common.broadcast] Handle -> DEBU a2a Starting new broadcast loop for 172.18.0.9:39982" +"2020-10-14 19:01:07.670 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a2b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:39982" +"2020-10-14 19:01:07.670 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a2c Processing config update message for exisitng channel businesschannel" +"2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:07.671 UTC [policies] Evaluate -> DEBU a31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:07.671 UTC [msp] DeserializeIdentity -> DEBU a32 Obtaining identity" +"2020-10-14 19:01:07.672 UTC [msp.identity] newIdentity -> DEBU a33 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func1 -> DEBU a34 0xc00112a200 gate 1602702067673376800 evaluation starts" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a35 0xc00112a200 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a36 0xc00112a200 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a37 0xc00112a200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func2 -> DEBU a38 0xc00112a200 principal evaluation fails" +"2020-10-14 19:01:07.673 UTC [cauthdsl] func1 -> DEBU a39 0xc00112a200 gate 1602702067673376800 evaluation fails" +"2020-10-14 19:01:07.673 UTC [policies] Evaluate -> DEBU a3a Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.673 UTC [policies] Evaluate -> DEBU a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.674 UTC [policies] Evaluate -> DEBU a3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-10-14 19:01:07.674 UTC [cauthdsl] func1 -> DEBU a3d 0xc00112b3c0 gate 1602702067674249400 evaluation starts" +"2020-10-14 19:01:07.674 UTC [cauthdsl] func2 -> DEBU a3e 0xc00112b3c0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.674 UTC [cauthdsl] func2 -> DEBU a3f 0xc00112b3c0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.674 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a40 Checking if identity satisfies MEMBER role for Org2MSP" +"2020-10-14 19:01:07.675 UTC [msp] Validate -> DEBU a41 MSP Org2MSP validating identity" +"2020-10-14 19:01:07.675 UTC [msp] getCertificationChain -> DEBU a42 MSP Org2MSP getting certification chain" +"2020-10-14 19:01:07.675 UTC [cauthdsl] func2 -> DEBU a43 0xc00112b3c0 principal matched by identity 0" +"2020-10-14 19:01:07.675 UTC [msp.identity] Verify -> DEBU a44 Verify: digest = 00000000 3b 3e a7 70 ea 7c 96 2d 8c b0 f9 fa c1 23 86 f2 |;>.p.|.-.....#..| +00000010 65 c6 64 30 19 7d 89 3b fd 91 5c b3 b3 8e 34 a3 |e.d0.}.;..\...4.|" +"2020-10-14 19:01:07.675 UTC [msp.identity] Verify -> DEBU a45 Verify: sig = 00000000 30 45 02 21 00 91 7a 88 c9 0c 27 ca 81 41 a5 be |0E.!..z...'..A..| +00000010 67 55 12 e7 3f e5 c0 16 d2 3b e9 56 b0 11 55 86 |gU..?....;.V..U.| +00000020 d6 2d c0 7a 9e 02 20 76 58 f7 2b da f6 bf e2 e8 |.-.z.. vX.+.....| +00000030 d5 fd 62 f1 e6 57 84 d4 d9 b6 24 b7 06 dd 0d 1c |..b..W....$.....| +00000040 59 da 19 97 ef d9 74 |Y.....t|" +"2020-10-14 19:01:07.676 UTC [cauthdsl] func2 -> DEBU a46 0xc00112b3c0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:07.676 UTC [cauthdsl] func1 -> DEBU a47 0xc00112b3c0 gate 1602702067674249400 evaluation succeeds" +"2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4a Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:07.676 UTC [policies] Evaluate -> DEBU a4c Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:07.677 UTC [policies] Evaluate -> DEBU a4d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.677 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.678 UTC [common.configtx] addToMap -> DEBU a5c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.679 UTC [common.configtx] verifyDeltaSet -> DEBU a5d Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.679 UTC [common.configtx] policyForItem -> DEBU a5e Getting policy for item Org2MSP with mod_policy Admins" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a5f Manager Channel looking up path [Application]" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a60 Manager Channel has managers Application" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a61 Manager Channel has managers Orderer" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a62 Manager Channel/Application looking up path []" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a63 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a64 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a65 Manager Channel/Application looking up path [Org2MSP]" +"2020-10-14 19:01:07.679 UTC [policies] Manager -> DEBU a66 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.680 UTC [policies] Manager -> DEBU a67 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.680 UTC [policies] Manager -> DEBU a68 Manager Channel/Application/Org2MSP looking up path []" +"2020-10-14 19:01:07.680 UTC [policies] Evaluate -> DEBU a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:01:07.680 UTC [cauthdsl] func1 -> DEBU a6a 0xc00115a120 gate 1602702067680644200 evaluation starts" +"2020-10-14 19:01:07.680 UTC [cauthdsl] func2 -> DEBU a6b 0xc00115a120 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.680 UTC [cauthdsl] func2 -> DEBU a6c 0xc00115a120 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.681 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6d Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-10-14 19:01:07.681 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6e Checking if identity carries the admin ou for Org2MSP" +"2020-10-14 19:01:07.681 UTC [msp] Validate -> DEBU a6f MSP Org2MSP validating identity" +"2020-10-14 19:01:07.682 UTC [msp] getCertificationChain -> DEBU a70 MSP Org2MSP getting certification chain" +"2020-10-14 19:01:07.682 UTC [msp] hasOURole -> DEBU a71 MSP Org2MSP checking if the identity is a client" +"2020-10-14 19:01:07.682 UTC [msp] getCertificationChain -> DEBU a72 MSP Org2MSP getting certification chain" +"2020-10-14 19:01:07.683 UTC [cauthdsl] func2 -> DEBU a73 0xc00115a120 principal matched by identity 0" +"2020-10-14 19:01:07.683 UTC [msp.identity] Verify -> DEBU a74 Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.|" +"2020-10-14 19:01:07.683 UTC [msp.identity] Verify -> DEBU a75 Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +00000040 a1 ce b7 6d c5 7f dd |...m...|" +"2020-10-14 19:01:07.683 UTC [cauthdsl] func2 -> DEBU a76 0xc00115a120 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:07.683 UTC [cauthdsl] func1 -> DEBU a77 0xc00115a120 gate 1602702067680644200 evaluation succeeds" +"2020-10-14 19:01:07.683 UTC [policies] Evaluate -> DEBU a78 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.683 UTC [policies] Evaluate -> DEBU a79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.683 UTC [common.configtx] verifyDeltaSet -> DEBU a7a Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Readers to " +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Writers to " +"2020-10-14 19:01:07.684 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a81 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a82 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a83 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a84 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a85 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.685 UTC [common.configtx] recurseConfigMap -> DEBU a86 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a87 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a88 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a89 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a8a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.686 UTC [common.configtx] recurseConfigMap -> DEBU a8b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.687 UTC [common.configtx] recurseConfigMap -> DEBU a8f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.688 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: HashingAlgorithm" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a92 Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a93 Processing field: OrdererAddresses" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a94 Processing field: Consortium" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a95 Processing field: Capabilities" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] NewStandardValues -> DEBU a96 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a97 Processing field: ACLs" +"2020-10-14 19:01:07.688 UTC [common.channelconfig] initializeProtosStruct -> DEBU a98 Processing field: Capabilities" +"2020-10-14 19:01:07.689 UTC [common.channelconfig] NewStandardValues -> DEBU a99 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.689 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: AnchorPeers" +"2020-10-14 19:01:07.689 UTC [common.channelconfig] NewStandardValues -> DEBU a9b Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.689 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: MSP" +"2020-10-14 19:01:07.689 UTC [common.channelconfig] Validate -> DEBU a9d Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:07.690 UTC [common.channelconfig] validateMSP -> DEBU a9e Setting up MSP for org Org1MSP" +"2020-10-14 19:01:07.690 UTC [msp] newBccspMsp -> DEBU a9f Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.690 UTC [msp] New -> DEBU aa0 Creating Cache-MSP instance" +"2020-10-14 19:01:07.690 UTC [msp] Setup -> DEBU aa1 Setting up MSP instance Org1MSP" +"2020-10-14 19:01:07.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +"2020-10-14 19:01:07.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa3 Sending msg of 28 bytes to 3 on channel businesschannel took 41.5µs" +"2020-10-14 19:01:07.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 861.2µs " +"2020-10-14 19:01:07.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.8µs " +"2020-10-14 19:01:07.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.695 UTC [msp.identity] newIdentity -> DEBU aa7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.697 UTC [common.channelconfig] NewStandardValues -> DEBU aa9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.697 UTC [common.channelconfig] initializeProtosStruct -> DEBU aaa Processing field: AnchorPeers" +"2020-10-14 19:01:07.698 UTC [common.channelconfig] NewStandardValues -> DEBU aab Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.698 UTC [common.channelconfig] initializeProtosStruct -> DEBU aac Processing field: MSP" +"2020-10-14 19:01:07.698 UTC [common.channelconfig] Validate -> DEBU aad Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:01:07.698 UTC [common.channelconfig] validateMSP -> DEBU aae Setting up MSP for org Org2MSP" +"2020-10-14 19:01:07.698 UTC [msp] newBccspMsp -> DEBU aaf Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.698 UTC [msp] New -> DEBU ab0 Creating Cache-MSP instance" +"2020-10-14 19:01:07.698 UTC [msp] Setup -> DEBU ab1 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:07.699 UTC [msp.identity] newIdentity -> DEBU ab2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] NewStandardValues -> DEBU ab3 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: ConsensusType" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab5 Processing field: BatchSize" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab6 Processing field: BatchTimeout" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab7 Processing field: KafkaBrokers" +"2020-10-14 19:01:07.700 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab8 Processing field: ChannelRestrictions" +"2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab9 Processing field: Capabilities" +"2020-10-14 19:01:07.701 UTC [common.channelconfig] NewStandardValues -> DEBU aba Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU abb Processing field: Endpoints" +"2020-10-14 19:01:07.701 UTC [common.channelconfig] NewStandardValues -> DEBU abc Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.701 UTC [common.channelconfig] initializeProtosStruct -> DEBU abd Processing field: MSP" +"2020-10-14 19:01:07.702 UTC [common.channelconfig] validateMSP -> DEBU abe Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:07.702 UTC [msp] newBccspMsp -> DEBU abf Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.702 UTC [msp] New -> DEBU ac0 Creating Cache-MSP instance" +"2020-10-14 19:01:07.702 UTC [msp] Setup -> DEBU ac1 Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:07.702 UTC [msp.identity] newIdentity -> DEBU ac2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.704 UTC [msp] Setup -> DEBU ac3 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:07.704 UTC [msp] Setup -> DEBU ac4 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.704 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.705 UTC [policies] NewManagerImpl -> DEBU aca Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU acb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU acc Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.705 UTC [policies] NewManagerImpl -> DEBU acd Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:07.705 UTC [policies] GetPolicy -> DEBU ace Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.706 UTC [policies] GetPolicy -> DEBU acf Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.706 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:07.706 UTC [policies] NewManagerImpl -> DEBU ad1 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad2 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad4 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad5 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad7 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad8 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:07.707 UTC [policies] NewManagerImpl -> DEBU ad9 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU ada Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU adb Proposed new policy Admins for Channel" +"2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU adc Proposed new policy Readers for Channel" +"2020-10-14 19:01:07.708 UTC [policies] NewManagerImpl -> DEBU add Proposed new policy Writers for Channel" +"2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:07.708 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:07.709 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:07.710 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:07.711 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.712 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:07.713 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:07.714 UTC [common.configtx] addToMap -> DEBU b03 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b04 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b05 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b06 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b07 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:07.715 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:07.715 UTC [common.channelconfig] LogSanityChecks -> DEBU b0a As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:01:07.715 UTC [common.channelconfig] LogSanityChecks -> DEBU b0b As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:01:07.715 UTC [policies] Manager -> DEBU b0c Manager Channel looking up path [Application]" +"2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0d Manager Channel has managers Application" +"2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0e Manager Channel has managers Orderer" +"2020-10-14 19:01:07.716 UTC [policies] Manager -> DEBU b0f Manager Channel/Application looking up path []" +"2020-10-14 19:01:07.717 UTC [policies] Manager -> DEBU b10 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.717 UTC [policies] Manager -> DEBU b11 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b12 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b13 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:01:07.717 UTC [common.channelconfig] LogSanityChecks -> DEBU b14 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b15 Manager Channel looking up path [Orderer]" +"2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b16 Manager Channel has managers Application" +"2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b17 Manager Channel has managers Orderer" +"2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b18 Manager Channel/Orderer looking up path []" +"2020-10-14 19:01:07.718 UTC [policies] Manager -> DEBU b19 Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:01:07.718 UTC [common.channelconfig] LogSanityChecks -> DEBU b1a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:01:07.718 UTC [common.channelconfig] LogSanityChecks -> DEBU b1b As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:01:07.719 UTC [common.channelconfig] LogSanityChecks -> DEBU b1c As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:01:07.719 UTC [common.channelconfig] LogSanityChecks -> DEBU b1d As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:01:07.719 UTC [common.capabilities] Supported -> DEBU b1e Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:07.719 UTC [common.capabilities] Supported -> DEBU b1f Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:07.719 UTC [msp] GetDefaultSigningIdentity -> DEBU b20 Obtaining default signing identity" +"2020-10-14 19:01:07.720 UTC [msp] GetDefaultSigningIdentity -> DEBU b21 Obtaining default signing identity" +"2020-10-14 19:01:07.720 UTC [msp.identity] Sign -> DEBU b22 Sign: plaintext: 0AEA060A1B08011A0608F3959DFC0522...D4D9B624B706DD0D1C59DA1997EFD974 " +"2020-10-14 19:01:07.720 UTC [msp.identity] Sign -> DEBU b23 Sign: digest: 2E94F2EAE7A7611361D9FF507BFAEA1FB90687717E07A895BC3056F80BA84032 " +"2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b26 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b27 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:07.721 UTC [policies] Evaluate -> DEBU b28 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:07.721 UTC [msp] DeserializeIdentity -> DEBU b29 Obtaining identity" +"2020-10-14 19:01:07.722 UTC [msp.identity] newIdentity -> DEBU b2a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.723 UTC [cauthdsl] func1 -> DEBU b2b 0xc00125cc50 gate 1602702067723128700 evaluation starts" +"2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2c 0xc00125cc50 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2d 0xc00125cc50 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2e 0xc00125cc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:01:07.723 UTC [cauthdsl] func2 -> DEBU b2f 0xc00125cc50 principal evaluation fails" +"2020-10-14 19:01:07.724 UTC [cauthdsl] func1 -> DEBU b30 0xc00125cc50 gate 1602702067723128700 evaluation fails" +"2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b31 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b32 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.724 UTC [policies] Evaluate -> DEBU b33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-10-14 19:01:07.724 UTC [cauthdsl] func1 -> DEBU b34 0xc00125de10 gate 1602702067724857500 evaluation starts" +"2020-10-14 19:01:07.724 UTC [cauthdsl] func2 -> DEBU b35 0xc00125de10 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.724 UTC [cauthdsl] func2 -> DEBU b36 0xc00125de10 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.725 UTC [cauthdsl] func2 -> DEBU b37 0xc00125de10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:01:07.725 UTC [cauthdsl] func2 -> DEBU b38 0xc00125de10 principal evaluation fails" +"2020-10-14 19:01:07.725 UTC [cauthdsl] func1 -> DEBU b39 0xc00125de10 gate 1602702067724857500 evaluation fails" +"2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.725 UTC [policies] func1 -> DEBU b3c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3d Signature set did not satisfy policy /Channel/Application/Writers" +"2020-10-14 19:01:07.725 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:07.726 UTC [policies] Evaluate -> DEBU b41 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:07.726 UTC [cauthdsl] func1 -> DEBU b42 0xc00126eb20 gate 1602702067726442200 evaluation starts" +"2020-10-14 19:01:07.726 UTC [cauthdsl] func2 -> DEBU b43 0xc00126eb20 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.726 UTC [cauthdsl] func2 -> DEBU b44 0xc00126eb20 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.726 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b45 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:01:07.727 UTC [msp] Validate -> DEBU b46 MSP OrdererMSP validating identity" +"2020-10-14 19:01:07.727 UTC [msp] getCertificationChain -> DEBU b47 MSP OrdererMSP getting certification chain" +"2020-10-14 19:01:07.727 UTC [cauthdsl] func2 -> DEBU b48 0xc00126eb20 principal matched by identity 0" +"2020-10-14 19:01:07.728 UTC [msp.identity] Verify -> DEBU b49 Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2|" +"2020-10-14 19:01:07.728 UTC [msp.identity] Verify -> DEBU b4a Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +00000040 7f 4b 57 be 84 c8 e9 |.KW....|" +"2020-10-14 19:01:07.728 UTC [cauthdsl] func2 -> DEBU b4b 0xc00126eb20 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:07.728 UTC [cauthdsl] func1 -> DEBU b4c 0xc00126eb20 gate 1602702067726442200 evaluation succeeds" +"2020-10-14 19:01:07.728 UTC [policies] Evaluate -> DEBU b4d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:07.728 UTC [policies] Evaluate -> DEBU b4e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b4f Signature set satisfies policy /Channel/Orderer/Writers" +"2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b51 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:07.729 UTC [policies] Evaluate -> DEBU b52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:07.730 UTC [orderer.common.msgprocessor] Apply -> DEBU b53 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-10-14 19:01:07.730 UTC [common.channelconfig] NewStandardValues -> DEBU b54 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b55 Processing field: HashingAlgorithm" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b57 Processing field: OrdererAddresses" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b58 Processing field: Consortium" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b59 Processing field: Capabilities" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] NewStandardValues -> DEBU b5a Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:07.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5b Processing field: ACLs" +"2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5c Processing field: Capabilities" +"2020-10-14 19:01:07.731 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: AnchorPeers" +"2020-10-14 19:01:07.731 UTC [common.channelconfig] NewStandardValues -> DEBU b5f Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: MSP" +"2020-10-14 19:01:07.732 UTC [common.channelconfig] Validate -> DEBU b61 Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:07.732 UTC [common.channelconfig] validateMSP -> DEBU b62 Setting up MSP for org Org1MSP" +"2020-10-14 19:01:07.732 UTC [msp] newBccspMsp -> DEBU b63 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.732 UTC [msp] New -> DEBU b64 Creating Cache-MSP instance" +"2020-10-14 19:01:07.732 UTC [msp] Setup -> DEBU b65 Setting up MSP instance Org1MSP" +"2020-10-14 19:01:07.733 UTC [msp.identity] newIdentity -> DEBU b66 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.734 UTC [common.channelconfig] NewStandardValues -> DEBU b67 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU b68 Processing field: AnchorPeers" +"2020-10-14 19:01:07.734 UTC [common.channelconfig] NewStandardValues -> DEBU b69 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.734 UTC [common.channelconfig] initializeProtosStruct -> DEBU b6a Processing field: MSP" +"2020-10-14 19:01:07.735 UTC [common.channelconfig] Validate -> DEBU b6b Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:01:07.735 UTC [common.channelconfig] validateMSP -> DEBU b6c Setting up MSP for org Org2MSP" +"2020-10-14 19:01:07.735 UTC [msp] newBccspMsp -> DEBU b6d Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.735 UTC [msp] New -> DEBU b6e Creating Cache-MSP instance" +"2020-10-14 19:01:07.735 UTC [msp] Setup -> DEBU b6f Setting up MSP instance Org2MSP" +"2020-10-14 19:01:07.736 UTC [msp.identity] newIdentity -> DEBU b70 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.737 UTC [common.channelconfig] NewStandardValues -> DEBU b71 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:07.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU b72 Processing field: ConsensusType" +"2020-10-14 19:01:07.737 UTC [common.channelconfig] initializeProtosStruct -> DEBU b73 Processing field: BatchSize" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b74 Processing field: BatchTimeout" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b75 Processing field: KafkaBrokers" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b76 Processing field: ChannelRestrictions" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b77 Processing field: Capabilities" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] NewStandardValues -> DEBU b78 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:07.738 UTC [common.channelconfig] initializeProtosStruct -> DEBU b79 Processing field: Endpoints" +"2020-10-14 19:01:07.739 UTC [common.channelconfig] NewStandardValues -> DEBU b7a Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.740 UTC [common.channelconfig] initializeProtosStruct -> DEBU b7b Processing field: MSP" +"2020-10-14 19:01:07.740 UTC [common.channelconfig] validateMSP -> DEBU b7c Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:07.740 UTC [msp] newBccspMsp -> DEBU b7d Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.740 UTC [msp] New -> DEBU b7e Creating Cache-MSP instance" +"2020-10-14 19:01:07.740 UTC [msp] Setup -> DEBU b7f Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:07.741 UTC [msp.identity] newIdentity -> DEBU b80 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.742 UTC [msp] Setup -> DEBU b81 Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:07.743 UTC [msp] Setup -> DEBU b82 MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b83 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b84 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b85 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.743 UTC [policies] NewManagerImpl -> DEBU b86 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b87 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b88 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.744 UTC [policies] NewManagerImpl -> DEBU b8c Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:07.744 UTC [policies] GetPolicy -> DEBU b8d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.745 UTC [policies] GetPolicy -> DEBU b8e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b8f Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b90 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b91 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b92 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.745 UTC [policies] NewManagerImpl -> DEBU b93 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b94 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b95 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b96 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b97 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b98 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b99 Proposed new policy Admins for Channel" +"2020-10-14 19:01:07.746 UTC [policies] NewManagerImpl -> DEBU b9a Proposed new policy Readers for Channel" +"2020-10-14 19:01:07.747 UTC [policies] NewManagerImpl -> DEBU b9b Proposed new policy Writers for Channel" +"2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:07.747 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.748 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:07.749 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:07.750 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bb8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bb9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bba Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bbb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:07.751 UTC [common.configtx] addToMap -> DEBU bbc Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbe Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bbf Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc0 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc1 Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc2 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:07.752 UTC [common.configtx] addToMap -> DEBU bc4 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc5 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc6 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:07.753 UTC [common.configtx] addToMap -> DEBU bc7 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:07.754 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bc8 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:39982" +"2020-10-14 19:01:07.763 UTC [orderer.consensus.etcdraft] propose -> INFO bc9 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:01:07.764 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bcc Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-10-14 19:01:07.764 UTC [common.deliver] Handle -> WARN bcd Error reading from 172.18.0.9:39980: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:07.764 UTC [orderer.common.server] func1 -> DEBU bce Closing Deliver stream" +"2020-10-14 19:01:07.764 UTC [comm.grpc.server] 1 -> INFO bcf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:39980 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=112.5368ms +"2020-10-14 19:01:07.765 UTC [grpc] infof -> DEBU bd0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:07.763 UTC [grpc] infof -> DEBU bcb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:07.763 UTC [orderer.common.broadcast] Handle -> WARN bca Error reading from 172.18.0.9:39982: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:07.768 UTC [orderer.common.server] func1 -> DEBU bd1 Closing Broadcast stream" +"2020-10-14 19:01:07.768 UTC [comm.grpc.server] 1 -> INFO bd2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:39982 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=98.1622ms +"2020-10-14 19:01:07.768 UTC [orderer.consensus.etcdraft] 2 -> DEBU bd3 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:01:07.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd4 Sending msg of 27273 bytes to 2 on channel businesschannel took 19.7µs" +"2020-10-14 19:01:07.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd5 Sending msg of 27273 bytes to 3 on channel businesschannel took 13.4µs" +"2020-10-14 19:01:07.771 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd6 Send of ConsensusRequest for channel businesschannel with payload of size 27273 to orderer1.example.com(orderer1.example.com:7050) took 229.6µs " +"2020-10-14 19:01:07.772 UTC [orderer.common.cluster.step] sendMessage -> DEBU bd7 Send of ConsensusRequest for channel businesschannel with payload of size 27273 to orderer2.example.com(orderer2.example.com:7050) took 632.9µs " +"2020-10-14 19:01:07.776 UTC [orderer.common.cluster.step] handleMessage -> DEBU bd8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.776 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bd9 Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +"2020-10-14 19:01:07.776 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bda Sending msg of 28 bytes to 3 on channel businesschannel took 65.2µs" +"2020-10-14 19:01:07.777 UTC [orderer.common.cluster.step] sendMessage -> DEBU bdb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.1µs " +"2020-10-14 19:01:07.777 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bdc Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2020-10-14 19:01:07.777 UTC [common.configtx] addToMap -> DEBU bdd Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU bde Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU bdf Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.778 UTC [common.configtx] addToMap -> DEBU be0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be4 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be5 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU be9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU bea Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.779 UTC [common.configtx] addToMap -> DEBU beb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.779 UTC [common.configtx] verifyDeltaSet -> DEBU bec Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.780 UTC [common.configtx] policyForItem -> DEBU bed Getting policy for item Org2MSP with mod_policy Admins" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bee Manager Channel looking up path [Application]" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bef Manager Channel has managers Application" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf0 Manager Channel has managers Orderer" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf1 Manager Channel/Application looking up path []" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf2 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf3 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf4 Manager Channel/Application looking up path [Org2MSP]" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf5 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf6 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.780 UTC [policies] Manager -> DEBU bf7 Manager Channel/Application/Org2MSP looking up path []" +"2020-10-14 19:01:07.781 UTC [policies] Evaluate -> DEBU bf8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:01:07.781 UTC [cauthdsl] func1 -> DEBU bf9 0xc0009fcea0 gate 1602702067781135500 evaluation starts" +"2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfa 0xc0009fcea0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfb 0xc0009fcea0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:07.781 UTC [cauthdsl] func2 -> DEBU bfc 0xc0009fcea0 principal matched by identity 0" +"2020-10-14 19:01:07.781 UTC [msp.identity] Verify -> DEBU bfd Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.|" +"2020-10-14 19:01:07.781 UTC [msp.identity] Verify -> DEBU bfe Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +00000040 a1 ce b7 6d c5 7f dd |...m...|" +"2020-10-14 19:01:07.782 UTC [cauthdsl] func2 -> DEBU bff 0xc0009fcea0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:07.782 UTC [cauthdsl] func1 -> DEBU c00 0xc0009fcea0 gate 1602702067781135500 evaluation succeeds" +"2020-10-14 19:01:07.782 UTC [policies] Evaluate -> DEBU c01 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.782 UTC [policies] Evaluate -> DEBU c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.782 UTC [common.configtx] verifyDeltaSet -> DEBU c03 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.782 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Readers to " +"2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Writers to " +"2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Admins to " +"2020-10-14 19:01:07.783 UTC [common.configtx] recurseConfigMap -> DEBU c0a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0c Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.784 UTC [common.configtx] recurseConfigMap -> DEBU c0d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.785 UTC [common.configtx] recurseConfigMap -> DEBU c0e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.785 UTC [common.configtx] recurseConfigMap -> DEBU c0f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c10 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c11 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.786 UTC [common.configtx] recurseConfigMap -> DEBU c12 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.787 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.789 UTC [orderer.common.cluster.step] sendMessage -> DEBU c14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.6µs " +"2020-10-14 19:01:07.794 UTC [orderer.common.cluster.step] handleMessage -> DEBU c15 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.795 UTC [orderer.common.cluster.step] handleMessage -> DEBU c16 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:07.789 UTC [common.configtx] recurseConfigMap -> DEBU c17 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.799 UTC [common.configtx] recurseConfigMap -> DEBU c18 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.801 UTC [common.configtx] recurseConfigMap -> DEBU c19 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.801 UTC [common.configtx] recurseConfigMap -> DEBU c1a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.802 UTC [common.configtx] recurseConfigMap -> DEBU c1b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.803 UTC [common.configtx] recurseConfigMap -> DEBU c1c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:01:07.804 UTC [common.channelconfig] NewStandardValues -> DEBU c1d Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1e Processing field: HashingAlgorithm" +"2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1f Processing field: BlockDataHashingStructure" +"2020-10-14 19:01:07.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU c20 Processing field: OrdererAddresses" +"2020-10-14 19:01:07.805 UTC [common.channelconfig] initializeProtosStruct -> DEBU c21 Processing field: Consortium" +"2020-10-14 19:01:07.807 UTC [common.channelconfig] initializeProtosStruct -> DEBU c22 Processing field: Capabilities" +"2020-10-14 19:01:07.807 UTC [common.channelconfig] NewStandardValues -> DEBU c23 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:01:07.808 UTC [common.channelconfig] initializeProtosStruct -> DEBU c24 Processing field: ACLs" +"2020-10-14 19:01:07.808 UTC [common.channelconfig] initializeProtosStruct -> DEBU c25 Processing field: Capabilities" +"2020-10-14 19:01:07.809 UTC [common.channelconfig] NewStandardValues -> DEBU c26 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.809 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: AnchorPeers" +"2020-10-14 19:01:07.810 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.810 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: MSP" +"2020-10-14 19:01:07.811 UTC [common.channelconfig] Validate -> DEBU c2a Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:01:07.811 UTC [common.channelconfig] validateMSP -> DEBU c2b Setting up MSP for org Org1MSP" +"2020-10-14 19:01:07.811 UTC [msp] newBccspMsp -> DEBU c2c Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.812 UTC [msp] New -> DEBU c2d Creating Cache-MSP instance" +"2020-10-14 19:01:07.812 UTC [msp] Setup -> DEBU c2e Setting up MSP instance Org1MSP" +"2020-10-14 19:01:07.813 UTC [msp.identity] newIdentity -> DEBU c2f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.814 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:01:07.814 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: AnchorPeers" +"2020-10-14 19:01:07.815 UTC [common.channelconfig] NewStandardValues -> DEBU c32 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU c33 Processing field: MSP" +"2020-10-14 19:01:07.815 UTC [common.channelconfig] Validate -> DEBU c34 Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:01:07.815 UTC [common.channelconfig] validateMSP -> DEBU c35 Setting up MSP for org Org2MSP" +"2020-10-14 19:01:07.815 UTC [msp] newBccspMsp -> DEBU c36 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.816 UTC [msp] New -> DEBU c37 Creating Cache-MSP instance" +"2020-10-14 19:01:07.816 UTC [msp] Setup -> DEBU c38 Setting up MSP instance Org2MSP" +"2020-10-14 19:01:07.816 UTC [msp.identity] newIdentity -> DEBU c39 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.817 UTC [common.channelconfig] NewStandardValues -> DEBU c3a Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3b Processing field: ConsensusType" +"2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3c Processing field: BatchSize" +"2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3d Processing field: BatchTimeout" +"2020-10-14 19:01:07.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3e Processing field: KafkaBrokers" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c3f Processing field: ChannelRestrictions" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c40 Processing field: Capabilities" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] NewStandardValues -> DEBU c41 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c42 Processing field: Endpoints" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] NewStandardValues -> DEBU c43 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU c44 Processing field: MSP" +"2020-10-14 19:01:07.818 UTC [common.channelconfig] validateMSP -> DEBU c45 Setting up MSP for org OrdererOrg" +"2020-10-14 19:01:07.818 UTC [msp] newBccspMsp -> DEBU c46 Creating BCCSP-based MSP instance" +"2020-10-14 19:01:07.818 UTC [msp] New -> DEBU c47 Creating Cache-MSP instance" +"2020-10-14 19:01:07.819 UTC [msp] Setup -> DEBU c48 Setting up MSP instance OrdererMSP" +"2020-10-14 19:01:07.819 UTC [msp.identity] newIdentity -> DEBU c49 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:01:07.820 UTC [msp] Setup -> DEBU c4a Setting up the MSP manager (3 msps)" +"2020-10-14 19:01:07.820 UTC [msp] Setup -> DEBU c4b MSP manager setup complete, setup 3 msps" +"2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.820 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:01:07.821 UTC [policies] GetPolicy -> DEBU c52 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.821 UTC [policies] GetPolicy -> DEBU c53 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c54 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c55 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:01:07.821 UTC [policies] NewManagerImpl -> DEBU c56 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c57 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:01:07.822 UTC [policies] GetPolicy -> DEBU c58 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:01:07.822 UTC [policies] GetPolicy -> DEBU c59 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5a Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.822 UTC [policies] NewManagerImpl -> DEBU c5d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c5e Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c5f Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c60 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c61 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c62 Proposed new policy Admins for Channel" +"2020-10-14 19:01:07.823 UTC [policies] NewManagerImpl -> DEBU c63 Proposed new policy Readers for Channel" +"2020-10-14 19:01:07.824 UTC [policies] NewManagerImpl -> DEBU c64 Proposed new policy Writers for Channel" +"2020-10-14 19:01:07.824 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Group] /Channel" +"2020-10-14 19:01:07.824 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:01:07.825 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:07.826 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:01:07.827 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:01:07.828 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:01:07.829 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c81 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c82 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:01:07.830 UTC [common.configtx] addToMap -> DEBU c83 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c84 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c85 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c86 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c87 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:01:07.831 UTC [common.configtx] addToMap -> DEBU c88 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c89 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8a Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:01:07.832 UTC [common.configtx] addToMap -> DEBU c8d Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c8e Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c8f Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:01:07.833 UTC [common.configtx] addToMap -> DEBU c90 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:01:07.833 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:01:07.833 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:01:07.833 UTC [policies] Manager -> DEBU c93 Manager Channel looking up path [Application]" +"2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c94 Manager Channel has managers Application" +"2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c95 Manager Channel has managers Orderer" +"2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c96 Manager Channel/Application looking up path []" +"2020-10-14 19:01:07.834 UTC [policies] Manager -> DEBU c97 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c98 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c99 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c9a As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:01:07.835 UTC [common.channelconfig] LogSanityChecks -> DEBU c9b As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9c Manager Channel looking up path [Orderer]" +"2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9d Manager Channel has managers Orderer" +"2020-10-14 19:01:07.835 UTC [policies] Manager -> DEBU c9e Manager Channel has managers Application" +"2020-10-14 19:01:07.836 UTC [policies] Manager -> DEBU c9f Manager Channel/Orderer looking up path []" +"2020-10-14 19:01:07.836 UTC [policies] Manager -> DEBU ca0 Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca1 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca2 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca3 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:01:07.836 UTC [common.channelconfig] LogSanityChecks -> DEBU ca4 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:01:07.836 UTC [common.capabilities] Supported -> DEBU ca5 Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:01:07.837 UTC [common.capabilities] Supported -> DEBU ca6 Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:01:07.837 UTC [orderer.common.server] func1 -> DEBU ca7 Executing callback to update root CAs" +"2020-10-14 19:01:07.837 UTC [orderer.common.server] updateTrustedRoots -> DEBU ca8 updating root CAs for channel [businesschannel]" +"2020-10-14 19:01:07.837 UTC [orderer.common.server] updateTrustedRoots -> DEBU ca9 adding orderer root CAs for MSP [OrdererMSP]" +"2020-10-14 19:01:07.838 UTC [orderer.common.server] updateTrustedRoots -> DEBU caa adding app root CAs for MSP [Org1MSP]" +"2020-10-14 19:01:07.838 UTC [orderer.common.server] updateTrustedRoots -> DEBU cab adding app root CAs for MSP [Org2MSP]" +"2020-10-14 19:01:07.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cac [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2020-10-14 19:01:07.839 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU cad [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-10-14 19:01:07.839 UTC [msp] GetDefaultSigningIdentity -> DEBU cae Obtaining default signing identity" +"2020-10-14 19:01:07.839 UTC [msp] GetDefaultSigningIdentity -> DEBU caf Obtaining default signing identity" +"2020-10-14 19:01:07.839 UTC [msp.identity] Sign -> DEBU cb0 Sign: plaintext: 0A020802120B0A090A03010203100418...CE8A38261AE4490D996766ECBE60BC31 " +"2020-10-14 19:01:07.839 UTC [msp.identity] Sign -> DEBU cb1 Sign: digest: FDFF188FF052AE4DE51FF1E2F3D0AD887E08F7CDA536BD15DBEBD7BC10D7F107 " +"2020-10-14 19:01:07.842 UTC [fsblkstorage] indexBlock -> DEBU cb2 Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +]" +"2020-10-14 19:01:07.844 UTC [fsblkstorage] updateCheckpoint -> DEBU cb3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84816], isChainEmpty=[false], lastBlockNumber=[2]" +"2020-10-14 19:01:07.844 UTC [orderer.commmon.multichannel] commitBlock -> DEBU cb4 [channel: businesschannel] Wrote block [2]" +"2020-10-14 19:01:08.087 UTC [orderer.common.cluster.step] handleMessage -> DEBU cb5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:08.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb6 Sending msg of 28 bytes to 3 on channel testchainid took 143µs" +"2020-10-14 19:01:08.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU cb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.9µs " +"2020-10-14 19:01:08.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb8 Sending msg of 28 bytes to 2 on channel businesschannel took 214.3µs" +"2020-10-14 19:01:08.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb9 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +"2020-10-14 19:01:08.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +"2020-10-14 19:01:08.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:08.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +"2020-10-14 19:01:08.197 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:08.587 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:08.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cbf Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-10-14 19:01:08.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 505µs " +"2020-10-14 19:01:08.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc1 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2020-10-14 19:01:08.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2020-10-14 19:01:08.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +"2020-10-14 19:01:08.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.6µs " +"2020-10-14 19:01:08.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:08.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:09.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:09.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc8 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-10-14 19:01:09.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.1µs " +"2020-10-14 19:01:09.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cca Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2020-10-14 19:01:09.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccb Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-10-14 19:01:09.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.1µs " +"2020-10-14 19:01:09.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU ccd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.6µs " +"2020-10-14 19:01:09.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU cce Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:09.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU ccf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:09.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:09.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd1 Sending msg of 28 bytes to 3 on channel testchainid took 946.8µs" +"2020-10-14 19:01:09.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.6µs " +"2020-10-14 19:01:09.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd3 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2020-10-14 19:01:09.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 834.3µs " +"2020-10-14 19:01:09.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel businesschannel took 249.3µs" +"2020-10-14 19:01:09.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498µs " +"2020-10-14 19:01:09.696 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:09.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:10.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:10.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cda Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +"2020-10-14 19:01:10.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.5µs " +"2020-10-14 19:01:10.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cdc Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2020-10-14 19:01:10.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2020-10-14 19:01:10.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +"2020-10-14 19:01:10.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.9µs " +"2020-10-14 19:01:10.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:10.196 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:10.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:10.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138µs " +"2020-10-14 19:01:10.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce3 Sending msg of 28 bytes to 3 on channel testchainid took 84.8µs" +"2020-10-14 19:01:10.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce5 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2020-10-14 19:01:10.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2020-10-14 19:01:10.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 243.4µs " +"2020-10-14 19:01:10.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +"2020-10-14 19:01:10.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:10.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:11.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU ceb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:11.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-10-14 19:01:11.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU ced Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.2µs " +"2020-10-14 19:01:11.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cee Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +"2020-10-14 19:01:11.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-10-14 19:01:11.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.4µs " +"2020-10-14 19:01:11.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227µs " +"2020-10-14 19:01:11.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:11.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:11.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:11.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-10-14 19:01:11.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.2µs " +"2020-10-14 19:01:11.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2020-10-14 19:01:11.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf8 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +"2020-10-14 19:01:11.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.4µs " +"2020-10-14 19:01:11.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +"2020-10-14 19:01:11.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:11.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:12.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:12.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 3 on channel testchainid took 29.9µs" +"2020-10-14 19:01:12.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU cff Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219µs " +"2020-10-14 19:01:12.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d00 Sending msg of 28 bytes to 2 on channel businesschannel took 38.3µs" +"2020-10-14 19:01:12.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-10-14 19:01:12.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2020-10-14 19:01:12.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.4µs " +"2020-10-14 19:01:12.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:12.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:12.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU d06 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:12.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:01:12.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU d08 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.9µs " +"2020-10-14 19:01:12.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2020-10-14 19:01:12.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0a Sending msg of 28 bytes to 3 on channel businesschannel took 8.7µs" +"2020-10-14 19:01:12.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +"2020-10-14 19:01:12.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.6µs " +"2020-10-14 19:01:12.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:12.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:13.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:13.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d10 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-10-14 19:01:13.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU d11 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 777.6µs " +"2020-10-14 19:01:13.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2020-10-14 19:01:13.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 247.5µs " +"2020-10-14 19:01:13.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d14 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:13.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d15 Sending msg of 28 bytes to 3 on channel businesschannel took 1.3835ms" +"2020-10-14 19:01:13.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.6µs " +"2020-10-14 19:01:13.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:13.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d18 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:13.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d19 Sending msg of 28 bytes to 3 on channel testchainid took 20.1µs" +"2020-10-14 19:01:13.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2020-10-14 19:01:13.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2020-10-14 19:01:13.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1c Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +"2020-10-14 19:01:13.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.3µs " +"2020-10-14 19:01:13.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.5µs " +"2020-10-14 19:01:13.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:13.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:13.951 UTC [orderer.common.server] Broadcast -> DEBU d21 Starting new Broadcast handler" +"2020-10-14 19:01:13.951 UTC [orderer.common.broadcast] Handle -> DEBU d22 Starting new broadcast loop for 172.18.0.9:40044" +"2020-10-14 19:01:14.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d23 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:14.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d24 Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2020-10-14 19:01:14.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +"2020-10-14 19:01:14.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +"2020-10-14 19:01:14.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d27 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2020-10-14 19:01:14.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +"2020-10-14 19:01:14.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.4µs " +"2020-10-14 19:01:14.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:14.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:14.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:14.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-10-14 19:01:14.585 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +"2020-10-14 19:01:14.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2f Sending msg of 28 bytes to 3 on channel businesschannel took 52.9µs" +"2020-10-14 19:01:14.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d30 Sending msg of 28 bytes to 2 on channel businesschannel took 11.1µs" +"2020-10-14 19:01:14.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.4µs " +"2020-10-14 19:01:14.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:14.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU d33 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:14.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 327µs " +"2020-10-14 19:01:15.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d35 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:15.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-10-14 19:01:15.086 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +"2020-10-14 19:01:15.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d38 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2020-10-14 19:01:15.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d39 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:01:15.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.2µs " +"2020-10-14 19:01:15.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 342.3µs " +"2020-10-14 19:01:15.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:15.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:15.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:15.591 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-10-14 19:01:15.592 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313µs " +"2020-10-14 19:01:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d41 Sending msg of 28 bytes to 2 on channel businesschannel took 14.1µs" +"2020-10-14 19:01:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d42 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-10-14 19:01:15.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.2µs " +"2020-10-14 19:01:15.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 51.4µs " +"2020-10-14 19:01:15.692 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:15.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d46 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:16.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU d47 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:16.086 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d48 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-10-14 19:01:16.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU d49 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +"2020-10-14 19:01:16.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2020-10-14 19:01:16.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-10-14 19:01:16.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +"2020-10-14 19:01:16.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.3µs " +"2020-10-14 19:01:16.194 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:16.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:16.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d50 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:16.586 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d51 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-10-14 19:01:16.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d52 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.7µs " +"2020-10-14 19:01:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d53 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +"2020-10-14 19:01:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2020-10-14 19:01:16.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d55 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.9µs " +"2020-10-14 19:01:16.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2020-10-14 19:01:16.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d57 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:16.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:17.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:17.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-10-14 19:01:17.087 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.4µs " +"2020-10-14 19:01:17.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2020-10-14 19:01:17.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2020-10-14 19:01:17.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:17.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.4µs " +"2020-10-14 19:01:17.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +"2020-10-14 19:01:17.193 UTC [orderer.common.cluster.step] handleMessage -> DEBU d61 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:17.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU d62 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:17.585 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d63 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-10-14 19:01:17.586 UTC [orderer.common.cluster.step] sendMessage -> DEBU d64 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.2µs " +"2020-10-14 19:01:17.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d65 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-10-14 19:01:17.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-10-14 19:01:17.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU d67 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 260.4µs " +"2020-10-14 19:01:17.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +"2020-10-14 19:01:17.694 UTC [orderer.common.cluster.step] handleMessage -> DEBU d69 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:17.695 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:17.963 UTC [orderer.common.server] replicateDisabledChains -> DEBU d6b No inactive chains to try to replicate" +"2020-10-14 19:01:18.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:18.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-10-14 19:01:18.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +"2020-10-14 19:01:18.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6f Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2020-10-14 19:01:18.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2020-10-14 19:01:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +"2020-10-14 19:01:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.4µs " +"2020-10-14 19:01:18.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:18.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU d74 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:18.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d75 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:18.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-10-14 19:01:18.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU d77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 490µs " +"2020-10-14 19:01:18.661 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d78 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-10-14 19:01:18.661 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d79 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-10-14 19:01:18.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.3µs " +"2020-10-14 19:01:18.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.4µs " +"2020-10-14 19:01:18.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:18.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:19.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:19.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2020-10-14 19:01:19.083 UTC [orderer.common.cluster.step] sendMessage -> DEBU d80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.3µs " +"2020-10-14 19:01:19.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d81 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-10-14 19:01:19.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d82 Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-10-14 19:01:19.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90µs " +"2020-10-14 19:01:19.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 282.8µs " +"2020-10-14 19:01:19.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:19.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU d86 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:19.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d87 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:19.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +"2020-10-14 19:01:19.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU d89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +"2020-10-14 19:01:19.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8a Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2020-10-14 19:01:19.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.6µs " +"2020-10-14 19:01:19.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +"2020-10-14 19:01:19.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.4µs " +"2020-10-14 19:01:19.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:19.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:20.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU d90 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:20.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2020-10-14 19:01:20.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU d92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 670.2µs " +"2020-10-14 19:01:20.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d93 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-10-14 19:01:20.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d94 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-10-14 19:01:20.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU d95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114µs " +"2020-10-14 19:01:20.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.8µs " +"2020-10-14 19:01:20.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:20.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU d98 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:20.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU d99 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:20.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 3 on channel testchainid took 92.3µs" +"2020-10-14 19:01:20.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 467.8µs " +"2020-10-14 19:01:20.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2020-10-14 19:01:20.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9d Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +"2020-10-14 19:01:20.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100µs " +"2020-10-14 19:01:20.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:20.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU da0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 961.3µs " +"2020-10-14 19:01:20.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU da1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:21.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU da2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:21.058 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +"2020-10-14 19:01:21.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 3 on channel testchainid took 479.3µs" +"2020-10-14 19:01:21.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da5 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2020-10-14 19:01:21.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da6 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +"2020-10-14 19:01:21.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU da7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.4µs " +"2020-10-14 19:01:21.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.2µs " +"2020-10-14 19:01:21.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:21.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU daa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:21.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU dab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:21.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2020-10-14 19:01:21.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU dad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.3µs " +"2020-10-14 19:01:21.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dae Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2020-10-14 19:01:21.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daf Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-10-14 19:01:21.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU db0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.9µs " +"2020-10-14 19:01:21.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.4µs " +"2020-10-14 19:01:21.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:21.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU db3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:22.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU db4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:22.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2020-10-14 19:01:22.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU db6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +"2020-10-14 19:01:22.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db7 Sending msg of 28 bytes to 2 on channel businesschannel took 21.1µs" +"2020-10-14 19:01:22.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db9 Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +"2020-10-14 19:01:22.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 270.4µs " +"2020-10-14 19:01:22.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.1µs " +"2020-10-14 19:01:22.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:22.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:22.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:22.553 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel testchainid took 54.7µs" +"2020-10-14 19:01:22.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +"2020-10-14 19:01:22.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc0 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2020-10-14 19:01:22.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.8µs " +"2020-10-14 19:01:22.659 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc2 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-10-14 19:01:22.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +"2020-10-14 19:01:22.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:22.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:23.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:23.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-10-14 19:01:23.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.8µs " +"2020-10-14 19:01:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc9 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-10-14 19:01:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dca Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-10-14 19:01:23.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.5µs " +"2020-10-14 19:01:23.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 412.6µs " +"2020-10-14 19:01:23.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcd Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:23.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:23.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:23.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-10-14 19:01:23.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.5µs " +"2020-10-14 19:01:23.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.8µs " +"2020-10-14 19:01:23.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:01:23.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:23.659 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2020-10-14 19:01:23.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.2µs " +"2020-10-14 19:01:23.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:24.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:24.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd9 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-10-14 19:01:24.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU dda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.8µs " +"2020-10-14 19:01:24.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2020-10-14 19:01:24.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2020-10-14 19:01:24.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.5µs " +"2020-10-14 19:01:24.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 200.1µs " +"2020-10-14 19:01:24.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:24.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:24.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU de1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:24.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de2 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-10-14 19:01:24.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU de3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.7µs " +"2020-10-14 19:01:24.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2020-10-14 19:01:24.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de5 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2020-10-14 19:01:24.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 831.2µs " +"2020-10-14 19:01:24.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:24.662 UTC [orderer.common.cluster.step] sendMessage -> DEBU de8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.7958ms " +"2020-10-14 19:01:24.663 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:25.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU dea Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:25.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU deb Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2020-10-14 19:01:25.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU dec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.2µs " +"2020-10-14 19:01:25.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 2 on channel businesschannel took 114.5µs" +"2020-10-14 19:01:25.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dee Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +"2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.8µs " +"2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.4µs " +"2020-10-14 19:01:25.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:25.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:25.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU df3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:25.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df4 Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +"2020-10-14 19:01:25.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU df5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 551µs " +"2020-10-14 19:01:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2020-10-14 19:01:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-10-14 19:01:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.7µs " +"2020-10-14 19:01:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.1µs " +"2020-10-14 19:01:25.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:25.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:26.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:26.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfd Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2020-10-14 19:01:26.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.2µs " +"2020-10-14 19:01:26.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2020-10-14 19:01:26.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e00 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:01:26.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.1µs " +"2020-10-14 19:01:26.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.9µs " +"2020-10-14 19:01:26.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:26.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:26.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e05 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:26.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e06 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-10-14 19:01:26.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 646.3µs " +"2020-10-14 19:01:26.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2020-10-14 19:01:26.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-10-14 19:01:26.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.7µs " +"2020-10-14 19:01:26.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 429.7µs " +"2020-10-14 19:01:26.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:26.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:27.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:27.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0f Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-10-14 19:01:27.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +"2020-10-14 19:01:27.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2020-10-14 19:01:27.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2020-10-14 19:01:27.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.6µs " +"2020-10-14 19:01:27.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +"2020-10-14 19:01:27.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:27.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:27.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:27.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e18 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-10-14 19:01:27.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.4µs " +"2020-10-14 19:01:27.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2020-10-14 19:01:27.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1b Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-10-14 19:01:27.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.5µs " +"2020-10-14 19:01:27.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.2µs " +"2020-10-14 19:01:27.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:27.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:28.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:28.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e21 Sending msg of 28 bytes to 3 on channel testchainid took 37.1µs" +"2020-10-14 19:01:28.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.3µs " +"2020-10-14 19:01:28.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:01:28.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e24 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-10-14 19:01:28.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.4µs " +"2020-10-14 19:01:28.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.7µs " +"2020-10-14 19:01:28.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:28.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:28.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e29 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:28.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2a Sending msg of 28 bytes to 3 on channel testchainid took 17.8µs" +"2020-10-14 19:01:28.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 437.8µs " +"2020-10-14 19:01:28.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2020-10-14 19:01:28.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2d Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:01:28.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 210.8µs " +"2020-10-14 19:01:28.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.3µs " +"2020-10-14 19:01:28.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:28.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:29.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:29.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e33 Sending msg of 28 bytes to 3 on channel testchainid took 133.6µs" +"2020-10-14 19:01:29.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +"2020-10-14 19:01:29.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +"2020-10-14 19:01:29.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e36 Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2020-10-14 19:01:29.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +"2020-10-14 19:01:29.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.4µs " +"2020-10-14 19:01:29.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:29.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:29.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3c Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-10-14 19:01:29.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.2µs " +"2020-10-14 19:01:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2020-10-14 19:01:29.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3f Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-10-14 19:01:29.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " +"2020-10-14 19:01:29.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.8µs " +"2020-10-14 19:01:29.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:29.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:30.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e44 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:30.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e45 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-10-14 19:01:30.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.2µs " +"2020-10-14 19:01:30.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e47 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2020-10-14 19:01:30.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2020-10-14 19:01:30.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.1µs " +"2020-10-14 19:01:30.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.3µs " +"2020-10-14 19:01:30.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:30.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:30.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:30.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4e Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-10-14 19:01:30.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.7µs " +"2020-10-14 19:01:30.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2020-10-14 19:01:30.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e51 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +"2020-10-14 19:01:30.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +"2020-10-14 19:01:30.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:30.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.7µs " +"2020-10-14 19:01:30.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:31.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e56 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:31.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 484.3µs" +"2020-10-14 19:01:31.054 UTC [orderer.common.cluster.step] sendMessage -> DEBU e58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.1µs " +"2020-10-14 19:01:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 2 on channel businesschannel took 36.3µs" +"2020-10-14 19:01:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5a Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +"2020-10-14 19:01:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.8µs " +"2020-10-14 19:01:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 182.3µs " +"2020-10-14 19:01:31.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:31.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:31.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:31.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e60 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:01:31.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.9µs " +"2020-10-14 19:01:31.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e62 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2020-10-14 19:01:31.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2020-10-14 19:01:31.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 387.5µs " +"2020-10-14 19:01:31.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.8µs " +"2020-10-14 19:01:31.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:31.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:32.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e68 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:32.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e69 Sending msg of 28 bytes to 3 on channel testchainid took 43.7µs" +"2020-10-14 19:01:32.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.8µs " +"2020-10-14 19:01:32.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-10-14 19:01:32.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6c Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2020-10-14 19:01:32.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.3µs " +"2020-10-14 19:01:32.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:32.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:32.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.2µs " +"2020-10-14 19:01:32.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e71 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:32.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e72 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-10-14 19:01:32.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.6µs " +"2020-10-14 19:01:32.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 2 on channel businesschannel took 35.6µs" +"2020-10-14 19:01:32.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 16.5µs" +"2020-10-14 19:01:32.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 284.1µs " +"2020-10-14 19:01:32.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.4µs " +"2020-10-14 19:01:32.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:32.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:33.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:33.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7b Sending msg of 28 bytes to 3 on channel testchainid took 392.4µs" +"2020-10-14 19:01:33.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.5µs " +"2020-10-14 19:01:33.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +"2020-10-14 19:01:33.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 7.7µs" +"2020-10-14 19:01:33.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.4µs " +"2020-10-14 19:01:33.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.4µs " +"2020-10-14 19:01:33.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:33.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:33.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU e83 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:33.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e84 Sending msg of 28 bytes to 3 on channel testchainid took 34.3µs" +"2020-10-14 19:01:33.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU e85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.1µs " +"2020-10-14 19:01:33.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2020-10-14 19:01:33.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +"2020-10-14 19:01:33.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.7µs " +"2020-10-14 19:01:33.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.7µs " +"2020-10-14 19:01:33.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:33.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:34.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:34.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8d Sending msg of 28 bytes to 3 on channel testchainid took 53.8µs" +"2020-10-14 19:01:34.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 440.4µs " +"2020-10-14 19:01:34.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 2 on channel businesschannel took 317µs" +"2020-10-14 19:01:34.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e90 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2020-10-14 19:01:34.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 496.3µs " +"2020-10-14 19:01:34.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 229.3µs " +"2020-10-14 19:01:34.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:34.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:34.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU e95 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:34.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e96 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2020-10-14 19:01:34.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU e97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +"2020-10-14 19:01:34.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +"2020-10-14 19:01:34.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e99 Sending msg of 28 bytes to 3 on channel businesschannel took 10.6µs" +"2020-10-14 19:01:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +"2020-10-14 19:01:34.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:34.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147µs " +"2020-10-14 19:01:35.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:35.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9f Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-10-14 19:01:35.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.7µs " +"2020-10-14 19:01:35.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2020-10-14 19:01:35.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea2 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-10-14 19:01:35.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.2µs " +"2020-10-14 19:01:35.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +"2020-10-14 19:01:35.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:35.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:35.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:35.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea8 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-10-14 19:01:35.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 500.5µs " +"2020-10-14 19:01:35.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-10-14 19:01:35.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eab Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2020-10-14 19:01:35.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 529.5µs " +"2020-10-14 19:01:35.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.6µs " +"2020-10-14 19:01:35.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:35.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:36.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:36.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb1 Sending msg of 28 bytes to 3 on channel testchainid took 67.2µs" +"2020-10-14 19:01:36.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.9µs " +"2020-10-14 19:01:36.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-10-14 19:01:36.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-10-14 19:01:36.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.8µs " +"2020-10-14 19:01:36.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 344.4µs " +"2020-10-14 19:01:36.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:36.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:36.557 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:36.558 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eba Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2020-10-14 19:01:36.560 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3859ms " +"2020-10-14 19:01:36.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2020-10-14 19:01:36.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebd Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2020-10-14 19:01:36.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 554.2µs " +"2020-10-14 19:01:36.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +"2020-10-14 19:01:36.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:36.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:37.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:37.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec3 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2020-10-14 19:01:37.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " +"2020-10-14 19:01:37.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-10-14 19:01:37.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2020-10-14 19:01:37.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.6µs " +"2020-10-14 19:01:37.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +"2020-10-14 19:01:37.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:37.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:37.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:37.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecc Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-10-14 19:01:37.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.4µs " +"2020-10-14 19:01:37.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 2 on channel businesschannel took 27.4µs" +"2020-10-14 19:01:37.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 214.4µs" +"2020-10-14 19:01:37.659 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +"2020-10-14 19:01:37.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 363.4µs " +"2020-10-14 19:01:37.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:37.662 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:38.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:38.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed5 Sending msg of 28 bytes to 3 on channel testchainid took 268.3µs" +"2020-10-14 19:01:38.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335µs " +"2020-10-14 19:01:38.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2020-10-14 19:01:38.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed8 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-10-14 19:01:38.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 587.9µs " +"2020-10-14 19:01:38.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 421µs " +"2020-10-14 19:01:38.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:38.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:38.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU edd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:38.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ede Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-10-14 19:01:38.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU edf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +"2020-10-14 19:01:38.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee0 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2020-10-14 19:01:38.658 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee1 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:01:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2020-10-14 19:01:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +"2020-10-14 19:01:38.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:38.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:39.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:39.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-10-14 19:01:39.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.8µs " +"2020-10-14 19:01:39.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2020-10-14 19:01:39.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eea Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-10-14 19:01:39.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.8µs " +"2020-10-14 19:01:39.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.4µs " +"2020-10-14 19:01:39.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:39.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:39.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU eef Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:39.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef0 Sending msg of 28 bytes to 3 on channel testchainid took 76.6µs" +"2020-10-14 19:01:39.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.6µs " +"2020-10-14 19:01:39.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2020-10-14 19:01:39.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +"2020-10-14 19:01:39.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.4µs " +"2020-10-14 19:01:39.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 565µs " +"2020-10-14 19:01:39.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:39.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:40.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:40.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef9 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-10-14 19:01:40.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU efa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.4µs " +"2020-10-14 19:01:40.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2020-10-14 19:01:40.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efc Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-10-14 19:01:40.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94µs " +"2020-10-14 19:01:40.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.7µs " +"2020-10-14 19:01:40.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:40.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:40.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f01 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:40.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f02 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:01:40.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +"2020-10-14 19:01:40.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel businesschannel took 31.6µs" +"2020-10-14 19:01:40.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 2 on channel businesschannel took 8.8µs" +"2020-10-14 19:01:40.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.7µs " +"2020-10-14 19:01:40.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +"2020-10-14 19:01:40.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:40.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:41.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:41.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0b Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:01:41.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 473.2µs " +"2020-10-14 19:01:41.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2020-10-14 19:01:41.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0e Sending msg of 28 bytes to 3 on channel businesschannel took 7.7µs" +"2020-10-14 19:01:41.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.5µs " +"2020-10-14 19:01:41.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 434.7µs " +"2020-10-14 19:01:41.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:41.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:41.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f13 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:41.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f14 Sending msg of 28 bytes to 3 on channel testchainid took 10.2µs" +"2020-10-14 19:01:41.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU f15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 602µs " +"2020-10-14 19:01:41.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2020-10-14 19:01:41.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-10-14 19:01:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.3µs " +"2020-10-14 19:01:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 338.1µs " +"2020-10-14 19:01:41.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:41.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:42.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:42.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1d Sending msg of 28 bytes to 3 on channel testchainid took 8.7µs" +"2020-10-14 19:01:42.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.5µs " +"2020-10-14 19:01:42.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2020-10-14 19:01:42.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-10-14 19:01:42.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.8µs " +"2020-10-14 19:01:42.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 477.9µs " +"2020-10-14 19:01:42.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:42.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:42.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f25 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:42.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f26 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +"2020-10-14 19:01:42.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.4µs " +"2020-10-14 19:01:42.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-10-14 19:01:42.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f29 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-10-14 19:01:42.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +"2020-10-14 19:01:42.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 339.1µs " +"2020-10-14 19:01:42.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:42.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:43.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:43.051 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2f Sending msg of 28 bytes to 3 on channel testchainid took 64.8µs" +"2020-10-14 19:01:43.051 UTC [orderer.common.cluster.step] sendMessage -> DEBU f30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.9µs " +"2020-10-14 19:01:43.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:01:43.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f32 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-10-14 19:01:43.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.7µs " +"2020-10-14 19:01:43.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 697.5µs " +"2020-10-14 19:01:43.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:43.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:43.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f37 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:43.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f38 Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2020-10-14 19:01:43.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.2µs " +"2020-10-14 19:01:43.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2020-10-14 19:01:43.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3b Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2020-10-14 19:01:43.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.8µs " +"2020-10-14 19:01:43.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 422.5µs " +"2020-10-14 19:01:43.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:43.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:44.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f40 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:44.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f41 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2020-10-14 19:01:44.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 385.6µs " +"2020-10-14 19:01:44.159 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2020-10-14 19:01:44.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.1µs " +"2020-10-14 19:01:44.160 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.6µs " +"2020-10-14 19:01:44.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:44.161 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:44.163 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 2 on channel businesschannel took 50.7µs" +"2020-10-14 19:01:44.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU f49 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:44.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4a Sending msg of 28 bytes to 3 on channel testchainid took 93.4µs" +"2020-10-14 19:01:44.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.8µs " +"2020-10-14 19:01:44.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2020-10-14 19:01:44.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel businesschannel took 9.5µs" +"2020-10-14 19:01:44.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2020-10-14 19:01:44.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.5µs " +"2020-10-14 19:01:44.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:44.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:45.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU f52 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:45.052 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f53 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2020-10-14 19:01:45.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 267.8µs " +"2020-10-14 19:01:45.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 2 on channel businesschannel took 213.9µs" +"2020-10-14 19:01:45.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f56 Sending msg of 28 bytes to 3 on channel businesschannel took 110.8µs" +"2020-10-14 19:01:45.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109µs " +"2020-10-14 19:01:45.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:45.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:45.169 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 10.7365ms " +"2020-10-14 19:01:45.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:45.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +"2020-10-14 19:01:45.553 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.3µs " +"2020-10-14 19:01:45.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +"2020-10-14 19:01:45.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5f Sending msg of 28 bytes to 2 on channel businesschannel took 19.6µs" +"2020-10-14 19:01:45.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 285.7µs " +"2020-10-14 19:01:45.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 417.4µs " +"2020-10-14 19:01:45.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:45.660 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:46.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU f64 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:46.053 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f65 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2020-10-14 19:01:46.053 UTC [orderer.common.cluster.step] sendMessage -> DEBU f66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.3µs " +"2020-10-14 19:01:46.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2020-10-14 19:01:46.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f68 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2020-10-14 19:01:46.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.2µs " +"2020-10-14 19:01:46.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 584.4µs " +"2020-10-14 19:01:46.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:46.161 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:46.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:46.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6e Sending msg of 28 bytes to 3 on channel testchainid took 19.7µs" +"2020-10-14 19:01:46.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78µs " +"2020-10-14 19:01:46.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f70 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-10-14 19:01:46.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 7.4µs" +"2020-10-14 19:01:46.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " +"2020-10-14 19:01:46.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +"2020-10-14 19:01:46.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:46.659 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:47.057 UTC [orderer.common.cluster.step] handleMessage -> DEBU f76 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:47.058 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f77 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2020-10-14 19:01:47.059 UTC [orderer.common.cluster.step] sendMessage -> DEBU f78 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 958.4µs " +"2020-10-14 19:01:47.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 2 on channel businesschannel took 23.3µs" +"2020-10-14 19:01:47.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2020-10-14 19:01:47.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 231.6µs " +"2020-10-14 19:01:47.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.2µs " +"2020-10-14 19:01:47.159 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:47.160 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:47.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:47.552 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f80 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-10-14 19:01:47.552 UTC [orderer.common.cluster.step] sendMessage -> DEBU f81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.9µs " +"2020-10-14 19:01:47.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2020-10-14 19:01:47.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2020-10-14 19:01:47.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.4µs " +"2020-10-14 19:01:47.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.4µs " +"2020-10-14 19:01:47.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:47.658 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:48.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU f88 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:48.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f89 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-10-14 19:01:48.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " +"2020-10-14 19:01:48.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2020-10-14 19:01:48.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8c Sending msg of 28 bytes to 3 on channel businesschannel took 7.1µs" +"2020-10-14 19:01:48.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.7µs " +"2020-10-14 19:01:48.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.6µs " +"2020-10-14 19:01:48.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:48.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:48.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU f91 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:48.523 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f92 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +"2020-10-14 19:01:48.524 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.7µs " +"2020-10-14 19:01:48.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 31.7µs" +"2020-10-14 19:01:48.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.9µs " +"2020-10-14 19:01:48.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 3 on channel businesschannel took 10.3µs" +"2020-10-14 19:01:48.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +"2020-10-14 19:01:48.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:48.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:49.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:49.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9b Sending msg of 28 bytes to 3 on channel testchainid took 11.3µs" +"2020-10-14 19:01:49.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +"2020-10-14 19:01:49.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2020-10-14 19:01:49.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9e Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2020-10-14 19:01:49.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.7µs " +"2020-10-14 19:01:49.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.1µs " +"2020-10-14 19:01:49.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:49.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:49.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:49.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa4 Sending msg of 28 bytes to 3 on channel testchainid took 9.1µs" +"2020-10-14 19:01:49.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2020-10-14 19:01:49.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +"2020-10-14 19:01:49.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa7 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2020-10-14 19:01:49.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 252µs " +"2020-10-14 19:01:49.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 601.7µs " +"2020-10-14 19:01:49.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:49.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:50.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU fac Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:50.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fad Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-10-14 19:01:50.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +"2020-10-14 19:01:50.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2020-10-14 19:01:50.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb0 Sending msg of 28 bytes to 3 on channel businesschannel took 43.5µs" +"2020-10-14 19:01:50.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 308.4µs " +"2020-10-14 19:01:50.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.3µs " +"2020-10-14 19:01:50.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:50.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:50.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:50.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb6 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-10-14 19:01:50.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.7µs " +"2020-10-14 19:01:50.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2020-10-14 19:01:50.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb9 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2020-10-14 19:01:50.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.8µs " +"2020-10-14 19:01:50.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +"2020-10-14 19:01:50.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:50.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:51.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbe Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:51.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbf Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2020-10-14 19:01:51.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48µs " +"2020-10-14 19:01:51.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2020-10-14 19:01:51.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 2 on channel businesschannel took 11.1µs" +"2020-10-14 19:01:51.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.6µs " +"2020-10-14 19:01:51.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.1µs " +"2020-10-14 19:01:51.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:51.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:51.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:51.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc8 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-10-14 19:01:51.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +"2020-10-14 19:01:51.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fca Sending msg of 28 bytes to 3 on channel businesschannel took 59.5µs" +"2020-10-14 19:01:51.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 2 on channel businesschannel took 14.3µs" +"2020-10-14 19:01:51.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 252.6µs " +"2020-10-14 19:01:51.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +"2020-10-14 19:01:51.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:51.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:52.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:52.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd1 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-10-14 19:01:52.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-10-14 19:01:52.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:01:52.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2020-10-14 19:01:52.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.4µs " +"2020-10-14 19:01:52.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.8µs " +"2020-10-14 19:01:52.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:52.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:52.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fd9 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40044 with txid '7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378' of type ENDORSER_TRANSACTION" +"2020-10-14 19:01:52.220 UTC [policies] Evaluate -> DEBU fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:52.220 UTC [policies] Evaluate -> DEBU fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:52.221 UTC [policies] Evaluate -> DEBU fde == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:52.221 UTC [msp] DeserializeIdentity -> DEBU fdf Obtaining identity" +"2020-10-14 19:01:52.221 UTC [msp.identity] newIdentity -> DEBU fe0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func1 -> DEBU fe1 0xc000dabe20 gate 1602702112222104100 evaluation starts" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe2 0xc000dabe20 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe3 0xc000dabe20 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe4 0xc000dabe20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func2 -> DEBU fe5 0xc000dabe20 principal evaluation fails" +"2020-10-14 19:01:52.222 UTC [cauthdsl] func1 -> DEBU fe6 0xc000dabe20 gate 1602702112222104100 evaluation fails" +"2020-10-14 19:01:52.222 UTC [policies] Evaluate -> DEBU fe7 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:52.222 UTC [policies] Evaluate -> DEBU fe8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:52.222 UTC [policies] func1 -> DEBU fe9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fea Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU feb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:52.223 UTC [policies] Evaluate -> DEBU fee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:52.223 UTC [cauthdsl] func1 -> DEBU fef 0xc000e07490 gate 1602702112223605300 evaluation starts" +"2020-10-14 19:01:52.223 UTC [cauthdsl] func2 -> DEBU ff0 0xc000e07490 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:52.223 UTC [cauthdsl] func2 -> DEBU ff1 0xc000e07490 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:52.223 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ff2 Checking if identity satisfies MEMBER role for Org1MSP" +"2020-10-14 19:01:52.224 UTC [msp] Validate -> DEBU ff3 MSP Org1MSP validating identity" +"2020-10-14 19:01:52.224 UTC [msp] getCertificationChain -> DEBU ff4 MSP Org1MSP getting certification chain" +"2020-10-14 19:01:52.224 UTC [cauthdsl] func2 -> DEBU ff5 0xc000e07490 principal matched by identity 0" +"2020-10-14 19:01:52.224 UTC [msp.identity] Verify -> DEBU ff6 Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..|" +"2020-10-14 19:01:52.224 UTC [msp.identity] Verify -> DEBU ff7 Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +00000040 e0 6a d1 21 ea 79 |.j.!.y|" +"2020-10-14 19:01:52.224 UTC [cauthdsl] func2 -> DEBU ff8 0xc000e07490 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:52.225 UTC [cauthdsl] func1 -> DEBU ff9 0xc000e07490 gate 1602702112223605300 evaluation succeeds" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffc Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU ffe Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:52.225 UTC [policies] Evaluate -> DEBU fff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:52.225 UTC [orderer.common.blockcutter] Ordered -> DEBU 1000 Enqueuing message into batch" +"2020-10-14 19:01:52.225 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1001 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40044" +"2020-10-14 19:01:52.229 UTC [grpc] warningf -> DEBU 1002 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:40044: read: connection reset by peer" +"2020-10-14 19:01:52.229 UTC [grpc] infof -> DEBU 1003 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:52.229 UTC [orderer.common.broadcast] Handle -> WARN 1004 Error reading from 172.18.0.9:40044: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:52.230 UTC [orderer.common.server] func1 -> DEBU 1005 Closing Broadcast stream" +"2020-10-14 19:01:52.231 UTC [comm.grpc.server] 1 -> INFO 1006 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40044 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.3482961s +"2020-10-14 19:01:52.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1007 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:52.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 3 on channel testchainid took 260µs" +"2020-10-14 19:01:52.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1009 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.8µs " +"2020-10-14 19:01:52.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 2 on channel businesschannel took 102.6µs" +"2020-10-14 19:01:52.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-10-14 19:01:52.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238µs " +"2020-10-14 19:01:52.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.8µs " +"2020-10-14 19:01:52.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:52.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:53.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:53.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2020-10-14 19:01:53.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1012 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 820.4µs " +"2020-10-14 19:01:53.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +"2020-10-14 19:01:53.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +"2020-10-14 19:01:53.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +"2020-10-14 19:01:53.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1016 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 937.3µs " +"2020-10-14 19:01:53.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:53.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1018 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:53.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:53.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101a Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-10-14 19:01:53.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +"2020-10-14 19:01:53.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101c Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2020-10-14 19:01:53.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2020-10-14 19:01:53.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 382.4µs " +"2020-10-14 19:01:53.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 706.8µs " +"2020-10-14 19:01:53.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:53.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1021 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1022 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:54.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1023 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2020-10-14 19:01:54.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1024 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 240.6µs " +"2020-10-14 19:01:54.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1025 Sending msg of 28 bytes to 2 on channel businesschannel took 69µs" +"2020-10-14 19:01:54.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2020-10-14 19:01:54.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.2µs " +"2020-10-14 19:01:54.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1028 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240.4µs " +"2020-10-14 19:01:54.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 102b Batch timer expired, creating block" channel=businesschannel node=1 +"2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] propose -> INFO 102c Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:01:54.226 UTC [orderer.consensus.etcdraft] 2 -> DEBU 102d Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:01:54.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102e Sending msg of 3648 bytes to 2 on channel businesschannel took 20.3µs" +"2020-10-14 19:01:54.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102f Sending msg of 3648 bytes to 3 on channel businesschannel took 7.7µs" +"2020-10-14 19:01:54.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +"2020-10-14 19:01:54.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1031 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer1.example.com(orderer1.example.com:7050) took 552.8µs " +"2020-10-14 19:01:54.235 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.236 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1033 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1034 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +"2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1036 Sending msg of 28 bytes to 3 on channel businesschannel took 7.2µs" +"2020-10-14 19:01:54.237 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1037 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +"2020-10-14 19:01:54.236 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1035 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2020-10-14 19:01:54.237 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1038 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-10-14 19:01:54.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 1039 Obtaining default signing identity" +"2020-10-14 19:01:54.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 103a Obtaining default signing identity" +"2020-10-14 19:01:54.250 UTC [msp.identity] Sign -> DEBU 103e Sign: plaintext: 0A020802120B0A090A03010203100418...DF90509CA53B6A161095733EDD710F0C " +"2020-10-14 19:01:54.243 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 479.9µs " +"2020-10-14 19:01:54.244 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.252 UTC [msp.identity] Sign -> DEBU 103f Sign: digest: 497618C8EAE6BAB20A7D85691DA673A92FD5B44F12BE152B6D147E19809A683A " +"2020-10-14 19:01:54.260 UTC [fsblkstorage] indexBlock -> DEBU 1040 Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +]" +"2020-10-14 19:01:54.262 UTC [fsblkstorage] updateCheckpoint -> DEBU 1041 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89368], isChainEmpty=[false], lastBlockNumber=[3]" +"2020-10-14 19:01:54.262 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1042 [channel: businesschannel] Wrote block [3]" +"2020-10-14 19:01:54.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:54.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +"2020-10-14 19:01:54.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.2µs " +"2020-10-14 19:01:54.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 2 on channel businesschannel took 69.8µs" +"2020-10-14 19:01:54.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +"2020-10-14 19:01:54.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1048 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.9µs " +"2020-10-14 19:01:54.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 409.2µs " +"2020-10-14 19:01:54.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:54.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:55.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:55.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 3 on channel testchainid took 228.6µs" +"2020-10-14 19:01:55.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169µs " +"2020-10-14 19:01:55.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104f Sending msg of 28 bytes to 2 on channel businesschannel took 67.1µs" +"2020-10-14 19:01:55.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1050 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2020-10-14 19:01:55.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1051 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 323.1µs " +"2020-10-14 19:01:55.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1052 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 262.7µs " +"2020-10-14 19:01:55.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:55.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1054 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:55.222 UTC [orderer.common.server] Broadcast -> DEBU 1055 Starting new Broadcast handler" +"2020-10-14 19:01:55.222 UTC [orderer.common.broadcast] Handle -> DEBU 1056 Starting new broadcast loop for 172.18.0.9:40062" +"2020-10-14 19:01:55.232 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1057 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40062 with txid 'b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378' of type ENDORSER_TRANSACTION" +"2020-10-14 19:01:55.233 UTC [policies] Evaluate -> DEBU 1058 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:55.234 UTC [policies] Evaluate -> DEBU 1059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:55.234 UTC [policies] Evaluate -> DEBU 105a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 105b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 105c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func1 -> DEBU 105d 0xc000e5de00 gate 1602702115239473900 evaluation starts" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 105e 0xc000e5de00 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 105f 0xc000e5de00 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 1060 0xc000e5de00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func2 -> DEBU 1061 0xc000e5de00 principal evaluation fails" +"2020-10-14 19:01:55.239 UTC [cauthdsl] func1 -> DEBU 1062 0xc000e5de00 gate 1602702115239473900 evaluation fails" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1063 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1064 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:55.239 UTC [policies] func1 -> DEBU 1065 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1066 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1067 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:55.239 UTC [policies] Evaluate -> DEBU 1068 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1069 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 106a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func1 -> DEBU 106b 0xc001036af0 gate 1602702115240102200 evaluation starts" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106c 0xc001036af0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106d 0xc001036af0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 106e 0xc001036af0 principal matched by identity 0" +"2020-10-14 19:01:55.240 UTC [msp.identity] Verify -> DEBU 106f Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA|" +"2020-10-14 19:01:55.240 UTC [msp.identity] Verify -> DEBU 1070 Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +00000040 2a 75 63 d1 1c 2e ca |*uc....|" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func2 -> DEBU 1071 0xc001036af0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:55.240 UTC [cauthdsl] func1 -> DEBU 1072 0xc001036af0 gate 1602702115240102200 evaluation succeeds" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1073 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1074 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1075 Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:01:55.240 UTC [policies] Evaluate -> DEBU 1076 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:55.241 UTC [policies] Evaluate -> DEBU 1077 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:55.242 UTC [policies] Evaluate -> DEBU 1078 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:55.242 UTC [orderer.common.blockcutter] Ordered -> DEBU 1079 Enqueuing message into batch" +"2020-10-14 19:01:55.243 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 107a [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40062" +"2020-10-14 19:01:55.264 UTC [orderer.common.broadcast] Handle -> WARN 107b Error reading from 172.18.0.9:40062: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:55.264 UTC [orderer.common.server] func1 -> DEBU 107c Closing Broadcast stream" +"2020-10-14 19:01:55.264 UTC [comm.grpc.server] 1 -> INFO 107d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7429ms +"2020-10-14 19:01:55.264 UTC [grpc] infof -> DEBU 107e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:55.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:55.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1080 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-10-14 19:01:55.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2020-10-14 19:01:55.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1082 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2020-10-14 19:01:55.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +"2020-10-14 19:01:55.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1084 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.2µs " +"2020-10-14 19:01:55.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +"2020-10-14 19:01:55.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1086 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:55.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:56.020 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:56.021 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1089 Sending msg of 28 bytes to 3 on channel testchainid took 27.9µs" +"2020-10-14 19:01:56.022 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.2µs " +"2020-10-14 19:01:56.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108b Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +"2020-10-14 19:01:56.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108c Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2020-10-14 19:01:56.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +"2020-10-14 19:01:56.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.2µs " +"2020-10-14 19:01:56.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:56.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1090 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:56.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1091 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:56.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1092 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2020-10-14 19:01:56.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1093 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 702.5µs " +"2020-10-14 19:01:56.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2020-10-14 19:01:56.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1095 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2020-10-14 19:01:56.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.1µs " +"2020-10-14 19:01:56.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1097 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.5µs " +"2020-10-14 19:01:56.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1098 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:56.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1099 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:57.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109b Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2020-10-14 19:01:57.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.4µs " +"2020-10-14 19:01:57.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109d Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +"2020-10-14 19:01:57.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 109e Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2020-10-14 19:01:57.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.4µs " +"2020-10-14 19:01:57.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0178ms " +"2020-10-14 19:01:57.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.244 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10a3 Batch timer expired, creating block" channel=businesschannel node=1 +"2020-10-14 19:01:57.245 UTC [orderer.consensus.etcdraft] propose -> INFO 10a4 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:01:57.246 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10a5 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:01:57.249 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 3109 bytes to 2 on channel businesschannel took 20µs" +"2020-10-14 19:01:57.250 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a7 Sending msg of 3109 bytes to 3 on channel businesschannel took 13.4µs" +"2020-10-14 19:01:57.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer2.example.com(orderer2.example.com:7050) took 213.5µs " +"2020-10-14 19:01:57.250 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a9 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer1.example.com(orderer1.example.com:7050) took 506.3µs " +"2020-10-14 19:01:57.254 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.255 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ac Sending msg of 28 bytes to 2 on channel businesschannel took 432.1µs" +"2020-10-14 19:01:57.256 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ad Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +"2020-10-14 19:01:57.256 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10ae Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2020-10-14 19:01:57.257 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 843.7µs " +"2020-10-14 19:01:57.257 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.7µs " +"2020-10-14 19:01:57.255 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ab Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.257 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10b1 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-10-14 19:01:57.258 UTC [msp] GetDefaultSigningIdentity -> DEBU 10b2 Obtaining default signing identity" +"2020-10-14 19:01:57.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.266 UTC [msp] GetDefaultSigningIdentity -> DEBU 10b5 Obtaining default signing identity" +"2020-10-14 19:01:57.266 UTC [msp.identity] Sign -> DEBU 10b6 Sign: plaintext: 0A020802120B0A090A03010203100418...5D008587A5A1859DE648C06BABBCD926 " +"2020-10-14 19:01:57.266 UTC [msp.identity] Sign -> DEBU 10b7 Sign: digest: 536E662C0776AD9DF3B2DDCD550C1279F1596B875ED02D4DCF6D157956633282 " +"2020-10-14 19:01:57.280 UTC [fsblkstorage] indexBlock -> DEBU 10b8 Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +]" +"2020-10-14 19:01:57.287 UTC [fsblkstorage] updateCheckpoint -> DEBU 10b9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93380], isChainEmpty=[false], lastBlockNumber=[4]" +"2020-10-14 19:01:57.288 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ba [channel: businesschannel] Wrote block [4]" +"2020-10-14 19:01:57.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:57.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bc Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-10-14 19:01:57.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2020-10-14 19:01:57.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10be Sending msg of 28 bytes to 2 on channel businesschannel took 131µs" +"2020-10-14 19:01:57.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-10-14 19:01:57.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 431.3µs " +"2020-10-14 19:01:57.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 3.8418ms " +"2020-10-14 19:01:57.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:57.930 UTC [orderer.common.server] replicateDisabledChains -> DEBU 10c4 No inactive chains to try to replicate" +"2020-10-14 19:01:58.015 UTC [orderer.common.server] Broadcast -> DEBU 10c5 Starting new Broadcast handler" +"2020-10-14 19:01:58.015 UTC [orderer.common.broadcast] Handle -> DEBU 10c6 Starting new broadcast loop for 172.18.0.9:40076" +"2020-10-14 19:01:58.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:58.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-10-14 19:01:58.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.5µs " +"2020-10-14 19:01:58.054 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10ca [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:40076 with txid 'ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd' of type ENDORSER_TRANSACTION" +"2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:58.055 UTC [policies] Evaluate -> DEBU 10cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:01:58.055 UTC [msp] DeserializeIdentity -> DEBU 10d0 Obtaining identity" +"2020-10-14 19:01:58.055 UTC [msp.identity] newIdentity -> DEBU 10d1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-10-14 19:01:58.056 UTC [cauthdsl] func1 -> DEBU 10d2 0xc00113b4d0 gate 1602702118056361800 evaluation starts" +"2020-10-14 19:01:58.056 UTC [cauthdsl] func2 -> DEBU 10d3 0xc00113b4d0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:58.056 UTC [cauthdsl] func2 -> DEBU 10d4 0xc00113b4d0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:58.057 UTC [cauthdsl] func2 -> DEBU 10d5 0xc00113b4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2020-10-14 19:01:58.057 UTC [cauthdsl] func2 -> DEBU 10d6 0xc00113b4d0 principal evaluation fails" +"2020-10-14 19:01:58.057 UTC [cauthdsl] func1 -> DEBU 10d7 0xc00113b4d0 gate 1602702118056361800 evaluation fails" +"2020-10-14 19:01:58.057 UTC [policies] Evaluate -> DEBU 10d8 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:01:58.058 UTC [policies] func1 -> DEBU 10da Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10db Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:01:58.058 UTC [policies] Evaluate -> DEBU 10df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func1 -> DEBU 10e0 0xc00118cb40 gate 1602702118059129600 evaluation starts" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e1 0xc00118cb40 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e2 0xc00118cb40 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e3 0xc00118cb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func2 -> DEBU 10e4 0xc00118cb40 principal evaluation fails" +"2020-10-14 19:01:58.059 UTC [cauthdsl] func1 -> DEBU 10e5 0xc00118cb40 gate 1602702118059129600 evaluation fails" +"2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:01:58.060 UTC [policies] Evaluate -> DEBU 10e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-10-14 19:01:58.060 UTC [cauthdsl] func1 -> DEBU 10e9 0xc00118d3a0 gate 1602702118060918500 evaluation starts" +"2020-10-14 19:01:58.061 UTC [cauthdsl] func2 -> DEBU 10ea 0xc00118d3a0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:01:58.061 UTC [cauthdsl] func2 -> DEBU 10eb 0xc00118d3a0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:01:58.061 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10ec Checking if identity satisfies MEMBER role for Org2MSP" +"2020-10-14 19:01:58.061 UTC [msp] Validate -> DEBU 10ed MSP Org2MSP validating identity" +"2020-10-14 19:01:58.061 UTC [msp] getCertificationChain -> DEBU 10ee MSP Org2MSP getting certification chain" +"2020-10-14 19:01:58.062 UTC [cauthdsl] func2 -> DEBU 10ef 0xc00118d3a0 principal matched by identity 0" +"2020-10-14 19:01:58.062 UTC [msp.identity] Verify -> DEBU 10f0 Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.|" +"2020-10-14 19:01:58.062 UTC [msp.identity] Verify -> DEBU 10f1 Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +00000040 5c 21 63 9f f2 |\!c..|" +"2020-10-14 19:01:58.063 UTC [cauthdsl] func2 -> DEBU 10f2 0xc00118d3a0 principal evaluation succeeds for identity 0" +"2020-10-14 19:01:58.063 UTC [cauthdsl] func1 -> DEBU 10f3 0xc00118d3a0 gate 1602702118060918500 evaluation succeeds" +"2020-10-14 19:01:58.063 UTC [policies] Evaluate -> DEBU 10f4 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:58.063 UTC [policies] Evaluate -> DEBU 10f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f6 Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f8 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:01:58.064 UTC [policies] Evaluate -> DEBU 10f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:01:58.066 UTC [orderer.common.blockcutter] Ordered -> DEBU 10fa Enqueuing message into batch" +"2020-10-14 19:01:58.066 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10fb [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:40076" +"2020-10-14 19:01:58.073 UTC [orderer.common.broadcast] Handle -> WARN 10fc Error reading from 172.18.0.9:40076: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:01:58.074 UTC [orderer.common.server] func1 -> DEBU 10fd Closing Broadcast stream" +"2020-10-14 19:01:58.074 UTC [comm.grpc.server] 1 -> INFO 10fe streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=58.9056ms +"2020-10-14 19:01:58.074 UTC [grpc] infof -> DEBU 10ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:01:58.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1100 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +"2020-10-14 19:01:58.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1101 Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +"2020-10-14 19:01:58.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1102 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +"2020-10-14 19:01:58.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.3µs " +"2020-10-14 19:01:58.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:58.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1105 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:58.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1106 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:58.528 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 3 on channel testchainid took 56µs" +"2020-10-14 19:01:58.531 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1108 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 474.9µs " +"2020-10-14 19:01:58.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1109 Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +"2020-10-14 19:01:58.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110a Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2020-10-14 19:01:58.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +"2020-10-14 19:01:58.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.3µs " +"2020-10-14 19:01:58.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:58.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:59.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:59.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-10-14 19:01:59.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.7µs " +"2020-10-14 19:01:59.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1112 Sending msg of 28 bytes to 2 on channel businesschannel took 32.1µs" +"2020-10-14 19:01:59.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1113 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.2µs " +"2020-10-14 19:01:59.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:59.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1115 Sending msg of 28 bytes to 3 on channel businesschannel took 215.3µs" +"2020-10-14 19:01:59.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1116 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 292.3µs " +"2020-10-14 19:01:59.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1117 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:59.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1118 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:01:59.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-10-14 19:01:59.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 628.8µs " +"2020-10-14 19:01:59.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111b Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +"2020-10-14 19:01:59.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111c Sending msg of 28 bytes to 3 on channel businesschannel took 32µs" +"2020-10-14 19:01:59.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.7µs " +"2020-10-14 19:01:59.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 299.5µs " +"2020-10-14 19:01:59.627 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:01:59.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1120 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1121 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:00.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 3 on channel testchainid took 12.3µs" +"2020-10-14 19:02:00.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 231.5µs " +"2020-10-14 19:02:00.067 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1124 Batch timer expired, creating block" channel=businesschannel node=1 +"2020-10-14 19:02:00.067 UTC [orderer.consensus.etcdraft] propose -> INFO 1125 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:02:00.068 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1126 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:02:00.070 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1127 Sending msg of 3106 bytes to 2 on channel businesschannel took 112.1µs" +"2020-10-14 19:02:00.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1128 Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer1.example.com(orderer1.example.com:7050) took 115.7µs " +"2020-10-14 19:02:00.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 3106 bytes to 3 on channel businesschannel took 17.3µs" +"2020-10-14 19:02:00.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer2.example.com(orderer2.example.com:7050) took 224.7µs " +"2020-10-14 19:02:00.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112d Sending msg of 28 bytes to 2 on channel businesschannel took 13.6µs" +"2020-10-14 19:02:00.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112e Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:02:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.3µs " +"2020-10-14 19:02:00.075 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1130 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2020-10-14 19:02:00.075 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1131 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-10-14 19:02:00.075 UTC [msp] GetDefaultSigningIdentity -> DEBU 1132 Obtaining default signing identity" +"2020-10-14 19:02:00.075 UTC [msp] GetDefaultSigningIdentity -> DEBU 1133 Obtaining default signing identity" +"2020-10-14 19:02:00.076 UTC [msp.identity] Sign -> DEBU 1134 Sign: plaintext: 0A020802120B0A090A03010203100418...EBE319D8E2A2E909F275A3FBB645C04B " +"2020-10-14 19:02:00.076 UTC [msp.identity] Sign -> DEBU 1135 Sign: digest: 5988E8613F9D8FE63EC0B58E22CFEF29B1E3045E9157C4783230F691985791B6 " +"2020-10-14 19:02:00.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 208.5µs " +"2020-10-14 19:02:00.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1137 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.080 UTC [fsblkstorage] indexBlock -> DEBU 1138 Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +]" +"2020-10-14 19:02:00.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.089 UTC [fsblkstorage] updateCheckpoint -> DEBU 113a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97389], isChainEmpty=[false], lastBlockNumber=[5]" +"2020-10-14 19:02:00.089 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 113b [channel: businesschannel] Wrote block [5]" +"2020-10-14 19:02:00.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113c Sending msg of 28 bytes to 2 on channel businesschannel took 16µs" +"2020-10-14 19:02:00.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113d Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-10-14 19:02:00.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.8µs " +"2020-10-14 19:02:00.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.7µs " +"2020-10-14 19:02:00.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1140 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1141 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1142 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:00.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1143 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-10-14 19:02:00.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1144 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143.9µs " +"2020-10-14 19:02:00.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1145 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.1µs " +"2020-10-14 19:02:00.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1146 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-10-14 19:02:00.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1147 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-10-14 19:02:00.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1148 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.8µs " +"2020-10-14 19:02:00.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1149 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:00.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:01.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:01.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114c Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2020-10-14 19:02:01.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +"2020-10-14 19:02:01.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114e Sending msg of 28 bytes to 2 on channel businesschannel took 43.8µs" +"2020-10-14 19:02:01.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114f Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2020-10-14 19:02:01.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266µs " +"2020-10-14 19:02:01.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1151 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 369.2µs " +"2020-10-14 19:02:01.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1152 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:01.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1153 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:01.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1154 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:01.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1155 Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2020-10-14 19:02:01.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1156 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2020-10-14 19:02:01.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1157 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2020-10-14 19:02:01.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-10-14 19:02:01.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1158 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.4µs " +"2020-10-14 19:02:01.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 266.2µs " +"2020-10-14 19:02:01.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:01.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:02.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 115d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:02.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115e Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-10-14 19:02:02.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87µs " +"2020-10-14 19:02:02.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1160 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2020-10-14 19:02:02.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1161 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-10-14 19:02:02.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1162 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151µs " +"2020-10-14 19:02:02.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1163 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.6µs " +"2020-10-14 19:02:02.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1164 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:02.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1165 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:02.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1166 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:02.519 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1167 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-10-14 19:02:02.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1168 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +"2020-10-14 19:02:02.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1169 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2020-10-14 19:02:02.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 116a Sending msg of 28 bytes to 3 on channel businesschannel took 208.4µs" +"2020-10-14 19:02:02.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +"2020-10-14 19:02:02.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 286.6µs " +"2020-10-14 19:02:02.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:02.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116e Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:03.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:03.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1170 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-10-14 19:02:03.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1171 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.4µs " +"2020-10-14 19:02:03.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1172 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +"2020-10-14 19:02:03.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1173 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +"2020-10-14 19:02:03.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1174 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.4µs " +"2020-10-14 19:02:03.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1175 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.7µs " +"2020-10-14 19:02:03.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1176 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:03.128 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1177 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:03.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1178 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:03.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1179 Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2020-10-14 19:02:03.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.9µs " +"2020-10-14 19:02:03.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117b Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +"2020-10-14 19:02:03.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117c Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2020-10-14 19:02:03.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74µs " +"2020-10-14 19:02:03.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.6µs " +"2020-10-14 19:02:03.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:03.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1180 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:03.843 UTC [orderer.common.server] Deliver -> DEBU 1181 Starting new Deliver handler" +"2020-10-14 19:02:03.843 UTC [common.deliver] Handle -> DEBU 1182 Starting new deliver loop for 172.18.0.9:40122" +"2020-10-14 19:02:03.844 UTC [common.deliver] Handle -> DEBU 1183 Attempting to read seek info message from 172.18.0.9:40122" +"2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1184 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1185 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:03.845 UTC [policies] Evaluate -> DEBU 1186 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:03.846 UTC [policies] Evaluate -> DEBU 1187 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:03.846 UTC [policies] Evaluate -> DEBU 1188 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:03.847 UTC [msp] DeserializeIdentity -> DEBU 1189 Obtaining identity" +"2020-10-14 19:02:03.848 UTC [msp.identity] newIdentity -> DEBU 118a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-10-14 19:02:03.850 UTC [cauthdsl] func1 -> DEBU 118b 0xc001230de0 gate 1602702123850129700 evaluation starts" +"2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118c 0xc001230de0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118d 0xc001230de0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:03.850 UTC [cauthdsl] func2 -> DEBU 118e 0xc001230de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:03.851 UTC [cauthdsl] func2 -> DEBU 118f 0xc001230de0 principal evaluation fails" +"2020-10-14 19:02:03.851 UTC [cauthdsl] func1 -> DEBU 1190 0xc001230de0 gate 1602702123850129700 evaluation fails" +"2020-10-14 19:02:03.851 UTC [policies] Evaluate -> DEBU 1191 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:03.852 UTC [policies] Evaluate -> DEBU 1192 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:03.852 UTC [policies] Evaluate -> DEBU 1193 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:03.853 UTC [cauthdsl] func1 -> DEBU 1194 0xc001231fa0 gate 1602702123853211400 evaluation starts" +"2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1195 0xc001231fa0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1196 0xc001231fa0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:03.853 UTC [cauthdsl] func2 -> DEBU 1197 0xc001231fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:03.854 UTC [cauthdsl] func2 -> DEBU 1198 0xc001231fa0 principal evaluation fails" +"2020-10-14 19:02:03.854 UTC [cauthdsl] func1 -> DEBU 1199 0xc001231fa0 gate 1602702123853211400 evaluation fails" +"2020-10-14 19:02:03.854 UTC [policies] Evaluate -> DEBU 119a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:03.854 UTC [policies] Evaluate -> DEBU 119b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:03.854 UTC [policies] func1 -> DEBU 119c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119d Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 119f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 11a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:03.855 UTC [policies] Evaluate -> DEBU 11a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:03.856 UTC [cauthdsl] func1 -> DEBU 11a2 0xc0012a0cb0 gate 1602702123856061100 evaluation starts" +"2020-10-14 19:02:03.856 UTC [cauthdsl] func2 -> DEBU 11a3 0xc0012a0cb0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:03.856 UTC [cauthdsl] func2 -> DEBU 11a4 0xc0012a0cb0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:03.856 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a5 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:02:03.857 UTC [msp] Validate -> DEBU 11a6 MSP OrdererMSP validating identity" +"2020-10-14 19:02:03.857 UTC [msp] getCertificationChain -> DEBU 11a7 MSP OrdererMSP getting certification chain" +"2020-10-14 19:02:03.857 UTC [cauthdsl] func2 -> DEBU 11a8 0xc0012a0cb0 principal matched by identity 0" +"2020-10-14 19:02:03.858 UTC [msp.identity] Verify -> DEBU 11a9 Verify: digest = 00000000 9a 75 2e af c1 64 ed d2 b0 fc 46 ad 8d 6c e9 dc |.u...d....F..l..| +00000010 83 6c 63 a1 da ef e5 6d fc 1d 7b f5 85 d6 df f0 |.lc....m..{.....|" +"2020-10-14 19:02:03.858 UTC [msp.identity] Verify -> DEBU 11aa Verify: sig = 00000000 30 44 02 20 76 a2 b2 91 ce fb bf e5 56 41 3b 76 |0D. v.......VA;v| +00000010 c4 75 c0 73 b0 e2 6c 7b 86 b2 55 72 b3 1c 15 0b |.u.s..l{..Ur....| +00000020 c3 14 a3 5d 02 20 0c 60 b7 f6 fd 05 84 43 9f 03 |...]. .`.....C..| +00000030 25 45 17 35 80 44 b2 7d e0 e3 fc c9 e9 a5 91 db |%E.5.D.}........| +00000040 87 1e 09 c8 fe 66 |.....f|" +"2020-10-14 19:02:03.858 UTC [cauthdsl] func2 -> DEBU 11ab 0xc0012a0cb0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:03.858 UTC [cauthdsl] func1 -> DEBU 11ac 0xc0012a0cb0 gate 1602702123856061100 evaluation succeeds" +"2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11ad Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11ae == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:03.859 UTC [policies] Evaluate -> DEBU 11af Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b1 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:03.860 UTC [policies] Evaluate -> DEBU 11b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:03.861 UTC [common.deliver] deliverBlocks -> DEBU 11b3 [channel: businesschannel] Received seekInfo (0xc0010a1d40) start: > stop: > from 172.18.0.9:40122" +"2020-10-14 19:02:03.862 UTC [fsblkstorage] Next -> DEBU 11b4 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:03.863 UTC [fsblkstorage] newBlockfileStream -> DEBU 11b5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +"2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b6 Remaining bytes=[4009], Going to peek [8] bytes" +"2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b7 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +"2020-10-14 19:02:03.864 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11b8 blockbytes [4007] read from file [0]" +"2020-10-14 19:02:03.865 UTC [common.deliver] deliverBlocks -> DEBU 11b9 [channel: businesschannel] Delivering block [5] for (0xc0010a1d40) for 172.18.0.9:40122" +"2020-10-14 19:02:03.865 UTC [common.deliver] deliverBlocks -> DEBU 11ba [channel: businesschannel] Done delivering to 172.18.0.9:40122 for (0xc0010a1d40)" +"2020-10-14 19:02:03.866 UTC [common.deliver] Handle -> DEBU 11bb Waiting for new SeekInfo from 172.18.0.9:40122" +"2020-10-14 19:02:03.867 UTC [common.deliver] Handle -> DEBU 11bc Attempting to read seek info message from 172.18.0.9:40122" +"2020-10-14 19:02:03.879 UTC [common.deliver] Handle -> WARN 11bd Error reading from 172.18.0.9:40122: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:03.879 UTC [orderer.common.server] func1 -> DEBU 11be Closing Deliver stream" +"2020-10-14 19:02:03.880 UTC [comm.grpc.server] 1 -> INFO 11bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40122 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.3919ms +"2020-10-14 19:02:03.880 UTC [grpc] infof -> DEBU 11c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:04.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:04.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c2 Sending msg of 28 bytes to 3 on channel testchainid took 278.3µs" +"2020-10-14 19:02:04.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 293µs " +"2020-10-14 19:02:04.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +"2020-10-14 19:02:04.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c5 Sending msg of 28 bytes to 2 on channel businesschannel took 103.2µs" +"2020-10-14 19:02:04.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 507.3µs " +"2020-10-14 19:02:04.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.8µs " +"2020-10-14 19:02:04.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:04.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:04.208 UTC [orderer.common.server] Deliver -> DEBU 11ca Starting new Deliver handler" +"2020-10-14 19:02:04.209 UTC [common.deliver] Handle -> DEBU 11cb Starting new deliver loop for 172.18.0.9:40124" +"2020-10-14 19:02:04.209 UTC [common.deliver] Handle -> DEBU 11cc Attempting to read seek info message from 172.18.0.9:40124" +"2020-10-14 19:02:04.209 UTC [policies] Evaluate -> DEBU 11cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.210 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:04.210 UTC [cauthdsl] func1 -> DEBU 11d2 0xc0012afe60 gate 1602702124210833200 evaluation starts" +"2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d3 0xc0012afe60 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d4 0xc0012afe60 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0012afe60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:04.211 UTC [cauthdsl] func2 -> DEBU 11d6 0xc0012afe60 principal evaluation fails" +"2020-10-14 19:02:04.211 UTC [cauthdsl] func1 -> DEBU 11d7 0xc0012afe60 gate 1602702124210833200 evaluation fails" +"2020-10-14 19:02:04.211 UTC [policies] Evaluate -> DEBU 11d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.212 UTC [policies] Evaluate -> DEBU 11d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.212 UTC [policies] Evaluate -> DEBU 11da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:04.212 UTC [cauthdsl] func1 -> DEBU 11db 0xc0012ee6a0 gate 1602702124212492900 evaluation starts" +"2020-10-14 19:02:04.212 UTC [cauthdsl] func2 -> DEBU 11dc 0xc0012ee6a0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.212 UTC [cauthdsl] func2 -> DEBU 11dd 0xc0012ee6a0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.213 UTC [cauthdsl] func2 -> DEBU 11de 0xc0012ee6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:04.213 UTC [cauthdsl] func2 -> DEBU 11df 0xc0012ee6a0 principal evaluation fails" +"2020-10-14 19:02:04.213 UTC [cauthdsl] func1 -> DEBU 11e0 0xc0012ee6a0 gate 1602702124212492900 evaluation fails" +"2020-10-14 19:02:04.213 UTC [policies] Evaluate -> DEBU 11e1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.213 UTC [policies] Evaluate -> DEBU 11e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.214 UTC [policies] func1 -> DEBU 11e3 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e4 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:04.214 UTC [policies] Evaluate -> DEBU 11e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:04.215 UTC [policies] Evaluate -> DEBU 11e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.215 UTC [policies] Evaluate -> DEBU 11e8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:04.215 UTC [cauthdsl] func1 -> DEBU 11e9 0xc0012ef390 gate 1602702124215487100 evaluation starts" +"2020-10-14 19:02:04.215 UTC [cauthdsl] func2 -> DEBU 11ea 0xc0012ef390 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.215 UTC [cauthdsl] func2 -> DEBU 11eb 0xc0012ef390 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.216 UTC [cauthdsl] func2 -> DEBU 11ec 0xc0012ef390 principal matched by identity 0" +"2020-10-14 19:02:04.216 UTC [msp.identity] Verify -> DEBU 11ed Verify: digest = 00000000 45 e5 46 79 10 3c 68 da 86 2a 99 d6 ad 40 34 7b |E.Fy. DEBU 11ee Verify: sig = 00000000 30 45 02 21 00 ee 66 76 9d c2 a5 58 78 67 25 f1 |0E.!..fv...Xxg%.| +00000010 44 42 93 3d ed 90 5b 6b 07 1e 6e 7c 49 2f c1 01 |DB.=..[k..n|I/..| +00000020 58 27 d9 91 61 02 20 72 f9 d5 de 03 bf 74 0f 04 |X'..a. r.....t..| +00000030 1a 22 cd 6d 5f 8f 10 ea 43 02 5c 9c a4 54 5f e8 |.".m_...C.\..T_.| +00000040 96 33 1b 7a 88 7d 58 |.3.z.}X|" +"2020-10-14 19:02:04.217 UTC [cauthdsl] func2 -> DEBU 11ef 0xc0012ef390 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:04.217 UTC [cauthdsl] func1 -> DEBU 11f0 0xc0012ef390 gate 1602702124215487100 evaluation succeeds" +"2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f3 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.217 UTC [policies] Evaluate -> DEBU 11f5 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:04.218 UTC [policies] Evaluate -> DEBU 11f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:04.218 UTC [common.deliver] deliverBlocks -> DEBU 11f7 [channel: businesschannel] Received seekInfo (0xc0012a6680) start: > stop: > from 172.18.0.9:40124" +"2020-10-14 19:02:04.218 UTC [fsblkstorage] Next -> DEBU 11f8 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:04.218 UTC [fsblkstorage] newBlockfileStream -> DEBU 11f9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +"2020-10-14 19:02:04.223 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fa Remaining bytes=[4009], Going to peek [8] bytes" +"2020-10-14 19:02:04.227 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fb Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +"2020-10-14 19:02:04.227 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11fc blockbytes [4007] read from file [0]" +"2020-10-14 19:02:04.227 UTC [common.deliver] deliverBlocks -> DEBU 11fd [channel: businesschannel] Delivering block [5] for (0xc0012a6680) for 172.18.0.9:40124" +"2020-10-14 19:02:04.228 UTC [common.deliver] deliverBlocks -> DEBU 11fe [channel: businesschannel] Done delivering to 172.18.0.9:40124 for (0xc0012a6680)" +"2020-10-14 19:02:04.228 UTC [common.deliver] Handle -> DEBU 11ff Waiting for new SeekInfo from 172.18.0.9:40124" +"2020-10-14 19:02:04.228 UTC [common.deliver] Handle -> DEBU 1200 Attempting to read seek info message from 172.18.0.9:40124" +"2020-10-14 19:02:04.230 UTC [policies] Evaluate -> DEBU 1201 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:04.230 UTC [policies] Evaluate -> DEBU 1202 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1203 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1204 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.231 UTC [policies] Evaluate -> DEBU 1205 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:04.231 UTC [cauthdsl] func1 -> DEBU 1206 0xc000c8b1d0 gate 1602702124231586900 evaluation starts" +"2020-10-14 19:02:04.231 UTC [cauthdsl] func2 -> DEBU 1207 0xc000c8b1d0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 1208 0xc000c8b1d0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 1209 0xc000c8b1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:04.232 UTC [cauthdsl] func2 -> DEBU 120a 0xc000c8b1d0 principal evaluation fails" +"2020-10-14 19:02:04.233 UTC [cauthdsl] func1 -> DEBU 120b 0xc000c8b1d0 gate 1602702124231586900 evaluation fails" +"2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.233 UTC [policies] Evaluate -> DEBU 120e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:04.234 UTC [cauthdsl] func1 -> DEBU 120f 0xc0009c8030 gate 1602702124234130400 evaluation starts" +"2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1210 0xc0009c8030 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1211 0xc0009c8030 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.234 UTC [cauthdsl] func2 -> DEBU 1212 0xc0009c8030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:04.235 UTC [cauthdsl] func2 -> DEBU 1213 0xc0009c8030 principal evaluation fails" +"2020-10-14 19:02:04.235 UTC [cauthdsl] func1 -> DEBU 1214 0xc0009c8030 gate 1602702124234130400 evaluation fails" +"2020-10-14 19:02:04.235 UTC [policies] Evaluate -> DEBU 1215 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1216 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.236 UTC [policies] func1 -> DEBU 1217 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1218 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 1219 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 121a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:04.236 UTC [policies] Evaluate -> DEBU 121b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.237 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:04.238 UTC [cauthdsl] func1 -> DEBU 121d 0xc0009c8ee0 gate 1602702124238273600 evaluation starts" +"2020-10-14 19:02:04.238 UTC [cauthdsl] func2 -> DEBU 121e 0xc0009c8ee0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.238 UTC [cauthdsl] func2 -> DEBU 121f 0xc0009c8ee0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.239 UTC [cauthdsl] func2 -> DEBU 1220 0xc0009c8ee0 principal matched by identity 0" +"2020-10-14 19:02:04.239 UTC [msp.identity] Verify -> DEBU 1221 Verify: digest = 00000000 67 6d ee 9a 46 c2 1a 09 7f 77 d3 ab 4d 4e 2b e1 |gm..F....w..MN+.| +00000010 96 14 0f 8e eb ce 79 75 c6 bb aa 8a f5 1d a2 12 |......yu........|" +"2020-10-14 19:02:04.239 UTC [msp.identity] Verify -> DEBU 1222 Verify: sig = 00000000 30 45 02 21 00 9e ce 11 d3 0d 93 d5 86 2a 11 7a |0E.!.........*.z| +00000010 c5 42 e9 42 61 d3 81 4d 2e b0 b3 9d 47 bc e3 d1 |.B.Ba..M....G...| +00000020 14 3e aa b0 db 02 20 58 4d 24 52 80 f0 63 42 dd |.>.... XM$R..cB.| +00000030 90 3f 3e 76 16 4f 2f 28 5f ce 96 94 c2 69 40 ab |.?>v.O/(_....i@.| +00000040 a4 3f 62 10 99 d5 02 |.?b....|" +"2020-10-14 19:02:04.239 UTC [cauthdsl] func2 -> DEBU 1223 0xc0009c8ee0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:04.240 UTC [cauthdsl] func1 -> DEBU 1224 0xc0009c8ee0 gate 1602702124238273600 evaluation succeeds" +"2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1225 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1226 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1227 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.240 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.241 UTC [policies] Evaluate -> DEBU 1229 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:04.241 UTC [policies] Evaluate -> DEBU 122a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:04.241 UTC [common.deliver] deliverBlocks -> DEBU 122b [channel: businesschannel] Received seekInfo (0xc00132a280) start: > stop: > from 172.18.0.9:40124" +"2020-10-14 19:02:04.241 UTC [fsblkstorage] Next -> DEBU 122c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:04.242 UTC [fsblkstorage] newBlockfileStream -> DEBU 122d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +"2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e Remaining bytes=[40748], Going to peek [8] bytes" +"2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122f Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +"2020-10-14 19:02:04.242 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1230 blockbytes [28172] read from file [0]" +"2020-10-14 19:02:04.243 UTC [common.deliver] deliverBlocks -> DEBU 1231 [channel: businesschannel] Delivering block [2] for (0xc00132a280) for 172.18.0.9:40124" +"2020-10-14 19:02:04.243 UTC [common.deliver] deliverBlocks -> DEBU 1232 [channel: businesschannel] Done delivering to 172.18.0.9:40124 for (0xc00132a280)" +"2020-10-14 19:02:04.243 UTC [common.deliver] Handle -> DEBU 1233 Waiting for new SeekInfo from 172.18.0.9:40124" +"2020-10-14 19:02:04.243 UTC [common.deliver] Handle -> DEBU 1234 Attempting to read seek info message from 172.18.0.9:40124" +"2020-10-14 19:02:04.257 UTC [common.deliver] Handle -> WARN 1235 Error reading from 172.18.0.9:40124: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:04.257 UTC [orderer.common.server] func1 -> DEBU 1236 Closing Deliver stream" +"2020-10-14 19:02:04.257 UTC [comm.grpc.server] 1 -> INFO 1237 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40124 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.7313ms +"2020-10-14 19:02:04.259 UTC [grpc] infof -> DEBU 1238 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:04.399 UTC [orderer.common.server] Deliver -> DEBU 1239 Starting new Deliver handler" +"2020-10-14 19:02:04.399 UTC [common.deliver] Handle -> DEBU 123a Starting new deliver loop for 172.18.0.9:40126" +"2020-10-14 19:02:04.399 UTC [common.deliver] Handle -> DEBU 123b Attempting to read seek info message from 172.18.0.9:40126" +"2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 123f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.400 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:04.401 UTC [cauthdsl] func1 -> DEBU 1241 0xc000d4e8e0 gate 1602702124401135800 evaluation starts" +"2020-10-14 19:02:04.401 UTC [cauthdsl] func2 -> DEBU 1242 0xc000d4e8e0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.401 UTC [cauthdsl] func2 -> DEBU 1243 0xc000d4e8e0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.402 UTC [cauthdsl] func2 -> DEBU 1244 0xc000d4e8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:04.402 UTC [cauthdsl] func2 -> DEBU 1245 0xc000d4e8e0 principal evaluation fails" +"2020-10-14 19:02:04.402 UTC [cauthdsl] func1 -> DEBU 1246 0xc000d4e8e0 gate 1602702124401135800 evaluation fails" +"2020-10-14 19:02:04.402 UTC [policies] Evaluate -> DEBU 1247 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.403 UTC [policies] Evaluate -> DEBU 1248 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.403 UTC [policies] Evaluate -> DEBU 1249 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:04.403 UTC [cauthdsl] func1 -> DEBU 124a 0xc000d81080 gate 1602702124403894200 evaluation starts" +"2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124b 0xc000d81080 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124c 0xc000d81080 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124d 0xc000d81080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:04.404 UTC [cauthdsl] func2 -> DEBU 124e 0xc000d81080 principal evaluation fails" +"2020-10-14 19:02:04.405 UTC [cauthdsl] func1 -> DEBU 124f 0xc000d81080 gate 1602702124403894200 evaluation fails" +"2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1250 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1251 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.405 UTC [policies] func1 -> DEBU 1252 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1253 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:04.405 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1255 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1256 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.406 UTC [policies] Evaluate -> DEBU 1257 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:04.406 UTC [cauthdsl] func1 -> DEBU 1258 0xc000d81ff0 gate 1602702124406621400 evaluation starts" +"2020-10-14 19:02:04.406 UTC [cauthdsl] func2 -> DEBU 1259 0xc000d81ff0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.406 UTC [cauthdsl] func2 -> DEBU 125a 0xc000d81ff0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.407 UTC [cauthdsl] func2 -> DEBU 125b 0xc000d81ff0 principal matched by identity 0" +"2020-10-14 19:02:04.407 UTC [msp.identity] Verify -> DEBU 125c Verify: digest = 00000000 fc a5 8d ed 42 96 b3 6a b7 62 4f b9 13 a9 bd ce |....B..j.bO.....| +00000010 13 59 82 e4 05 74 9b 80 5e 3e 83 0c ba 8a 2c 26 |.Y...t..^>....,&|" +"2020-10-14 19:02:04.407 UTC [msp.identity] Verify -> DEBU 125d Verify: sig = 00000000 30 45 02 21 00 a4 61 1c 68 bc ef c0 25 20 3d f0 |0E.!..a.h...% =.| +00000010 5a f4 64 8e 48 b6 b5 c4 c9 e0 51 ad 4c 2b cc 72 |Z.d.H.....Q.L+.r| +00000020 f1 50 93 2d 9e 02 20 11 7c 21 3b b0 bf 4d ce cb |.P.-.. .|!;..M..| +00000030 9b 0b e0 9b f3 b8 a7 23 87 2c 63 51 39 74 83 a2 |.......#.,cQ9t..| +00000040 9e 8f 66 35 3a b1 01 |..f5:..|" +"2020-10-14 19:02:04.408 UTC [cauthdsl] func2 -> DEBU 125e 0xc000d81ff0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:04.408 UTC [cauthdsl] func1 -> DEBU 125f 0xc000d81ff0 gate 1602702124406621400 evaluation succeeds" +"2020-10-14 19:02:04.408 UTC [policies] Evaluate -> DEBU 1260 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.408 UTC [policies] Evaluate -> DEBU 1261 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1262 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1263 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1264 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:04.409 UTC [policies] Evaluate -> DEBU 1265 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:04.409 UTC [common.deliver] deliverBlocks -> DEBU 1266 [channel: businesschannel] Received seekInfo (0xc00132a5c0) start: > stop: > from 172.18.0.9:40126" +"2020-10-14 19:02:04.410 UTC [fsblkstorage] Next -> DEBU 1267 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:04.410 UTC [fsblkstorage] newBlockfileStream -> DEBU 1268 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:04.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1269 Remaining bytes=[97389], Going to peek [8] bytes" +"2020-10-14 19:02:04.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126a Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:04.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126b blockbytes [28471] read from file [0]" +"2020-10-14 19:02:04.411 UTC [common.deliver] deliverBlocks -> DEBU 126c [channel: businesschannel] Delivering block [0] for (0xc00132a5c0) for 172.18.0.9:40126" +"2020-10-14 19:02:04.412 UTC [common.deliver] deliverBlocks -> DEBU 126d [channel: businesschannel] Done delivering to 172.18.0.9:40126 for (0xc00132a5c0)" +"2020-10-14 19:02:04.412 UTC [common.deliver] Handle -> DEBU 126e Waiting for new SeekInfo from 172.18.0.9:40126" +"2020-10-14 19:02:04.412 UTC [common.deliver] Handle -> DEBU 126f Attempting to read seek info message from 172.18.0.9:40126" +"2020-10-14 19:02:04.421 UTC [common.deliver] Handle -> WARN 1270 Error reading from 172.18.0.9:40126: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:04.421 UTC [orderer.common.server] func1 -> DEBU 1271 Closing Deliver stream" +"2020-10-14 19:02:04.421 UTC [comm.grpc.server] 1 -> INFO 1272 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40126 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.6929ms +"2020-10-14 19:02:04.422 UTC [grpc] infof -> DEBU 1273 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:04.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1274 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:04.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1275 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-10-14 19:02:04.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1276 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.4µs " +"2020-10-14 19:02:04.597 UTC [orderer.common.server] Deliver -> DEBU 1277 Starting new Deliver handler" +"2020-10-14 19:02:04.597 UTC [common.deliver] Handle -> DEBU 1278 Starting new deliver loop for 172.18.0.9:40128" +"2020-10-14 19:02:04.597 UTC [common.deliver] Handle -> DEBU 1279 Attempting to read seek info message from 172.18.0.9:40128" +"2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.598 UTC [policies] Evaluate -> DEBU 127e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:04.598 UTC [cauthdsl] func1 -> DEBU 127f 0xc000ccc030 gate 1602702124598965400 evaluation starts" +"2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1280 0xc000ccc030 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1281 0xc000ccc030 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1282 0xc000ccc030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:04.599 UTC [cauthdsl] func2 -> DEBU 1283 0xc000ccc030 principal evaluation fails" +"2020-10-14 19:02:04.600 UTC [cauthdsl] func1 -> DEBU 1284 0xc000ccc030 gate 1602702124598965400 evaluation fails" +"2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1285 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1286 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.601 UTC [policies] Evaluate -> DEBU 1287 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:04.602 UTC [cauthdsl] func1 -> DEBU 1288 0xc000cccb90 gate 1602702124602155300 evaluation starts" +"2020-10-14 19:02:04.602 UTC [cauthdsl] func2 -> DEBU 1289 0xc000cccb90 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.602 UTC [cauthdsl] func2 -> DEBU 128a 0xc000cccb90 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.603 UTC [cauthdsl] func2 -> DEBU 128b 0xc000cccb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:04.603 UTC [cauthdsl] func2 -> DEBU 128c 0xc000cccb90 principal evaluation fails" +"2020-10-14 19:02:04.603 UTC [cauthdsl] func1 -> DEBU 128d 0xc000cccb90 gate 1602702124602155300 evaluation fails" +"2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 128e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 128f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.604 UTC [policies] func1 -> DEBU 1290 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:04.604 UTC [policies] Evaluate -> DEBU 1291 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1292 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.605 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:04.606 UTC [cauthdsl] func1 -> DEBU 1296 0xc000ccdab0 gate 1602702124606120200 evaluation starts" +"2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1297 0xc000ccdab0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1298 0xc000ccdab0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.606 UTC [cauthdsl] func2 -> DEBU 1299 0xc000ccdab0 principal matched by identity 0" +"2020-10-14 19:02:04.607 UTC [msp.identity] Verify -> DEBU 129a Verify: digest = 00000000 2d 8e 4e e4 39 25 dd 6d ff 2a 1d 86 9a 81 57 44 |-.N.9%.m.*....WD| +00000010 8e 71 b4 69 6e 3b 58 82 af 4b 5e 56 4a 32 34 79 |.q.in;X..K^VJ24y|" +"2020-10-14 19:02:04.607 UTC [msp.identity] Verify -> DEBU 129b Verify: sig = 00000000 30 44 02 20 37 db 91 58 94 0d d4 75 49 d3 12 cb |0D. 7..X...uI...| +00000010 93 22 f6 58 22 01 28 9f 40 6c 77 39 f0 80 27 be |.".X".(.@lw9..'.| +00000020 be 33 32 1c 02 20 7a 7d e4 7c ce 4e 57 c3 fb 03 |.32.. z}.|.NW...| +00000030 b3 5c fa fa a4 a5 ba 17 f2 7f f4 96 05 7d b0 01 |.\...........}..| +00000040 a3 5b 30 ba 89 64 |.[0..d|" +"2020-10-14 19:02:04.607 UTC [cauthdsl] func2 -> DEBU 129c 0xc000ccdab0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:04.608 UTC [cauthdsl] func1 -> DEBU 129d 0xc000ccdab0 gate 1602702124606120200 evaluation succeeds" +"2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 129e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a0 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.608 UTC [policies] Evaluate -> DEBU 12a2 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:04.609 UTC [policies] Evaluate -> DEBU 12a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:04.609 UTC [common.deliver] deliverBlocks -> DEBU 12a4 [channel: businesschannel] Received seekInfo (0xc00132aa00) start: > stop: > from 172.18.0.9:40128" +"2020-10-14 19:02:04.609 UTC [fsblkstorage] Next -> DEBU 12a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:04.609 UTC [fsblkstorage] newBlockfileStream -> DEBU 12a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +"2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a7 Remaining bytes=[68915], Going to peek [8] bytes" +"2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a8 Returning blockbytes - length=[28164], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +"2020-10-14 19:02:04.610 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a9 blockbytes [28164] read from file [0]" +"2020-10-14 19:02:04.610 UTC [common.deliver] deliverBlocks -> DEBU 12aa [channel: businesschannel] Delivering block [1] for (0xc00132aa00) for 172.18.0.9:40128" +"2020-10-14 19:02:04.611 UTC [common.deliver] deliverBlocks -> DEBU 12ab [channel: businesschannel] Done delivering to 172.18.0.9:40128 for (0xc00132aa00)" +"2020-10-14 19:02:04.612 UTC [common.deliver] Handle -> DEBU 12ac Waiting for new SeekInfo from 172.18.0.9:40128" +"2020-10-14 19:02:04.612 UTC [common.deliver] Handle -> DEBU 12ad Attempting to read seek info message from 172.18.0.9:40128" +"2020-10-14 19:02:04.620 UTC [common.deliver] Handle -> WARN 12ae Error reading from 172.18.0.9:40128: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:04.621 UTC [orderer.common.server] func1 -> DEBU 12b0 Closing Deliver stream" +"2020-10-14 19:02:04.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b2 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +"2020-10-14 19:02:04.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b3 Sending msg of 28 bytes to 3 on channel businesschannel took 81.6µs" +"2020-10-14 19:02:04.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.7µs " +"2020-10-14 19:02:04.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.2µs " +"2020-10-14 19:02:04.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:04.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:04.622 UTC [comm.grpc.server] 1 -> INFO 12b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40128 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1538ms +"2020-10-14 19:02:04.621 UTC [grpc] infof -> DEBU 12af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:04.805 UTC [orderer.common.server] Deliver -> DEBU 12b8 Starting new Deliver handler" +"2020-10-14 19:02:04.805 UTC [common.deliver] Handle -> DEBU 12b9 Starting new deliver loop for 172.18.0.9:40130" +"2020-10-14 19:02:04.805 UTC [common.deliver] Handle -> DEBU 12ba Attempting to read seek info message from 172.18.0.9:40130" +"2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:04.806 UTC [policies] Evaluate -> DEBU 12be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.807 UTC [policies] Evaluate -> DEBU 12bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:04.807 UTC [cauthdsl] func1 -> DEBU 12c0 0xc0003db140 gate 1602702124807332600 evaluation starts" +"2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c1 0xc0003db140 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c2 0xc0003db140 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.807 UTC [cauthdsl] func2 -> DEBU 12c3 0xc0003db140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:04.808 UTC [cauthdsl] func2 -> DEBU 12c4 0xc0003db140 principal evaluation fails" +"2020-10-14 19:02:04.808 UTC [cauthdsl] func1 -> DEBU 12c5 0xc0003db140 gate 1602702124807332600 evaluation fails" +"2020-10-14 19:02:04.808 UTC [policies] Evaluate -> DEBU 12c6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.809 UTC [policies] Evaluate -> DEBU 12c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:04.809 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:04.809 UTC [cauthdsl] func1 -> DEBU 12c9 0xc0003dbe10 gate 1602702124809159200 evaluation starts" +"2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12ca 0xc0003dbe10 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12cb 0xc0003dbe10 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.809 UTC [cauthdsl] func2 -> DEBU 12cc 0xc0003dbe10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:04.810 UTC [cauthdsl] func2 -> DEBU 12cd 0xc0003dbe10 principal evaluation fails" +"2020-10-14 19:02:04.810 UTC [cauthdsl] func1 -> DEBU 12ce 0xc0003dbe10 gate 1602702124809159200 evaluation fails" +"2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12cf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:04.810 UTC [policies] func1 -> DEBU 12d1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:04.810 UTC [policies] Evaluate -> DEBU 12d2 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:04.811 UTC [policies] Evaluate -> DEBU 12d6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:04.811 UTC [cauthdsl] func1 -> DEBU 12d7 0xc00004ec80 gate 1602702124811471000 evaluation starts" +"2020-10-14 19:02:04.811 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00004ec80 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:04.811 UTC [cauthdsl] func2 -> DEBU 12d9 0xc00004ec80 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:04.812 UTC [cauthdsl] func2 -> DEBU 12da 0xc00004ec80 principal matched by identity 0" +"2020-10-14 19:02:04.812 UTC [msp.identity] Verify -> DEBU 12db Verify: digest = 00000000 d9 ec ad d4 fb 06 bf 53 5c cb b4 59 a3 1d 9c 43 |.......S\..Y...C| +00000010 59 45 af d8 c3 4f 88 dc e4 cc ec d7 07 5d 77 c2 |YE...O.......]w.|" +"2020-10-14 19:02:04.812 UTC [msp.identity] Verify -> DEBU 12dc Verify: sig = 00000000 30 44 02 20 6e 9d 90 11 63 9a e0 ea 7c 7c a9 2c |0D. n...c...||.,| +00000010 e0 f4 c6 63 a8 7e e4 77 c3 fb 4e bf e7 35 ef f9 |...c.~.w..N..5..| +00000020 ff 1b 8f f9 02 20 53 2f 04 50 df 30 22 13 81 97 |..... S/.P.0"...| +00000030 97 cb 12 26 e7 6f e6 b0 f5 ef cf 57 f7 40 e9 03 |...&.o.....W.@..| +00000040 22 58 34 01 f0 4b |"X4..K|" +"2020-10-14 19:02:04.812 UTC [cauthdsl] func2 -> DEBU 12dd 0xc00004ec80 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:04.812 UTC [cauthdsl] func1 -> DEBU 12de 0xc00004ec80 gate 1602702124811471000 evaluation succeeds" +"2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12df Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e1 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:04.813 UTC [policies] Evaluate -> DEBU 12e3 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:04.814 UTC [policies] Evaluate -> DEBU 12e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:04.814 UTC [common.deliver] deliverBlocks -> DEBU 12e5 [channel: businesschannel] Received seekInfo (0xc000cb0b00) start: > stop: > from 172.18.0.9:40130" +"2020-10-14 19:02:04.814 UTC [fsblkstorage] Next -> DEBU 12e6 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:04.814 UTC [fsblkstorage] newBlockfileStream -> DEBU 12e7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +"2020-10-14 19:02:04.814 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e8 Remaining bytes=[40748], Going to peek [8] bytes" +"2020-10-14 19:02:04.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12e9 Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +"2020-10-14 19:02:04.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ea blockbytes [28172] read from file [0]" +"2020-10-14 19:02:04.815 UTC [common.deliver] deliverBlocks -> DEBU 12eb [channel: businesschannel] Delivering block [2] for (0xc000cb0b00) for 172.18.0.9:40130" +"2020-10-14 19:02:04.816 UTC [common.deliver] deliverBlocks -> DEBU 12ec [channel: businesschannel] Done delivering to 172.18.0.9:40130 for (0xc000cb0b00)" +"2020-10-14 19:02:04.816 UTC [common.deliver] Handle -> DEBU 12ed Waiting for new SeekInfo from 172.18.0.9:40130" +"2020-10-14 19:02:04.816 UTC [common.deliver] Handle -> DEBU 12ee Attempting to read seek info message from 172.18.0.9:40130" +"2020-10-14 19:02:04.824 UTC [common.deliver] Handle -> WARN 12ef Error reading from 172.18.0.9:40130: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:04.824 UTC [grpc] infof -> DEBU 12f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:04.824 UTC [orderer.common.server] func1 -> DEBU 12f1 Closing Deliver stream" +"2020-10-14 19:02:04.824 UTC [comm.grpc.server] 1 -> INFO 12f2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40130 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.4216ms +"2020-10-14 19:02:05.007 UTC [orderer.common.server] Deliver -> DEBU 12f3 Starting new Deliver handler" +"2020-10-14 19:02:05.008 UTC [common.deliver] Handle -> DEBU 12f4 Starting new deliver loop for 172.18.0.9:40132" +"2020-10-14 19:02:05.009 UTC [common.deliver] Handle -> DEBU 12f5 Attempting to read seek info message from 172.18.0.9:40132" +"2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.010 UTC [policies] Evaluate -> DEBU 12fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:05.011 UTC [cauthdsl] func1 -> DEBU 12fb 0xc0002ac040 gate 1602702125011020900 evaluation starts" +"2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fc 0xc0002ac040 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fd 0xc0002ac040 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.011 UTC [cauthdsl] func2 -> DEBU 12fe 0xc0002ac040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:05.012 UTC [cauthdsl] func2 -> DEBU 12ff 0xc0002ac040 principal evaluation fails" +"2020-10-14 19:02:05.012 UTC [cauthdsl] func1 -> DEBU 1300 0xc0002ac040 gate 1602702125011020900 evaluation fails" +"2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1301 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.012 UTC [policies] Evaluate -> DEBU 1303 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func1 -> DEBU 1304 0xc0002ad190 gate 1602702125013066000 evaluation starts" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1305 0xc0002ad190 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1306 0xc0002ad190 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1307 0xc0002ad190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func2 -> DEBU 1308 0xc0002ad190 principal evaluation fails" +"2020-10-14 19:02:05.013 UTC [cauthdsl] func1 -> DEBU 1309 0xc0002ad190 gate 1602702125013066000 evaluation fails" +"2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.014 UTC [policies] func1 -> DEBU 130c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:05.014 UTC [policies] Evaluate -> DEBU 130d Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 130e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 130f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:05.015 UTC [policies] Evaluate -> DEBU 1310 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.016 UTC [policies] Evaluate -> DEBU 1311 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:05.016 UTC [cauthdsl] func1 -> DEBU 1312 0xc0001b4ce0 gate 1602702125016260200 evaluation starts" +"2020-10-14 19:02:05.016 UTC [cauthdsl] func2 -> DEBU 1313 0xc0001b4ce0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.016 UTC [cauthdsl] func2 -> DEBU 1314 0xc0001b4ce0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.018 UTC [cauthdsl] func2 -> DEBU 1315 0xc0001b4ce0 principal matched by identity 0" +"2020-10-14 19:02:05.019 UTC [msp.identity] Verify -> DEBU 1316 Verify: digest = 00000000 21 91 21 1f 06 2b dd 19 e5 8d 2b 2c 9f 2b 96 ed |!.!..+....+,.+..| +00000010 37 46 74 8f 48 5d 87 28 8e 0a 40 1e 22 f1 20 80 |7Ft.H].(..@.". .|" +"2020-10-14 19:02:05.019 UTC [msp.identity] Verify -> DEBU 1317 Verify: sig = 00000000 30 45 02 21 00 db 92 75 18 d5 05 68 78 0d 5c 3c |0E.!...u...hx.\<| +00000010 57 36 15 3b 24 c9 f7 00 7b b3 8c 6e 9a e3 ec 7c |W6.;$...{..n...|| +00000020 9d 0e ed be ce 02 20 17 bf f4 56 70 d3 4c 6e 36 |...... ...Vp.Ln6| +00000030 93 dc 81 d8 66 cb 9b 83 0e 39 0e be 15 cf ac fa |....f....9......| +00000040 de fa 8a 0a 78 e1 10 |....x..|" +"2020-10-14 19:02:05.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1318 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:05.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 131a Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +"2020-10-14 19:02:05.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 131b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +"2020-10-14 19:02:05.020 UTC [cauthdsl] func2 -> DEBU 1319 0xc0001b4ce0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:05.021 UTC [cauthdsl] func1 -> DEBU 131c 0xc0001b4ce0 gate 1602702125016260200 evaluation succeeds" +"2020-10-14 19:02:05.021 UTC [policies] Evaluate -> DEBU 131d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 131f Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.022 UTC [policies] Evaluate -> DEBU 1320 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.023 UTC [policies] Evaluate -> DEBU 1321 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:05.023 UTC [policies] Evaluate -> DEBU 1322 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:05.023 UTC [common.deliver] deliverBlocks -> DEBU 1323 [channel: businesschannel] Received seekInfo (0xc00132b200) start: > stop: > from 172.18.0.9:40132" +"2020-10-14 19:02:05.023 UTC [fsblkstorage] Next -> DEBU 1324 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:05.024 UTC [fsblkstorage] newBlockfileStream -> DEBU 1325 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84816]" +"2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1326 Remaining bytes=[12573], Going to peek [8] bytes" +"2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1327 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84816], bytesOffset=[84818]}" +"2020-10-14 19:02:05.024 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1328 blockbytes [4550] read from file [0]" +"2020-10-14 19:02:05.025 UTC [common.deliver] deliverBlocks -> DEBU 1329 [channel: businesschannel] Delivering block [3] for (0xc00132b200) for 172.18.0.9:40132" +"2020-10-14 19:02:05.025 UTC [common.deliver] deliverBlocks -> DEBU 132a [channel: businesschannel] Done delivering to 172.18.0.9:40132 for (0xc00132b200)" +"2020-10-14 19:02:05.026 UTC [common.deliver] Handle -> DEBU 132b Waiting for new SeekInfo from 172.18.0.9:40132" +"2020-10-14 19:02:05.026 UTC [common.deliver] Handle -> DEBU 132c Attempting to read seek info message from 172.18.0.9:40132" +"2020-10-14 19:02:05.032 UTC [common.deliver] Handle -> WARN 132d Error reading from 172.18.0.9:40132: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:05.033 UTC [orderer.common.server] func1 -> DEBU 132f Closing Deliver stream" +"2020-10-14 19:02:05.033 UTC [comm.grpc.server] 1 -> INFO 1330 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40132 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.5752ms +"2020-10-14 19:02:05.033 UTC [grpc] infof -> DEBU 132e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:05.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1331 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2020-10-14 19:02:05.129 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1332 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-10-14 19:02:05.129 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1333 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174µs " +"2020-10-14 19:02:05.130 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1334 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.5µs " +"2020-10-14 19:02:05.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1335 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:05.140 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1336 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:05.268 UTC [orderer.common.server] Deliver -> DEBU 1337 Starting new Deliver handler" +"2020-10-14 19:02:05.269 UTC [common.deliver] Handle -> DEBU 1338 Starting new deliver loop for 172.18.0.9:40134" +"2020-10-14 19:02:05.269 UTC [common.deliver] Handle -> DEBU 1339 Attempting to read seek info message from 172.18.0.9:40134" +"2020-10-14 19:02:05.271 UTC [policies] Evaluate -> DEBU 133a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.272 UTC [policies] Evaluate -> DEBU 133e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:05.273 UTC [cauthdsl] func1 -> DEBU 133f 0xc0003626d0 gate 1602702125273228700 evaluation starts" +"2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1340 0xc0003626d0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1341 0xc0003626d0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.273 UTC [cauthdsl] func2 -> DEBU 1342 0xc0003626d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:05.274 UTC [cauthdsl] func2 -> DEBU 1343 0xc0003626d0 principal evaluation fails" +"2020-10-14 19:02:05.274 UTC [cauthdsl] func1 -> DEBU 1344 0xc0003626d0 gate 1602702125273228700 evaluation fails" +"2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1345 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1346 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.274 UTC [policies] Evaluate -> DEBU 1347 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:05.274 UTC [cauthdsl] func1 -> DEBU 1348 0xc000362fe0 gate 1602702125274882200 evaluation starts" +"2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 1349 0xc000362fe0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134a 0xc000362fe0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134b 0xc000362fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:05.275 UTC [cauthdsl] func2 -> DEBU 134c 0xc000362fe0 principal evaluation fails" +"2020-10-14 19:02:05.275 UTC [cauthdsl] func1 -> DEBU 134d 0xc000362fe0 gate 1602702125274882200 evaluation fails" +"2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 134e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 134f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.276 UTC [policies] func1 -> DEBU 1350 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 1351 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:05.276 UTC [policies] Evaluate -> DEBU 1352 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:05.277 UTC [policies] Evaluate -> DEBU 1353 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:05.277 UTC [policies] Evaluate -> DEBU 1354 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.278 UTC [policies] Evaluate -> DEBU 1355 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:05.278 UTC [cauthdsl] func1 -> DEBU 1356 0xc000363cd0 gate 1602702125278178400 evaluation starts" +"2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1357 0xc000363cd0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1358 0xc000363cd0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.278 UTC [cauthdsl] func2 -> DEBU 1359 0xc000363cd0 principal matched by identity 0" +"2020-10-14 19:02:05.279 UTC [msp.identity] Verify -> DEBU 135a Verify: digest = 00000000 c5 91 88 57 83 e7 1b df 9c fc 6e 4e 1b ed 13 a2 |...W......nN....| +00000010 d3 92 c4 0f b2 d2 44 e7 e4 b4 82 44 0b 07 50 76 |......D....D..Pv|" +"2020-10-14 19:02:05.279 UTC [msp.identity] Verify -> DEBU 135b Verify: sig = 00000000 30 44 02 20 73 d4 5a 2f 50 e2 52 ea e9 36 e4 14 |0D. s.Z/P.R..6..| +00000010 43 0b 55 48 15 e0 c2 59 2d 4d ed 33 b6 77 b9 af |C.UH...Y-M.3.w..| +00000020 eb c6 ab 1a 02 20 73 91 ec 8d 0c 5e be 2b 6e 1c |..... s....^.+n.| +00000030 62 2c c9 f0 52 d4 d7 4d fb 29 26 74 fc 86 9f 3b |b,..R..M.)&t...;| +00000040 6f 00 71 0f 50 3d |o.q.P=|" +"2020-10-14 19:02:05.279 UTC [cauthdsl] func2 -> DEBU 135c 0xc000363cd0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:05.279 UTC [cauthdsl] func1 -> DEBU 135d 0xc000363cd0 gate 1602702125278178400 evaluation succeeds" +"2020-10-14 19:02:05.279 UTC [policies] Evaluate -> DEBU 135e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1360 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1361 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1362 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:05.280 UTC [policies] Evaluate -> DEBU 1363 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:05.281 UTC [common.deliver] deliverBlocks -> DEBU 1364 [channel: businesschannel] Received seekInfo (0xc00132b900) start: > stop: > from 172.18.0.9:40134" +"2020-10-14 19:02:05.281 UTC [fsblkstorage] Next -> DEBU 1365 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:05.281 UTC [fsblkstorage] newBlockfileStream -> DEBU 1366 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89368]" +"2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1367 Remaining bytes=[8021], Going to peek [8] bytes" +"2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1368 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89368], bytesOffset=[89370]}" +"2020-10-14 19:02:05.282 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1369 blockbytes [4010] read from file [0]" +"2020-10-14 19:02:05.283 UTC [common.deliver] deliverBlocks -> DEBU 136a [channel: businesschannel] Delivering block [4] for (0xc00132b900) for 172.18.0.9:40134" +"2020-10-14 19:02:05.283 UTC [common.deliver] deliverBlocks -> DEBU 136b [channel: businesschannel] Done delivering to 172.18.0.9:40134 for (0xc00132b900)" +"2020-10-14 19:02:05.285 UTC [common.deliver] Handle -> DEBU 136c Waiting for new SeekInfo from 172.18.0.9:40134" +"2020-10-14 19:02:05.285 UTC [common.deliver] Handle -> DEBU 136d Attempting to read seek info message from 172.18.0.9:40134" +"2020-10-14 19:02:05.295 UTC [common.deliver] Handle -> WARN 136e Error reading from 172.18.0.9:40134: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:05.297 UTC [orderer.common.server] func1 -> DEBU 1370 Closing Deliver stream" +"2020-10-14 19:02:05.297 UTC [comm.grpc.server] 1 -> INFO 1371 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40134 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6387ms +"2020-10-14 19:02:05.296 UTC [grpc] infof -> DEBU 136f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:05.507 UTC [orderer.common.server] Deliver -> DEBU 1372 Starting new Deliver handler" +"2020-10-14 19:02:05.507 UTC [common.deliver] Handle -> DEBU 1373 Starting new deliver loop for 172.18.0.9:40136" +"2020-10-14 19:02:05.508 UTC [common.deliver] Handle -> DEBU 1374 Attempting to read seek info message from 172.18.0.9:40136" +"2020-10-14 19:02:05.508 UTC [policies] Evaluate -> DEBU 1375 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1376 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1377 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1378 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.509 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-10-14 19:02:05.510 UTC [cauthdsl] func1 -> DEBU 137a 0xc000541fd0 gate 1602702125510303600 evaluation starts" +"2020-10-14 19:02:05.510 UTC [cauthdsl] func2 -> DEBU 137b 0xc000541fd0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.510 UTC [cauthdsl] func2 -> DEBU 137c 0xc000541fd0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.511 UTC [cauthdsl] func2 -> DEBU 137d 0xc000541fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-10-14 19:02:05.511 UTC [cauthdsl] func2 -> DEBU 137e 0xc000541fd0 principal evaluation fails" +"2020-10-14 19:02:05.511 UTC [cauthdsl] func1 -> DEBU 137f 0xc000541fd0 gate 1602702125510303600 evaluation fails" +"2020-10-14 19:02:05.511 UTC [policies] Evaluate -> DEBU 1380 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.512 UTC [policies] Evaluate -> DEBU 1381 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:05.512 UTC [policies] Evaluate -> DEBU 1382 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-10-14 19:02:05.512 UTC [cauthdsl] func1 -> DEBU 1383 0xc000554a70 gate 1602702125512531800 evaluation starts" +"2020-10-14 19:02:05.512 UTC [cauthdsl] func2 -> DEBU 1384 0xc000554a70 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1385 0xc000554a70 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1386 0xc000554a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-10-14 19:02:05.513 UTC [cauthdsl] func2 -> DEBU 1387 0xc000554a70 principal evaluation fails" +"2020-10-14 19:02:05.513 UTC [cauthdsl] func1 -> DEBU 1388 0xc000554a70 gate 1602702125512531800 evaluation fails" +"2020-10-14 19:02:05.514 UTC [policies] Evaluate -> DEBU 1389 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.514 UTC [policies] Evaluate -> DEBU 138a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:05.514 UTC [policies] func1 -> DEBU 138b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138c Signature set did not satisfy policy /Channel/Application/Readers" +"2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-10-14 19:02:05.515 UTC [policies] Evaluate -> DEBU 138e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:05.516 UTC [policies] Evaluate -> DEBU 138f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.516 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:05.518 UTC [cauthdsl] func1 -> DEBU 1392 0xc000555a00 gate 1602702125518070200 evaluation starts" +"2020-10-14 19:02:05.519 UTC [cauthdsl] func2 -> DEBU 1393 0xc000555a00 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1391 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:05.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1394 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2020-10-14 19:02:05.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1395 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.5µs " +"2020-10-14 19:02:05.519 UTC [cauthdsl] func2 -> DEBU 1396 0xc000555a00 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.522 UTC [cauthdsl] func2 -> DEBU 1397 0xc000555a00 principal matched by identity 0" +"2020-10-14 19:02:05.522 UTC [msp.identity] Verify -> DEBU 1398 Verify: digest = 00000000 fb 50 23 26 db 77 7b 92 01 e5 45 4f e8 5c e9 b8 |.P#&.w{...EO.\..| +00000010 86 fa bd 7c 91 8d 2c 58 0e 2d 67 42 3e e0 2a f9 |...|..,X.-gB>.*.|" +"2020-10-14 19:02:05.523 UTC [msp.identity] Verify -> DEBU 1399 Verify: sig = 00000000 30 44 02 20 08 1d 93 b3 0c 11 70 9d 31 fe 20 bb |0D. ......p.1. .| +00000010 57 ed 2a 97 9e b0 7a 64 20 3e 9a 2e 3e 8f 84 2e |W.*...zd >..>...| +00000020 a3 28 8c ba 02 20 22 57 0b c5 04 bd 20 4c 19 36 |.(... "W.... L.6| +00000030 85 5f 85 e7 70 ab be 6c cd 76 64 d4 a9 0e d6 c9 |._..p..l.vd.....| +00000040 6a 98 d9 09 75 77 |j...uw|" +"2020-10-14 19:02:05.523 UTC [cauthdsl] func2 -> DEBU 139a 0xc000555a00 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:05.523 UTC [cauthdsl] func1 -> DEBU 139b 0xc000555a00 gate 1602702125518070200 evaluation succeeds" +"2020-10-14 19:02:05.523 UTC [policies] Evaluate -> DEBU 139c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.523 UTC [policies] Evaluate -> DEBU 139d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 139e Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 139f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 13a0 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:05.524 UTC [policies] Evaluate -> DEBU 13a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:05.524 UTC [common.deliver] deliverBlocks -> DEBU 13a2 [channel: businesschannel] Received seekInfo (0xc000d2a000) start: > stop: > from 172.18.0.9:40136" +"2020-10-14 19:02:05.524 UTC [fsblkstorage] Next -> DEBU 13a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-10-14 19:02:05.525 UTC [fsblkstorage] newBlockfileStream -> DEBU 13a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +"2020-10-14 19:02:05.525 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a5 Remaining bytes=[4009], Going to peek [8] bytes" +"2020-10-14 19:02:05.525 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a6 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +"2020-10-14 19:02:05.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a7 blockbytes [4007] read from file [0]" +"2020-10-14 19:02:05.526 UTC [common.deliver] deliverBlocks -> DEBU 13a8 [channel: businesschannel] Delivering block [5] for (0xc000d2a000) for 172.18.0.9:40136" +"2020-10-14 19:02:05.526 UTC [common.deliver] deliverBlocks -> DEBU 13a9 [channel: businesschannel] Done delivering to 172.18.0.9:40136 for (0xc000d2a000)" +"2020-10-14 19:02:05.527 UTC [common.deliver] Handle -> DEBU 13aa Waiting for new SeekInfo from 172.18.0.9:40136" +"2020-10-14 19:02:05.527 UTC [common.deliver] Handle -> DEBU 13ab Attempting to read seek info message from 172.18.0.9:40136" +"2020-10-14 19:02:05.534 UTC [common.deliver] Handle -> WARN 13ac Error reading from 172.18.0.9:40136: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:05.534 UTC [orderer.common.server] func1 -> DEBU 13ad Closing Deliver stream" +"2020-10-14 19:02:05.534 UTC [comm.grpc.server] 1 -> INFO 13ae streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40136 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3998ms +"2020-10-14 19:02:05.534 UTC [grpc] infof -> DEBU 13af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:05.626 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b0 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2020-10-14 19:02:05.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13b2 Sending msg of 28 bytes to 3 on channel businesschannel took 75.1µs" +"2020-10-14 19:02:05.628 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2020-10-14 19:02:05.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.9µs " +"2020-10-14 19:02:05.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:05.630 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:05.771 UTC [orderer.common.server] Deliver -> DEBU 13b6 Starting new Deliver handler" +"2020-10-14 19:02:05.772 UTC [common.deliver] Handle -> DEBU 13b7 Starting new deliver loop for 172.18.0.9:40138" +"2020-10-14 19:02:05.772 UTC [common.deliver] Handle -> DEBU 13b8 Attempting to read seek info message from 172.18.0.9:40138" +"2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.773 UTC [policies] Evaluate -> DEBU 13bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:05.774 UTC [policies] Evaluate -> DEBU 13bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:05.774 UTC [policies] Evaluate -> DEBU 13bd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:05.775 UTC [msp] DeserializeIdentity -> DEBU 13be Obtaining identity" +"2020-10-14 19:02:05.776 UTC [msp.identity] newIdentity -> DEBU 13bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-10-14 19:02:05.777 UTC [cauthdsl] func1 -> DEBU 13c0 0xc00056d8b0 gate 1602702125777222400 evaluation starts" +"2020-10-14 19:02:05.777 UTC [cauthdsl] func2 -> DEBU 13c1 0xc00056d8b0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:05.777 UTC [cauthdsl] func2 -> DEBU 13c2 0xc00056d8b0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:05.777 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13c3 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:02:05.777 UTC [msp] Validate -> DEBU 13c4 MSP OrdererMSP validating identity" +"2020-10-14 19:02:05.778 UTC [msp] getCertificationChain -> DEBU 13c5 MSP OrdererMSP getting certification chain" +"2020-10-14 19:02:05.778 UTC [cauthdsl] func2 -> DEBU 13c6 0xc00056d8b0 principal matched by identity 0" +"2020-10-14 19:02:05.778 UTC [msp.identity] Verify -> DEBU 13c7 Verify: digest = 00000000 81 5b 43 c2 4c 39 25 7c 7b 6a c7 b3 6e aa eb 11 |.[C.L9%|{j..n...| +00000010 b2 97 6e a3 e0 88 82 fb 09 0e 68 33 88 53 e0 5c |..n.......h3.S.\|" +"2020-10-14 19:02:05.779 UTC [msp.identity] Verify -> DEBU 13c8 Verify: sig = 00000000 30 45 02 21 00 94 52 9e 5a 3e 6f 49 ba 2c af 18 |0E.!..R.Z>oI.,..| +00000010 d4 ba da a7 bd df d9 3a 90 fa ce 57 0c 8f 80 dc |.......:...W....| +00000020 17 2e ae 91 c1 02 20 76 22 33 44 91 82 ed 9a 68 |...... v"3D....h| +00000030 77 f7 51 2c 8c ac 2f aa 63 c0 fa b4 9f c4 db 4d |w.Q,../.c......M| +00000040 8a 58 70 eb e4 59 3c |.Xp..Y<|" +"2020-10-14 19:02:05.779 UTC [cauthdsl] func2 -> DEBU 13c9 0xc00056d8b0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:05.780 UTC [cauthdsl] func1 -> DEBU 13ca 0xc00056d8b0 gate 1602702125777222400 evaluation succeeds" +"2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13cd Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.780 UTC [policies] Evaluate -> DEBU 13ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:05.781 UTC [policies] Evaluate -> DEBU 13cf Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:05.781 UTC [policies] Evaluate -> DEBU 13d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:05.781 UTC [common.deliver] deliverBlocks -> DEBU 13d1 [channel: testchainid] Received seekInfo (0xc000cb1a40) start: > stop: > from 172.18.0.9:40138" +"2020-10-14 19:02:05.781 UTC [fsblkstorage] Next -> DEBU 13d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:05.782 UTC [fsblkstorage] newBlockfileStream -> DEBU 13d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d4 Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d5 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:05.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d6 blockbytes [30405] read from file [0]" +"2020-10-14 19:02:05.783 UTC [common.deliver] deliverBlocks -> DEBU 13d7 [channel: testchainid] Delivering block [1] for (0xc000cb1a40) for 172.18.0.9:40138" +"2020-10-14 19:02:05.783 UTC [common.deliver] deliverBlocks -> DEBU 13d8 [channel: testchainid] Done delivering to 172.18.0.9:40138 for (0xc000cb1a40)" +"2020-10-14 19:02:05.784 UTC [common.deliver] Handle -> DEBU 13d9 Waiting for new SeekInfo from 172.18.0.9:40138" +"2020-10-14 19:02:05.784 UTC [common.deliver] Handle -> DEBU 13da Attempting to read seek info message from 172.18.0.9:40138" +"2020-10-14 19:02:05.793 UTC [common.deliver] Handle -> WARN 13db Error reading from 172.18.0.9:40138: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:05.794 UTC [orderer.common.server] func1 -> DEBU 13dd Closing Deliver stream" +"2020-10-14 19:02:05.793 UTC [grpc] infof -> DEBU 13dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:05.796 UTC [comm.grpc.server] 1 -> INFO 13de streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40138 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.6265ms +"2020-10-14 19:02:06.016 UTC [orderer.common.server] Deliver -> DEBU 13df Starting new Deliver handler" +"2020-10-14 19:02:06.018 UTC [common.deliver] Handle -> DEBU 13e1 Starting new deliver loop for 172.18.0.9:40140" +"2020-10-14 19:02:06.018 UTC [common.deliver] Handle -> DEBU 13e2 Attempting to read seek info message from 172.18.0.9:40140" +"2020-10-14 19:02:06.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13e0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:06.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13e3 Sending msg of 28 bytes to 3 on channel testchainid took 60µs" +"2020-10-14 19:02:06.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.8µs " +"2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.021 UTC [policies] Evaluate -> DEBU 13e9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:06.022 UTC [cauthdsl] func1 -> DEBU 13ea 0xc0009a7960 gate 1602702126022146900 evaluation starts" +"2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13eb 0xc0009a7960 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13ec 0xc0009a7960 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:06.022 UTC [cauthdsl] func2 -> DEBU 13ed 0xc0009a7960 principal matched by identity 0" +"2020-10-14 19:02:06.022 UTC [msp.identity] Verify -> DEBU 13ee Verify: digest = 00000000 9d bf cd 72 97 62 d8 33 37 5c 54 f8 71 c8 4a 76 |...r.b.37\T.q.Jv| +00000010 6f 9d 0f 15 f0 5d 05 64 62 73 a2 9f 65 5e 59 24 |o....].dbs..e^Y$|" +"2020-10-14 19:02:06.023 UTC [msp.identity] Verify -> DEBU 13ef Verify: sig = 00000000 30 45 02 21 00 fa b9 3b bf fa 02 f3 39 f4 0b 4b |0E.!...;....9..K| +00000010 bf bd c2 58 84 5e 0a 0b 18 6e 82 db 40 b1 8d 4c |...X.^...n..@..L| +00000020 81 92 70 18 90 02 20 76 38 1b de 8b ae a5 2e 93 |..p... v8.......| +00000030 0a 23 0d 45 49 1e 39 e7 b1 95 4d 3a eb 7e 12 51 |.#.EI.9...M:.~.Q| +00000040 26 d1 99 4c 3f 6c 8e |&..L?l.|" +"2020-10-14 19:02:06.023 UTC [cauthdsl] func2 -> DEBU 13f0 0xc0009a7960 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:06.023 UTC [cauthdsl] func1 -> DEBU 13f1 0xc0009a7960 gate 1602702126022146900 evaluation succeeds" +"2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.023 UTC [policies] Evaluate -> DEBU 13f4 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f6 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:06.024 UTC [policies] Evaluate -> DEBU 13f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:06.025 UTC [common.deliver] deliverBlocks -> DEBU 13f8 [channel: testchainid] Received seekInfo (0xc000cb1f40) start: > stop: > from 172.18.0.9:40140" +"2020-10-14 19:02:06.025 UTC [fsblkstorage] Next -> DEBU 13f9 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:06.025 UTC [fsblkstorage] newBlockfileStream -> DEBU 13fa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fb Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fc Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:06.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13fd blockbytes [30405] read from file [0]" +"2020-10-14 19:02:06.027 UTC [common.deliver] deliverBlocks -> DEBU 13fe [channel: testchainid] Delivering block [1] for (0xc000cb1f40) for 172.18.0.9:40140" +"2020-10-14 19:02:06.027 UTC [common.deliver] deliverBlocks -> DEBU 13ff [channel: testchainid] Done delivering to 172.18.0.9:40140 for (0xc000cb1f40)" +"2020-10-14 19:02:06.027 UTC [common.deliver] Handle -> DEBU 1400 Waiting for new SeekInfo from 172.18.0.9:40140" +"2020-10-14 19:02:06.028 UTC [common.deliver] Handle -> DEBU 1401 Attempting to read seek info message from 172.18.0.9:40140" +"2020-10-14 19:02:06.030 UTC [policies] Evaluate -> DEBU 1402 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1403 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1404 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1405 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.031 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:06.031 UTC [cauthdsl] func1 -> DEBU 1407 0xc0004b6b90 gate 1602702126031583800 evaluation starts" +"2020-10-14 19:02:06.031 UTC [cauthdsl] func2 -> DEBU 1408 0xc0004b6b90 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:06.031 UTC [cauthdsl] func2 -> DEBU 1409 0xc0004b6b90 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:06.032 UTC [cauthdsl] func2 -> DEBU 140a 0xc0004b6b90 principal matched by identity 0" +"2020-10-14 19:02:06.032 UTC [msp.identity] Verify -> DEBU 140b Verify: digest = 00000000 1b 6f 05 9f ed 2e 83 1f b9 16 0f 7c 9f e4 51 d3 |.o.........|..Q.| +00000010 6a 08 dc 52 35 46 ff 5f c8 ab 94 f4 e6 1a 69 5b |j..R5F._......i[|" +"2020-10-14 19:02:06.032 UTC [msp.identity] Verify -> DEBU 140c Verify: sig = 00000000 30 45 02 21 00 bf 89 37 76 62 b7 42 8b 58 73 64 |0E.!...7vb.B.Xsd| +00000010 b3 ef ba a0 4a da 84 87 32 f2 9a 75 d9 2b de 3e |....J...2..u.+.>| +00000020 0f ba 3d bc 67 02 20 02 76 18 59 85 ed b1 20 71 |..=.g. .v.Y... q| +00000030 ba 97 9c f0 44 ca bc 8c e0 dd 14 6c ab d9 45 32 |....D......l..E2| +00000040 3b 42 1a 98 25 9d 87 |;B..%..|" +"2020-10-14 19:02:06.032 UTC [cauthdsl] func2 -> DEBU 140d 0xc0004b6b90 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:06.032 UTC [cauthdsl] func1 -> DEBU 140e 0xc0004b6b90 gate 1602702126031583800 evaluation succeeds" +"2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.032 UTC [policies] Evaluate -> DEBU 1411 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1413 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:06.033 UTC [policies] Evaluate -> DEBU 1414 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:06.033 UTC [common.deliver] deliverBlocks -> DEBU 1415 [channel: testchainid] Received seekInfo (0xc000d2ad80) start: > stop: > from 172.18.0.9:40140" +"2020-10-14 19:02:06.033 UTC [fsblkstorage] Next -> DEBU 1416 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:06.034 UTC [fsblkstorage] newBlockfileStream -> DEBU 1417 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:06.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1418 Remaining bytes=[53338], Going to peek [8] bytes" +"2020-10-14 19:02:06.034 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1419 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:06.035 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 141a blockbytes [22927] read from file [0]" +"2020-10-14 19:02:06.035 UTC [common.deliver] deliverBlocks -> DEBU 141b [channel: testchainid] Delivering block [0] for (0xc000d2ad80) for 172.18.0.9:40140" +"2020-10-14 19:02:06.035 UTC [common.deliver] deliverBlocks -> DEBU 141c [channel: testchainid] Done delivering to 172.18.0.9:40140 for (0xc000d2ad80)" +"2020-10-14 19:02:06.036 UTC [common.deliver] Handle -> DEBU 141d Waiting for new SeekInfo from 172.18.0.9:40140" +"2020-10-14 19:02:06.036 UTC [common.deliver] Handle -> DEBU 141e Attempting to read seek info message from 172.18.0.9:40140" +"2020-10-14 19:02:06.043 UTC [common.deliver] Handle -> WARN 141f Error reading from 172.18.0.9:40140: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:06.043 UTC [orderer.common.server] func1 -> DEBU 1420 Closing Deliver stream" +"2020-10-14 19:02:06.044 UTC [comm.grpc.server] 1 -> INFO 1422 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7701ms +"2020-10-14 19:02:06.044 UTC [grpc] infof -> DEBU 1421 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:06.127 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1423 Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +"2020-10-14 19:02:06.128 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1424 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +"2020-10-14 19:02:06.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1425 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.2µs " +"2020-10-14 19:02:06.128 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1426 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.7µs " +"2020-10-14 19:02:06.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1427 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:06.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1428 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:06.240 UTC [orderer.common.server] Deliver -> DEBU 1429 Starting new Deliver handler" +"2020-10-14 19:02:06.240 UTC [common.deliver] Handle -> DEBU 142a Starting new deliver loop for 172.18.0.9:40142" +"2020-10-14 19:02:06.241 UTC [common.deliver] Handle -> DEBU 142b Attempting to read seek info message from 172.18.0.9:40142" +"2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.241 UTC [policies] Evaluate -> DEBU 142e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:06.242 UTC [policies] Evaluate -> DEBU 142f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.242 UTC [policies] Evaluate -> DEBU 1430 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:06.242 UTC [cauthdsl] func1 -> DEBU 1431 0xc000c70b80 gate 1602702126242457900 evaluation starts" +"2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1432 0xc000c70b80 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1433 0xc000c70b80 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:06.242 UTC [cauthdsl] func2 -> DEBU 1434 0xc000c70b80 principal matched by identity 0" +"2020-10-14 19:02:06.243 UTC [msp.identity] Verify -> DEBU 1435 Verify: digest = 00000000 4b df 64 a5 7c af 33 01 65 e6 e1 46 15 93 a4 16 |K.d.|.3.e..F....| +00000010 b4 77 b3 ae 88 f7 8c 02 40 7d c4 ad f7 de c3 7d |.w......@}.....}|" +"2020-10-14 19:02:06.243 UTC [msp.identity] Verify -> DEBU 1436 Verify: sig = 00000000 30 44 02 20 2c 13 91 e5 d4 bd 10 98 83 4f d8 88 |0D. ,........O..| +00000010 7f 9a 93 9b d3 a6 88 d4 ae 0c 6a 20 e9 0f f0 d9 |..........j ....| +00000020 f3 6f f1 52 02 20 59 ad a4 16 6a 61 b9 48 04 9c |.o.R. Y...ja.H..| +00000030 67 f0 db 62 d5 32 83 7b 63 b9 e6 46 e2 36 54 e7 |g..b.2.{c..F.6T.| +00000040 26 75 c8 74 05 bf |&u.t..|" +"2020-10-14 19:02:06.243 UTC [cauthdsl] func2 -> DEBU 1437 0xc000c70b80 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:06.243 UTC [cauthdsl] func1 -> DEBU 1438 0xc000c70b80 gate 1602702126242457900 evaluation succeeds" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 1439 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143b Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143d Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:06.244 UTC [policies] Evaluate -> DEBU 143e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:06.245 UTC [common.deliver] deliverBlocks -> DEBU 143f [channel: testchainid] Received seekInfo (0xc00030b140) start: > stop: > from 172.18.0.9:40142" +"2020-10-14 19:02:06.245 UTC [fsblkstorage] Next -> DEBU 1440 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:06.255 UTC [fsblkstorage] newBlockfileStream -> DEBU 1441 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:06.256 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1442 Remaining bytes=[53338], Going to peek [8] bytes" +"2020-10-14 19:02:06.257 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1443 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:06.259 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1444 blockbytes [22927] read from file [0]" +"2020-10-14 19:02:06.263 UTC [common.deliver] deliverBlocks -> DEBU 1445 [channel: testchainid] Delivering block [0] for (0xc00030b140) for 172.18.0.9:40142" +"2020-10-14 19:02:06.263 UTC [common.deliver] deliverBlocks -> DEBU 1446 [channel: testchainid] Done delivering to 172.18.0.9:40142 for (0xc00030b140)" +"2020-10-14 19:02:06.266 UTC [common.deliver] Handle -> DEBU 1447 Waiting for new SeekInfo from 172.18.0.9:40142" +"2020-10-14 19:02:06.267 UTC [common.deliver] Handle -> DEBU 1448 Attempting to read seek info message from 172.18.0.9:40142" +"2020-10-14 19:02:06.283 UTC [common.deliver] Handle -> WARN 1449 Error reading from 172.18.0.9:40142: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:06.285 UTC [orderer.common.server] func1 -> DEBU 144b Closing Deliver stream" +"2020-10-14 19:02:06.285 UTC [comm.grpc.server] 1 -> INFO 144c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40142 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.0195ms +"2020-10-14 19:02:06.284 UTC [grpc] infof -> DEBU 144a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:06.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:06.534 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144e Sending msg of 28 bytes to 3 on channel testchainid took 100.1µs" +"2020-10-14 19:02:06.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.8µs " +"2020-10-14 19:02:06.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1450 Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2020-10-14 19:02:06.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1452 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-10-14 19:02:06.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1453 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 143µs " +"2020-10-14 19:02:06.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1451 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.7µs " +"2020-10-14 19:02:06.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:06.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1455 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:06.657 UTC [orderer.common.server] Deliver -> DEBU 1456 Starting new Deliver handler" +"2020-10-14 19:02:06.657 UTC [common.deliver] Handle -> DEBU 1457 Starting new deliver loop for 172.18.0.9:40144" +"2020-10-14 19:02:06.657 UTC [common.deliver] Handle -> DEBU 1458 Attempting to read seek info message from 172.18.0.9:40144" +"2020-10-14 19:02:06.659 UTC [policies] Evaluate -> DEBU 1459 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:06.659 UTC [policies] Evaluate -> DEBU 145a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.660 UTC [policies] Evaluate -> DEBU 145b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:06.660 UTC [policies] Evaluate -> DEBU 145c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:06.661 UTC [policies] Evaluate -> DEBU 145d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:06.662 UTC [cauthdsl] func1 -> DEBU 145e 0xc000e2e150 gate 1602702126662097000 evaluation starts" +"2020-10-14 19:02:06.662 UTC [cauthdsl] func2 -> DEBU 145f 0xc000e2e150 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:06.663 UTC [cauthdsl] func2 -> DEBU 1460 0xc000e2e150 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:06.663 UTC [cauthdsl] func2 -> DEBU 1461 0xc000e2e150 principal matched by identity 0" +"2020-10-14 19:02:06.663 UTC [msp.identity] Verify -> DEBU 1462 Verify: digest = 00000000 77 ad cd 89 14 8c 53 3a 9e 2f ab fc 9e e9 51 d2 |w.....S:./....Q.| +00000010 28 4b ba cf e4 89 e7 24 24 b7 7b 5a d5 e4 32 01 |(K.....$$.{Z..2.|" +"2020-10-14 19:02:06.664 UTC [msp.identity] Verify -> DEBU 1463 Verify: sig = 00000000 30 45 02 21 00 c1 8c 65 8c 38 6c c8 b9 3b 08 ad |0E.!...e.8l..;..| +00000010 b8 c7 61 22 0d 2d 1a 0e 52 af fe 45 df df af 7b |..a".-..R..E...{| +00000020 a0 db f1 c4 27 02 20 15 cf 38 1a 9f f2 fc ce e9 |....'. ..8......| +00000030 3b 34 65 5c c4 ba 8a db 6d d6 7d f4 4e e4 b3 ea |;4e\....m.}.N...| +00000040 17 b9 1d 66 dc 37 27 |...f.7'|" +"2020-10-14 19:02:06.667 UTC [cauthdsl] func2 -> DEBU 1464 0xc000e2e150 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:06.667 UTC [cauthdsl] func1 -> DEBU 1465 0xc000e2e150 gate 1602702126662097000 evaluation succeeds" +"2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1466 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1467 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:06.668 UTC [policies] Evaluate -> DEBU 1468 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.669 UTC [policies] Evaluate -> DEBU 1469 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:06.670 UTC [policies] Evaluate -> DEBU 146a Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:06.670 UTC [policies] Evaluate -> DEBU 146b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:06.671 UTC [common.deliver] deliverBlocks -> DEBU 146c [channel: testchainid] Received seekInfo (0xc000d2b780) start: > stop: > from 172.18.0.9:40144" +"2020-10-14 19:02:06.672 UTC [fsblkstorage] Next -> DEBU 146d Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:06.672 UTC [fsblkstorage] newBlockfileStream -> DEBU 146e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 146f Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1470 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:06.672 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1471 blockbytes [30405] read from file [0]" +"2020-10-14 19:02:06.674 UTC [common.deliver] deliverBlocks -> DEBU 1472 [channel: testchainid] Delivering block [1] for (0xc000d2b780) for 172.18.0.9:40144" +"2020-10-14 19:02:06.674 UTC [common.deliver] deliverBlocks -> DEBU 1473 [channel: testchainid] Done delivering to 172.18.0.9:40144 for (0xc000d2b780)" +"2020-10-14 19:02:06.675 UTC [common.deliver] Handle -> DEBU 1474 Waiting for new SeekInfo from 172.18.0.9:40144" +"2020-10-14 19:02:06.676 UTC [common.deliver] Handle -> DEBU 1475 Attempting to read seek info message from 172.18.0.9:40144" +"2020-10-14 19:02:06.693 UTC [common.deliver] Handle -> WARN 1476 Error reading from 172.18.0.9:40144: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:06.693 UTC [orderer.common.server] func1 -> DEBU 1477 Closing Deliver stream" +"2020-10-14 19:02:06.694 UTC [comm.grpc.server] 1 -> INFO 1478 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40144 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1175ms +"2020-10-14 19:02:06.695 UTC [grpc] infof -> DEBU 1479 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:07.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:07.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-10-14 19:02:07.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.5µs " +"2020-10-14 19:02:07.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147d Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +"2020-10-14 19:02:07.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147e Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2020-10-14 19:02:07.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +"2020-10-14 19:02:07.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.8µs " +"2020-10-14 19:02:07.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:07.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1482 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:07.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1483 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:07.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2020-10-14 19:02:07.521 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1485 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +"2020-10-14 19:02:07.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1486 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2020-10-14 19:02:07.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1487 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-10-14 19:02:07.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1488 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.7µs " +"2020-10-14 19:02:07.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 339.5µs " +"2020-10-14 19:02:07.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:07.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:08.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:08.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2020-10-14 19:02:08.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.7µs " +"2020-10-14 19:02:08.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148f Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2020-10-14 19:02:08.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1490 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2020-10-14 19:02:08.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1491 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.9µs " +"2020-10-14 19:02:08.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.7µs " +"2020-10-14 19:02:08.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:08.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1494 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:08.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1495 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:08.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2020-10-14 19:02:08.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1497 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.9µs " +"2020-10-14 19:02:08.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1498 Sending msg of 28 bytes to 2 on channel businesschannel took 23.7µs" +"2020-10-14 19:02:08.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1499 Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2020-10-14 19:02:08.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.4µs " +"2020-10-14 19:02:08.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.6µs " +"2020-10-14 19:02:08.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:08.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:09.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:09.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2020-10-14 19:02:09.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.9µs " +"2020-10-14 19:02:09.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a1 Sending msg of 28 bytes to 2 on channel businesschannel took 19µs" +"2020-10-14 19:02:09.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a2 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +"2020-10-14 19:02:09.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.2µs " +"2020-10-14 19:02:09.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.9µs " +"2020-10-14 19:02:09.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:09.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:09.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:09.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +"2020-10-14 19:02:09.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2020-10-14 19:02:09.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14aa Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-10-14 19:02:09.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ab Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2020-10-14 19:02:09.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2020-10-14 19:02:09.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.6µs " +"2020-10-14 19:02:09.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:09.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14af Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:10.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:10.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:02:10.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +"2020-10-14 19:02:10.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.7µs" +"2020-10-14 19:02:10.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.3µs " +"2020-10-14 19:02:10.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b5 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2020-10-14 19:02:10.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +"2020-10-14 19:02:10.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:10.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b8 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:10.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b9 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:10.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-10-14 19:02:10.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +"2020-10-14 19:02:10.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bc Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:02:10.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2020-10-14 19:02:10.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74µs " +"2020-10-14 19:02:10.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.8µs " +"2020-10-14 19:02:10.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:10.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:11.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:11.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-10-14 19:02:11.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.2µs " +"2020-10-14 19:02:11.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c5 Sending msg of 28 bytes to 2 on channel businesschannel took 20.6µs" +"2020-10-14 19:02:11.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c6 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2020-10-14 19:02:11.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +"2020-10-14 19:02:11.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +"2020-10-14 19:02:11.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:11.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ca Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:11.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cb Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:11.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2020-10-14 19:02:11.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +"2020-10-14 19:02:11.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ce Sending msg of 28 bytes to 2 on channel businesschannel took 23.8µs" +"2020-10-14 19:02:11.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cf Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2020-10-14 19:02:11.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +"2020-10-14 19:02:11.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 694.6µs " +"2020-10-14 19:02:11.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:11.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:12.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d4 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:12.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d5 Sending msg of 28 bytes to 3 on channel testchainid took 22.2µs" +"2020-10-14 19:02:12.021 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.7µs " +"2020-10-14 19:02:12.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:02:12.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d8 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2020-10-14 19:02:12.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +"2020-10-14 19:02:12.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.3µs " +"2020-10-14 19:02:12.124 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:12.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dc Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:12.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dd Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:12.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-10-14 19:02:12.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.3µs " +"2020-10-14 19:02:12.625 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 2 on channel businesschannel took 27.6µs" +"2020-10-14 19:02:12.627 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +"2020-10-14 19:02:12.627 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +"2020-10-14 19:02:12.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +"2020-10-14 19:02:12.626 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:12.629 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e5 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:13.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:13.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e7 Sending msg of 28 bytes to 3 on channel testchainid took 86.7µs" +"2020-10-14 19:02:13.020 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.5µs " +"2020-10-14 19:02:13.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +"2020-10-14 19:02:13.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ea Sending msg of 28 bytes to 3 on channel businesschannel took 7.5µs" +"2020-10-14 19:02:13.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.5µs " +"2020-10-14 19:02:13.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 304.9µs " +"2020-10-14 19:02:13.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ed Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:13.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ee Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:13.519 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ef Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:13.521 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f0 Sending msg of 28 bytes to 3 on channel testchainid took 25.6µs" +"2020-10-14 19:02:13.522 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 543.4µs " +"2020-10-14 19:02:13.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f2 Sending msg of 28 bytes to 2 on channel businesschannel took 72.4µs" +"2020-10-14 19:02:13.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2020-10-14 19:02:13.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.8µs " +"2020-10-14 19:02:13.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54µs " +"2020-10-14 19:02:13.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f6 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:13.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f7 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:14.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:14.018 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f9 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +"2020-10-14 19:02:14.018 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +"2020-10-14 19:02:14.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fb Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2020-10-14 19:02:14.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fc Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +"2020-10-14 19:02:14.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.3µs " +"2020-10-14 19:02:14.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.6µs " +"2020-10-14 19:02:14.129 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ff Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:14.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1500 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:14.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1501 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:14.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1502 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2020-10-14 19:02:14.519 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1503 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +"2020-10-14 19:02:14.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1504 Sending msg of 28 bytes to 3 on channel businesschannel took 24.4µs" +"2020-10-14 19:02:14.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1505 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2020-10-14 19:02:14.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1506 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.5µs " +"2020-10-14 19:02:14.623 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1507 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.9µs " +"2020-10-14 19:02:14.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1508 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:14.624 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1509 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:15.017 UTC [orderer.common.cluster.step] handleMessage -> DEBU 150a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:15.017 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150b Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-10-14 19:02:15.017 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.6µs " +"2020-10-14 19:02:15.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150d Sending msg of 28 bytes to 2 on channel businesschannel took 51.2µs" +"2020-10-14 19:02:15.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 150e Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-10-14 19:02:15.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1510 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2020-10-14 19:02:15.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1511 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:15.123 UTC [orderer.common.cluster.step] sendMessage -> DEBU 150f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 441.2µs " +"2020-10-14 19:02:15.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1512 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:15.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1513 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:15.517 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1514 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +"2020-10-14 19:02:15.517 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1515 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.5µs " +"2020-10-14 19:02:15.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1516 Sending msg of 28 bytes to 2 on channel businesschannel took 70.8µs" +"2020-10-14 19:02:15.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1517 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-10-14 19:02:15.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1518 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +"2020-10-14 19:02:15.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1519 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.3µs " +"2020-10-14 19:02:15.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:15.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.018 UTC [orderer.common.cluster.step] handleMessage -> DEBU 151c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:16.019 UTC [orderer.common.cluster.step] sendMessage -> DEBU 151d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.1µs " +"2020-10-14 19:02:16.019 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151e Sending msg of 28 bytes to 3 on channel testchainid took 99.1µs" +"2020-10-14 19:02:16.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 151f Sending msg of 28 bytes to 2 on channel businesschannel took 265.1µs" +"2020-10-14 19:02:16.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1520 Sending msg of 28 bytes to 3 on channel businesschannel took 6.7µs" +"2020-10-14 19:02:16.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1521 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.8µs " +"2020-10-14 19:02:16.125 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1522 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +"2020-10-14 19:02:16.126 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1523 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.127 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1524 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.217 UTC [orderer.common.server] Deliver -> DEBU 1525 Starting new Deliver handler" +"2020-10-14 19:02:16.217 UTC [common.deliver] Handle -> DEBU 1526 Starting new deliver loop for 172.18.0.9:40146" +"2020-10-14 19:02:16.217 UTC [common.deliver] Handle -> DEBU 1527 Attempting to read seek info message from 172.18.0.9:40146" +"2020-10-14 19:02:16.233 UTC [orderer.common.server] Broadcast -> DEBU 1528 Starting new Broadcast handler" +"2020-10-14 19:02:16.233 UTC [orderer.common.broadcast] Handle -> DEBU 1529 Starting new broadcast loop for 172.18.0.9:40148" +"2020-10-14 19:02:16.234 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 152a [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:40148" +"2020-10-14 19:02:16.235 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 152b Processing config update message for exisitng channel businesschannel" +"2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 152f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.237 UTC [policies] Evaluate -> DEBU 1530 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func1 -> DEBU 1531 0xc001298850 gate 1602702136237958300 evaluation starts" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1532 0xc001298850 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1533 0xc001298850 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1534 0xc001298850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func2 -> DEBU 1535 0xc001298850 principal evaluation fails" +"2020-10-14 19:02:16.238 UTC [cauthdsl] func1 -> DEBU 1536 0xc001298850 gate 1602702136237958300 evaluation fails" +"2020-10-14 19:02:16.238 UTC [policies] Evaluate -> DEBU 1537 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.238 UTC [policies] Evaluate -> DEBU 1538 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.239 UTC [policies] func1 -> DEBU 1539 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153a Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.239 UTC [policies] Evaluate -> DEBU 153e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-10-14 19:02:16.239 UTC [cauthdsl] func1 -> DEBU 153f 0xc001299540 gate 1602702136239495900 evaluation starts" +"2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1540 0xc001299540 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1541 0xc001299540 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.239 UTC [cauthdsl] func2 -> DEBU 1542 0xc001299540 principal matched by identity 0" +"2020-10-14 19:02:16.239 UTC [msp.identity] Verify -> DEBU 1543 Verify: digest = 00000000 e0 e0 13 81 f4 de a2 97 82 d0 3d c5 74 cf 58 d5 |..........=.t.X.| +00000010 04 2f 67 7f 1b b2 65 94 9e ff 55 9d 4c 6b 56 88 |./g...e...U.LkV.|" +"2020-10-14 19:02:16.239 UTC [msp.identity] Verify -> DEBU 1544 Verify: sig = 00000000 30 44 02 20 5d ee 7f ae 93 b4 86 4a a3 42 8c 17 |0D. ]......J.B..| +00000010 db 0e fa 26 b2 d7 39 bf d1 a6 fb ed 69 ac f7 18 |...&..9.....i...| +00000020 b6 35 27 4e 02 20 26 1a e1 a3 70 1c a5 fd f5 3a |.5'N. &...p....:| +00000030 ca 9f 03 91 e2 b5 3d 1f e0 68 6f b4 54 76 91 27 |......=..ho.Tv.'| +00000040 b1 c0 60 9c ae d1 |..`...|" +"2020-10-14 19:02:16.240 UTC [cauthdsl] func2 -> DEBU 1545 0xc001299540 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:16.240 UTC [cauthdsl] func1 -> DEBU 1546 0xc001299540 gate 1602702136239495900 evaluation succeeds" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1547 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 1549 Signature set satisfies policy /Channel/Application/Writers" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154b Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:02:16.240 UTC [policies] Evaluate -> DEBU 154c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154d Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154e Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 154f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1550 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1551 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1552 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1553 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.241 UTC [common.configtx] addToMap -> DEBU 1554 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1555 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1556 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1557 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1558 Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 1559 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155c Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.242 UTC [common.configtx] addToMap -> DEBU 155e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 155f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1560 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1561 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1562 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1563 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.243 UTC [common.configtx] addToMap -> DEBU 1564 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1565 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1566 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1567 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.244 UTC [common.configtx] addToMap -> DEBU 1568 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 1569 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 156a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.245 UTC [common.configtx] verifyDeltaSet -> DEBU 156b Processing change to key: [Group] /Channel/Application" +"2020-10-14 19:02:16.245 UTC [common.configtx] policyForItem -> DEBU 156c Getting policy for item Application with mod_policy Admins" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156d Manager Channel looking up path []" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156e Manager Channel has managers Application" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 156f Manager Channel has managers Orderer" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1570 Manager Channel looking up path [Application]" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1571 Manager Channel has managers Application" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1572 Manager Channel has managers Orderer" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1573 Manager Channel/Application looking up path []" +"2020-10-14 19:02:16.245 UTC [policies] Manager -> DEBU 1574 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:02:16.246 UTC [policies] Manager -> DEBU 1575 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1576 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1577 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.246 UTC [policies] Evaluate -> DEBU 1578 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:02:16.246 UTC [cauthdsl] deduplicate -> WARN 1579 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-10-14 19:02:16.246 UTC [cauthdsl] func1 -> DEBU 157a 0xc000c6cf90 gate 1602702136246565900 evaluation starts" +"2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157b 0xc000c6cf90 signed by 0 principal evaluation starts (used [false false false])" +"2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157c 0xc000c6cf90 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.246 UTC [cauthdsl] func2 -> DEBU 157d 0xc000c6cf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-10-14 19:02:16.247 UTC [cauthdsl] func2 -> DEBU 157e 0xc000c6cf90 processing identity 1 with bytes of fe2870" +"2020-10-14 19:02:16.247 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 157f Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-10-14 19:02:16.247 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1580 Checking if identity carries the admin ou for Org2MSP" +"2020-10-14 19:02:16.247 UTC [msp] Validate -> DEBU 1581 MSP Org2MSP validating identity" +"2020-10-14 19:02:16.247 UTC [msp] getCertificationChain -> DEBU 1582 MSP Org2MSP getting certification chain" +"2020-10-14 19:02:16.248 UTC [msp] hasOURole -> DEBU 1583 MSP Org2MSP checking if the identity is a client" +"2020-10-14 19:02:16.248 UTC [msp] getCertificationChain -> DEBU 1584 MSP Org2MSP getting certification chain" +"2020-10-14 19:02:16.248 UTC [cauthdsl] func2 -> DEBU 1585 0xc000c6cf90 principal matched by identity 1" +"2020-10-14 19:02:16.248 UTC [msp.identity] Verify -> DEBU 1586 Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.|" +"2020-10-14 19:02:16.248 UTC [msp.identity] Verify -> DEBU 1587 Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +00000040 3e 72 c3 c7 24 c8 e9 |>r..$..|" +"2020-10-14 19:02:16.250 UTC [cauthdsl] func2 -> DEBU 1588 0xc000c6cf90 principal evaluation succeeds for identity 1" +"2020-10-14 19:02:16.250 UTC [cauthdsl] func1 -> DEBU 1589 0xc000c6cf90 gate 1602702136246565900 evaluation succeeds" +"2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.250 UTC [policies] Evaluate -> DEBU 158c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:02:16.250 UTC [cauthdsl] deduplicate -> WARN 158d De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-10-14 19:02:16.250 UTC [cauthdsl] func1 -> DEBU 158e 0xc000c6dd70 gate 1602702136250488200 evaluation starts" +"2020-10-14 19:02:16.250 UTC [cauthdsl] func2 -> DEBU 158f 0xc000c6dd70 signed by 0 principal evaluation starts (used [false false false])" +"2020-10-14 19:02:16.251 UTC [cauthdsl] func2 -> DEBU 1590 0xc000c6dd70 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.251 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1591 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-10-14 19:02:16.251 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1592 Checking if identity carries the admin ou for Org1MSP" +"2020-10-14 19:02:16.251 UTC [msp] Validate -> DEBU 1593 MSP Org1MSP validating identity" +"2020-10-14 19:02:16.251 UTC [msp] getCertificationChain -> DEBU 1594 MSP Org1MSP getting certification chain" +"2020-10-14 19:02:16.252 UTC [msp] hasOURole -> DEBU 1595 MSP Org1MSP checking if the identity is a client" +"2020-10-14 19:02:16.252 UTC [msp] getCertificationChain -> DEBU 1596 MSP Org1MSP getting certification chain" +"2020-10-14 19:02:16.252 UTC [cauthdsl] func2 -> DEBU 1597 0xc000c6dd70 principal matched by identity 0" +"2020-10-14 19:02:16.252 UTC [msp.identity] Verify -> DEBU 1598 Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o|" +"2020-10-14 19:02:16.252 UTC [msp.identity] Verify -> DEBU 1599 Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +00000040 44 52 2f 24 7d 8c |DR/$}.|" +"2020-10-14 19:02:16.253 UTC [cauthdsl] func2 -> DEBU 159a 0xc000c6dd70 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:16.253 UTC [cauthdsl] func1 -> DEBU 159b 0xc000c6dd70 gate 1602702136250488200 evaluation succeeds" +"2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159e Signature set satisfies policy /Channel/Application/Admins" +"2020-10-14 19:02:16.253 UTC [policies] Evaluate -> DEBU 159f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-10-14 19:02:16.253 UTC [common.configtx] verifyDeltaSet -> DEBU 15a0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.253 UTC [common.configtx] verifyDeltaSet -> DEBU 15a1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.254 UTC [common.configtx] verifyDeltaSet -> DEBU 15a2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.254 UTC [common.configtx] verifyDeltaSet -> DEBU 15a3 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.254 UTC [common.configtx] recurseConfigMap -> DEBU 15a4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15a9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15aa Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.255 UTC [common.configtx] recurseConfigMap -> DEBU 15ab Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ac Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ad Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15ae Setting policy for key Admins to " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15af Setting policy for key Endorsement to " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b0 Setting policy for key LifecycleEndorsement to " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b1 Setting policy for key Readers to " +"2020-10-14 19:02:16.256 UTC [common.configtx] recurseConfigMap -> DEBU 15b2 Setting policy for key Writers to " +"2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.257 UTC [common.configtx] recurseConfigMap -> DEBU 15b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15ba Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15bb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.configtx] recurseConfigMap -> DEBU 15bc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.258 UTC [common.channelconfig] NewStandardValues -> DEBU 15bd Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:02:16.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15be Processing field: HashingAlgorithm" +"2020-10-14 19:02:16.258 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15bf Processing field: BlockDataHashingStructure" +"2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c0 Processing field: OrdererAddresses" +"2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c1 Processing field: Consortium" +"2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c2 Processing field: Capabilities" +"2020-10-14 19:02:16.259 UTC [common.channelconfig] NewStandardValues -> DEBU 15c3 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:02:16.259 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c4 Processing field: ACLs" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c5 Processing field: Capabilities" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] NewStandardValues -> DEBU 15c6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c7 Processing field: AnchorPeers" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] NewStandardValues -> DEBU 15c8 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c9 Processing field: MSP" +"2020-10-14 19:02:16.260 UTC [common.channelconfig] Validate -> DEBU 15ca Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:02:16.260 UTC [common.channelconfig] validateMSP -> DEBU 15cb Setting up MSP for org Org1MSP" +"2020-10-14 19:02:16.260 UTC [msp] newBccspMsp -> DEBU 15cc Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.260 UTC [msp] New -> DEBU 15cd Creating Cache-MSP instance" +"2020-10-14 19:02:16.261 UTC [msp] Setup -> DEBU 15ce Setting up MSP instance Org1MSP" +"2020-10-14 19:02:16.262 UTC [msp.identity] newIdentity -> DEBU 15cf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15d0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d1 Processing field: AnchorPeers" +"2020-10-14 19:02:16.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15d2 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d3 Processing field: MSP" +"2020-10-14 19:02:16.262 UTC [common.channelconfig] Validate -> DEBU 15d4 Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:02:16.263 UTC [common.channelconfig] validateMSP -> DEBU 15d5 Setting up MSP for org Org2MSP" +"2020-10-14 19:02:16.263 UTC [msp] newBccspMsp -> DEBU 15d6 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.263 UTC [msp] New -> DEBU 15d7 Creating Cache-MSP instance" +"2020-10-14 19:02:16.263 UTC [msp] Setup -> DEBU 15d8 Setting up MSP instance Org2MSP" +"2020-10-14 19:02:16.263 UTC [msp.identity] newIdentity -> DEBU 15d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.264 UTC [common.channelconfig] NewStandardValues -> DEBU 15da Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15db Processing field: AnchorPeers" +"2020-10-14 19:02:16.264 UTC [common.channelconfig] NewStandardValues -> DEBU 15dc Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15dd Processing field: MSP" +"2020-10-14 19:02:16.264 UTC [common.channelconfig] Validate -> DEBU 15de Anchor peers for org Org3MSP are " +"2020-10-14 19:02:16.264 UTC [common.channelconfig] validateMSP -> DEBU 15df Setting up MSP for org Org3MSP" +"2020-10-14 19:02:16.265 UTC [msp] newBccspMsp -> DEBU 15e0 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.265 UTC [msp] New -> DEBU 15e1 Creating Cache-MSP instance" +"2020-10-14 19:02:16.265 UTC [msp] Setup -> DEBU 15e2 Setting up MSP instance Org3MSP" +"2020-10-14 19:02:16.265 UTC [msp.identity] newIdentity -> DEBU 15e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15e4 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e5 Processing field: ConsensusType" +"2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e6 Processing field: BatchSize" +"2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e7 Processing field: BatchTimeout" +"2020-10-14 19:02:16.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e8 Processing field: KafkaBrokers" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e9 Processing field: ChannelRestrictions" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ea Processing field: Capabilities" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15eb Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ec Processing field: Endpoints" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15ed Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ee Processing field: MSP" +"2020-10-14 19:02:16.268 UTC [common.channelconfig] validateMSP -> DEBU 15ef Setting up MSP for org OrdererOrg" +"2020-10-14 19:02:16.269 UTC [msp] newBccspMsp -> DEBU 15f0 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.269 UTC [msp] New -> DEBU 15f1 Creating Cache-MSP instance" +"2020-10-14 19:02:16.269 UTC [msp] Setup -> DEBU 15f2 Setting up MSP instance OrdererMSP" +"2020-10-14 19:02:16.270 UTC [msp.identity] newIdentity -> DEBU 15f3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.270 UTC [msp] Setup -> DEBU 15f4 Setting up the MSP manager (4 msps)" +"2020-10-14 19:02:16.270 UTC [msp] Setup -> DEBU 15f5 MSP manager setup complete, setup 4 msps" +"2020-10-14 19:02:16.270 UTC [policies] NewManagerImpl -> DEBU 15f6 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f7 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f8 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15f9 Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fa Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fb Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fc Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fd Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.271 UTC [policies] NewManagerImpl -> DEBU 15fe Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 15ff Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1600 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1601 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1602 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1603 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1604 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1605 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1606 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.272 UTC [policies] GetPolicy -> DEBU 1607 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1608 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1609 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160c Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160d Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160e Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 160f Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1610 Proposed new policy Writers for Channel" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1611 Proposed new policy Admins for Channel" +"2020-10-14 19:02:16.272 UTC [policies] NewManagerImpl -> DEBU 1612 Proposed new policy Readers for Channel" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:16.272 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1625 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1626 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1627 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1628 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1629 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162b Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162c Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162d Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162e Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 162f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1630 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1631 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1632 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1633 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1634 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1635 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1636 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1637 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1638 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 1639 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:02:16.273 UTC [common.configtx] addToMap -> DEBU 163a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163d Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163e Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 163f Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1640 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1641 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1642 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1643 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:02:16.274 UTC [common.configtx] addToMap -> DEBU 1644 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1645 As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1646 As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1647 Manager Channel looking up path [Application]" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1648 Manager Channel has managers Application" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1649 Manager Channel has managers Orderer" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164a Manager Channel/Application looking up path []" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164b Manager Channel/Application has managers Org3MSP" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164c Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 164d Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 164e As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 164f As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1650 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1651 Manager Channel looking up path [Orderer]" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1652 Manager Channel has managers Application" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1653 Manager Channel has managers Orderer" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1654 Manager Channel/Orderer looking up path []" +"2020-10-14 19:02:16.274 UTC [policies] Manager -> DEBU 1655 Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1656 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1657 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:02:16.274 UTC [common.channelconfig] LogSanityChecks -> DEBU 1658 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:02:16.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1659 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:02:16.275 UTC [common.capabilities] Supported -> DEBU 165a Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:02:16.275 UTC [common.capabilities] Supported -> DEBU 165b Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:02:16.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 165c Obtaining default signing identity" +"2020-10-14 19:02:16.275 UTC [msp] GetDefaultSigningIdentity -> DEBU 165d Obtaining default signing identity" +"2020-10-14 19:02:16.275 UTC [msp.identity] Sign -> DEBU 165e Sign: plaintext: 0AEA060A1B08011A0608B8969DFC0522...3D1FE0686FB454769127B1C0609CAED1 " +"2020-10-14 19:02:16.275 UTC [msp.identity] Sign -> DEBU 165f Sign: digest: C61065BF2900E32B47A4A771862D3AFA07029F7E99B48105B17405B19F90461F " +"2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1660 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1661 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.275 UTC [policies] Evaluate -> DEBU 1664 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-10-14 19:02:16.275 UTC [msp] DeserializeIdentity -> DEBU 1665 Obtaining identity" +"2020-10-14 19:02:16.277 UTC [msp.identity] newIdentity -> DEBU 1666 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.277 UTC [cauthdsl] func1 -> DEBU 1667 0xc0011e77c0 gate 1602702136277296600 evaluation starts" +"2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 1668 0xc0011e77c0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 1669 0xc0011e77c0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.277 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 166a Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:02:16.277 UTC [msp] Validate -> DEBU 166b MSP OrdererMSP validating identity" +"2020-10-14 19:02:16.277 UTC [msp] getCertificationChain -> DEBU 166c MSP OrdererMSP getting certification chain" +"2020-10-14 19:02:16.277 UTC [cauthdsl] func2 -> DEBU 166d 0xc0011e77c0 principal matched by identity 0" +"2020-10-14 19:02:16.277 UTC [msp.identity] Verify -> DEBU 166e Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.|" +"2020-10-14 19:02:16.277 UTC [msp.identity] Verify -> DEBU 166f Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +00000040 4d 58 92 4e a4 4a df |MX.N.J.|" +"2020-10-14 19:02:16.278 UTC [cauthdsl] func2 -> DEBU 1670 0xc0011e77c0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:16.278 UTC [cauthdsl] func1 -> DEBU 1671 0xc0011e77c0 gate 1602702136277296600 evaluation succeeds" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1672 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1673 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1674 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1675 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1676 Signature set satisfies policy /Channel/Writers" +"2020-10-14 19:02:16.278 UTC [policies] Evaluate -> DEBU 1677 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-10-14 19:02:16.278 UTC [orderer.common.msgprocessor] Apply -> DEBU 1678 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-10-14 19:02:16.278 UTC [common.channelconfig] NewStandardValues -> DEBU 1679 Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167a Processing field: HashingAlgorithm" +"2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167b Processing field: BlockDataHashingStructure" +"2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167c Processing field: OrdererAddresses" +"2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167d Processing field: Consortium" +"2020-10-14 19:02:16.278 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167e Processing field: Capabilities" +"2020-10-14 19:02:16.279 UTC [common.channelconfig] NewStandardValues -> DEBU 167f Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:02:16.279 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1680 Processing field: ACLs" +"2020-10-14 19:02:16.279 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1681 Processing field: Capabilities" +"2020-10-14 19:02:16.280 UTC [common.channelconfig] NewStandardValues -> DEBU 1682 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1683 Processing field: AnchorPeers" +"2020-10-14 19:02:16.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1684 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1685 Processing field: MSP" +"2020-10-14 19:02:16.282 UTC [common.channelconfig] Validate -> DEBU 1686 Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:02:16.282 UTC [common.channelconfig] validateMSP -> DEBU 1687 Setting up MSP for org Org1MSP" +"2020-10-14 19:02:16.282 UTC [msp] newBccspMsp -> DEBU 1688 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.282 UTC [msp] New -> DEBU 1689 Creating Cache-MSP instance" +"2020-10-14 19:02:16.282 UTC [msp] Setup -> DEBU 168a Setting up MSP instance Org1MSP" +"2020-10-14 19:02:16.282 UTC [msp.identity] newIdentity -> DEBU 168b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.282 UTC [common.channelconfig] NewStandardValues -> DEBU 168c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168d Processing field: AnchorPeers" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 168e Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 168f Processing field: MSP" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] Validate -> DEBU 1690 Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:02:16.283 UTC [common.channelconfig] validateMSP -> DEBU 1691 Setting up MSP for org Org2MSP" +"2020-10-14 19:02:16.283 UTC [msp] newBccspMsp -> DEBU 1692 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.283 UTC [msp] New -> DEBU 1693 Creating Cache-MSP instance" +"2020-10-14 19:02:16.283 UTC [msp] Setup -> DEBU 1694 Setting up MSP instance Org2MSP" +"2020-10-14 19:02:16.283 UTC [msp.identity] newIdentity -> DEBU 1695 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1696 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1697 Processing field: AnchorPeers" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1698 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1699 Processing field: MSP" +"2020-10-14 19:02:16.283 UTC [common.channelconfig] Validate -> DEBU 169a Anchor peers for org Org3MSP are " +"2020-10-14 19:02:16.284 UTC [common.channelconfig] validateMSP -> DEBU 169b Setting up MSP for org Org3MSP" +"2020-10-14 19:02:16.284 UTC [msp] newBccspMsp -> DEBU 169c Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.284 UTC [msp] New -> DEBU 169d Creating Cache-MSP instance" +"2020-10-14 19:02:16.284 UTC [msp] Setup -> DEBU 169e Setting up MSP instance Org3MSP" +"2020-10-14 19:02:16.284 UTC [msp.identity] newIdentity -> DEBU 169f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a0 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a1 Processing field: ConsensusType" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a2 Processing field: BatchSize" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a3 Processing field: BatchTimeout" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a4 Processing field: KafkaBrokers" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a5 Processing field: ChannelRestrictions" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a6 Processing field: Capabilities" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a7 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16a8 Processing field: Endpoints" +"2020-10-14 19:02:16.284 UTC [common.channelconfig] NewStandardValues -> DEBU 16a9 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16aa Processing field: MSP" +"2020-10-14 19:02:16.285 UTC [common.channelconfig] validateMSP -> DEBU 16ab Setting up MSP for org OrdererOrg" +"2020-10-14 19:02:16.285 UTC [msp] newBccspMsp -> DEBU 16ac Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.285 UTC [msp] New -> DEBU 16ad Creating Cache-MSP instance" +"2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16ae Setting up MSP instance OrdererMSP" +"2020-10-14 19:02:16.285 UTC [msp.identity] newIdentity -> DEBU 16af Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16b0 Setting up the MSP manager (4 msps)" +"2020-10-14 19:02:16.285 UTC [msp] Setup -> DEBU 16b1 MSP manager setup complete, setup 4 msps" +"2020-10-14 19:02:16.285 UTC [policies] NewManagerImpl -> DEBU 16b2 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.285 UTC [policies] NewManagerImpl -> DEBU 16b3 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b5 Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:02:16.288 UTC [policies] NewManagerImpl -> DEBU 16b6 Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b7 Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b8 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16b9 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16ba Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bb Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bc Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bd Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16be Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16bf Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c0 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c1 Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c2 Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c5 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c6 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c7 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16c8 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16c9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.289 UTC [policies] GetPolicy -> DEBU 16ca Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cb Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cc Proposed new policy Writers for Channel" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16cd Proposed new policy Admins for Channel" +"2020-10-14 19:02:16.289 UTC [policies] NewManagerImpl -> DEBU 16ce Proposed new policy Readers for Channel" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:02:16.289 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e3 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e4 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.290 UTC [common.configtx] addToMap -> DEBU 16e5 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e6 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e7 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e8 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16e9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ea Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16eb Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ec Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ed Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:02:16.291 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:02:16.294 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:02:16.294 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:02:16.294 UTC [orderer.consensus.etcdraft] propose -> INFO 1701 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-10-14 19:02:16.294 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 1702 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-10-14 19:02:16.295 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1703 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:40148" +"2020-10-14 19:02:16.295 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1704 Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2020-10-14 19:02:16.298 UTC [common.deliver] Handle -> WARN 1705 Error reading from 172.18.0.9:40146: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:16.298 UTC [orderer.common.server] func1 -> DEBU 1706 Closing Deliver stream" +"2020-10-14 19:02:16.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1708 Sending msg of 40278 bytes to 2 on channel businesschannel took 20.1µs" +"2020-10-14 19:02:16.300 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1709 Sending msg of 40278 bytes to 3 on channel businesschannel took 12.8µs" +"2020-10-14 19:02:16.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170a Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer2.example.com(orderer2.example.com:7050) took 306.8µs " +"2020-10-14 19:02:16.300 UTC [grpc] infof -> DEBU 170b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:16.301 UTC [orderer.common.cluster.step] sendMessage -> DEBU 170c Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer1.example.com(orderer1.example.com:7050) took 69.7µs " +"2020-10-14 19:02:16.299 UTC [comm.grpc.server] 1 -> INFO 1707 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.4801ms +"2020-10-14 19:02:16.303 UTC [orderer.common.broadcast] Handle -> WARN 170d Error reading from 172.18.0.9:40148: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:16.303 UTC [orderer.common.server] func1 -> DEBU 170e Closing Broadcast stream" +"2020-10-14 19:02:16.305 UTC [comm.grpc.server] 1 -> INFO 170f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:40148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=71.6136ms +"2020-10-14 19:02:16.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1710 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.306 UTC [grpc] infof -> DEBU 1711 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:16.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1712 Sending msg of 28 bytes to 2 on channel businesschannel took 14.3µs" +"2020-10-14 19:02:16.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1713 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-10-14 19:02:16.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1714 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64µs " +"2020-10-14 19:02:16.308 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1715 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2020-10-14 19:02:16.308 UTC [common.configtx] addToMap -> DEBU 1716 Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1717 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1718 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 1719 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171a Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171b Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171c Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171d Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.309 UTC [common.configtx] addToMap -> DEBU 171f Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1720 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1721 Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1722 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1723 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1724 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1725 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1726 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.310 UTC [common.configtx] addToMap -> DEBU 1727 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1728 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1729 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172b Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172c Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172d Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172e Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 172f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.311 UTC [common.configtx] addToMap -> DEBU 1730 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.312 UTC [common.configtx] addToMap -> DEBU 1731 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1732 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1733 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1734 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1735 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1736 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.312 UTC [common.configtx] verifyDeltaSet -> DEBU 1737 Processing change to key: [Group] /Channel/Application" +"2020-10-14 19:02:16.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1738 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.312 UTC [common.configtx] policyForItem -> DEBU 1739 Getting policy for item Application with mod_policy Admins" +"2020-10-14 19:02:16.313 UTC [orderer.common.cluster.step] sendMessage -> DEBU 173a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +"2020-10-14 19:02:16.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.315 UTC [orderer.common.cluster.step] handleMessage -> DEBU 173c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.313 UTC [policies] Manager -> DEBU 173d Manager Channel looking up path []" +"2020-10-14 19:02:16.316 UTC [policies] Manager -> DEBU 173e Manager Channel has managers Application" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 173f Manager Channel has managers Orderer" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1740 Manager Channel looking up path [Application]" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1741 Manager Channel has managers Application" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1742 Manager Channel has managers Orderer" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1743 Manager Channel/Application looking up path []" +"2020-10-14 19:02:16.317 UTC [policies] Manager -> DEBU 1744 Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:02:16.318 UTC [policies] Manager -> DEBU 1745 Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1746 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1747 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:16.318 UTC [policies] Evaluate -> DEBU 1748 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-10-14 19:02:16.319 UTC [cauthdsl] deduplicate -> WARN 1749 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-10-14 19:02:16.319 UTC [cauthdsl] func1 -> DEBU 174a 0xc0009ca7e0 gate 1602702136319082400 evaluation starts" +"2020-10-14 19:02:16.319 UTC [cauthdsl] func2 -> DEBU 174b 0xc0009ca7e0 signed by 0 principal evaluation starts (used [false false false])" +"2020-10-14 19:02:16.319 UTC [cauthdsl] func2 -> DEBU 174c 0xc0009ca7e0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174d 0xc0009ca7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174e 0xc0009ca7e0 processing identity 1 with bytes of fe2870" +"2020-10-14 19:02:16.320 UTC [cauthdsl] func2 -> DEBU 174f 0xc0009ca7e0 principal matched by identity 1" +"2020-10-14 19:02:16.320 UTC [msp.identity] Verify -> DEBU 1750 Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.|" +"2020-10-14 19:02:16.320 UTC [msp.identity] Verify -> DEBU 1751 Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +00000040 3e 72 c3 c7 24 c8 e9 |>r..$..|" +"2020-10-14 19:02:16.322 UTC [cauthdsl] func2 -> DEBU 1752 0xc0009ca7e0 principal evaluation succeeds for identity 1" +"2020-10-14 19:02:16.322 UTC [cauthdsl] func1 -> DEBU 1753 0xc0009ca7e0 gate 1602702136319082400 evaluation succeeds" +"2020-10-14 19:02:16.322 UTC [policies] Evaluate -> DEBU 1754 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.322 UTC [policies] Evaluate -> DEBU 1755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.323 UTC [policies] Evaluate -> DEBU 1756 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-10-14 19:02:16.323 UTC [cauthdsl] deduplicate -> WARN 1757 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-10-14 19:02:16.323 UTC [cauthdsl] func1 -> DEBU 1758 0xc0009caff0 gate 1602702136323775000 evaluation starts" +"2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 1759 0xc0009caff0 signed by 0 principal evaluation starts (used [false false false])" +"2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 175a 0xc0009caff0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:16.323 UTC [cauthdsl] func2 -> DEBU 175b 0xc0009caff0 principal matched by identity 0" +"2020-10-14 19:02:16.323 UTC [msp.identity] Verify -> DEBU 175c Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o|" +"2020-10-14 19:02:16.323 UTC [msp.identity] Verify -> DEBU 175d Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +00000040 44 52 2f 24 7d 8c |DR/$}.|" +"2020-10-14 19:02:16.324 UTC [cauthdsl] func2 -> DEBU 175e 0xc0009caff0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:16.324 UTC [cauthdsl] func1 -> DEBU 175f 0xc0009caff0 gate 1602702136323775000 evaluation succeeds" +"2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1760 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1762 Signature set satisfies policy /Channel/Application/Admins" +"2020-10-14 19:02:16.324 UTC [policies] Evaluate -> DEBU 1763 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-10-14 19:02:16.324 UTC [common.configtx] verifyDeltaSet -> DEBU 1764 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1765 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1766 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1767 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1768 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 1769 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.324 UTC [common.configtx] recurseConfigMap -> DEBU 176c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 176f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 1770 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.325 UTC [common.configtx] recurseConfigMap -> DEBU 1771 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1772 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1773 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1774 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.326 UTC [common.configtx] recurseConfigMap -> DEBU 1775 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1776 Setting policy for key LifecycleEndorsement to " +"2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1777 Setting policy for key Readers to " +"2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1778 Setting policy for key Writers to " +"2020-10-14 19:02:16.327 UTC [common.configtx] recurseConfigMap -> DEBU 1779 Setting policy for key Admins to " +"2020-10-14 19:02:16.328 UTC [common.configtx] recurseConfigMap -> DEBU 177a Setting policy for key Endorsement to " +"2020-10-14 19:02:16.328 UTC [common.configtx] recurseConfigMap -> DEBU 177b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.329 UTC [common.configtx] recurseConfigMap -> DEBU 177c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.329 UTC [common.configtx] recurseConfigMap -> DEBU 177d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-10-14 19:02:16.330 UTC [common.channelconfig] NewStandardValues -> DEBU 177e Initializing protos for *channelconfig.ChannelProtos" +"2020-10-14 19:02:16.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177f Processing field: HashingAlgorithm" +"2020-10-14 19:02:16.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1780 Processing field: BlockDataHashingStructure" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1781 Processing field: OrdererAddresses" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1782 Processing field: Consortium" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1783 Processing field: Capabilities" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] NewStandardValues -> DEBU 1784 Initializing protos for *channelconfig.ApplicationProtos" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1785 Processing field: ACLs" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1786 Processing field: Capabilities" +"2020-10-14 19:02:16.331 UTC [common.channelconfig] NewStandardValues -> DEBU 1787 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1788 Processing field: AnchorPeers" +"2020-10-14 19:02:16.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1789 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178a Processing field: MSP" +"2020-10-14 19:02:16.332 UTC [common.channelconfig] Validate -> DEBU 178b Anchor peers for org Org1MSP are anchor_peers: " +"2020-10-14 19:02:16.332 UTC [common.channelconfig] validateMSP -> DEBU 178c Setting up MSP for org Org1MSP" +"2020-10-14 19:02:16.333 UTC [msp] newBccspMsp -> DEBU 178d Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.333 UTC [msp] New -> DEBU 178e Creating Cache-MSP instance" +"2020-10-14 19:02:16.333 UTC [msp] Setup -> DEBU 178f Setting up MSP instance Org1MSP" +"2020-10-14 19:02:16.334 UTC [msp.identity] newIdentity -> DEBU 1790 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1791 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1792 Processing field: AnchorPeers" +"2020-10-14 19:02:16.335 UTC [common.channelconfig] NewStandardValues -> DEBU 1793 Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1794 Processing field: MSP" +"2020-10-14 19:02:16.335 UTC [common.channelconfig] Validate -> DEBU 1795 Anchor peers for org Org2MSP are anchor_peers: " +"2020-10-14 19:02:16.335 UTC [common.channelconfig] validateMSP -> DEBU 1796 Setting up MSP for org Org2MSP" +"2020-10-14 19:02:16.336 UTC [msp] newBccspMsp -> DEBU 1797 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.336 UTC [msp] New -> DEBU 1798 Creating Cache-MSP instance" +"2020-10-14 19:02:16.336 UTC [msp] Setup -> DEBU 1799 Setting up MSP instance Org2MSP" +"2020-10-14 19:02:16.337 UTC [msp.identity] newIdentity -> DEBU 179a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.337 UTC [common.channelconfig] NewStandardValues -> DEBU 179b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-10-14 19:02:16.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179c Processing field: AnchorPeers" +"2020-10-14 19:02:16.338 UTC [common.channelconfig] NewStandardValues -> DEBU 179d Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179e Processing field: MSP" +"2020-10-14 19:02:16.338 UTC [common.channelconfig] Validate -> DEBU 179f Anchor peers for org Org3MSP are " +"2020-10-14 19:02:16.339 UTC [common.channelconfig] validateMSP -> DEBU 17a0 Setting up MSP for org Org3MSP" +"2020-10-14 19:02:16.339 UTC [msp] newBccspMsp -> DEBU 17a1 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.339 UTC [msp] New -> DEBU 17a2 Creating Cache-MSP instance" +"2020-10-14 19:02:16.339 UTC [msp] Setup -> DEBU 17a3 Setting up MSP instance Org3MSP" +"2020-10-14 19:02:16.340 UTC [msp.identity] newIdentity -> DEBU 17a4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.341 UTC [common.channelconfig] NewStandardValues -> DEBU 17a5 Initializing protos for *channelconfig.OrdererProtos" +"2020-10-14 19:02:16.341 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a6 Processing field: ConsensusType" +"2020-10-14 19:02:16.341 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a7 Processing field: BatchSize" +"2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a8 Processing field: BatchTimeout" +"2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a9 Processing field: KafkaBrokers" +"2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17aa Processing field: ChannelRestrictions" +"2020-10-14 19:02:16.342 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ab Processing field: Capabilities" +"2020-10-14 19:02:16.347 UTC [common.channelconfig] NewStandardValues -> DEBU 17ac Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-10-14 19:02:16.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17ad Processing field: Endpoints" +"2020-10-14 19:02:16.347 UTC [common.channelconfig] NewStandardValues -> DEBU 17ae Initializing protos for *channelconfig.OrganizationProtos" +"2020-10-14 19:02:16.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17af Processing field: MSP" +"2020-10-14 19:02:16.347 UTC [common.channelconfig] validateMSP -> DEBU 17b0 Setting up MSP for org OrdererOrg" +"2020-10-14 19:02:16.347 UTC [msp] newBccspMsp -> DEBU 17b1 Creating BCCSP-based MSP instance" +"2020-10-14 19:02:16.347 UTC [msp] New -> DEBU 17b2 Creating Cache-MSP instance" +"2020-10-14 19:02:16.348 UTC [msp] Setup -> DEBU 17b3 Setting up MSP instance OrdererMSP" +"2020-10-14 19:02:16.349 UTC [msp.identity] newIdentity -> DEBU 17b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-10-14 19:02:16.350 UTC [msp] Setup -> DEBU 17b5 Setting up the MSP manager (4 msps)" +"2020-10-14 19:02:16.350 UTC [msp] Setup -> DEBU 17b6 MSP manager setup complete, setup 4 msps" +"2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b8 Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.351 UTC [policies] NewManagerImpl -> DEBU 17b9 Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17ba Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bb Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bc Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17bd Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-10-14 19:02:16.352 UTC [policies] NewManagerImpl -> DEBU 17be Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.353 UTC [policies] NewManagerImpl -> DEBU 17bf Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.353 UTC [policies] NewManagerImpl -> DEBU 17c0 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-10-14 19:02:16.353 UTC [policies] GetPolicy -> DEBU 17c1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.353 UTC [policies] GetPolicy -> DEBU 17c2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c3 Proposed new policy Endorsement for Channel/Application" +"2020-10-14 19:02:16.354 UTC [policies] GetPolicy -> DEBU 17c4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-10-14 19:02:16.354 UTC [policies] GetPolicy -> DEBU 17c5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c6 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c7 Proposed new policy Readers for Channel/Application" +"2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c8 Proposed new policy Writers for Channel/Application" +"2020-10-14 19:02:16.354 UTC [policies] NewManagerImpl -> DEBU 17c9 Proposed new policy Admins for Channel/Application" +"2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17ca Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cb Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cc Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.355 UTC [policies] NewManagerImpl -> DEBU 17cd Proposed new policy Readers for Channel/Orderer" +"2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17ce Proposed new policy Writers for Channel/Orderer" +"2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17cf Proposed new policy Admins for Channel/Orderer" +"2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17d0 Proposed new policy BlockValidation for Channel/Orderer" +"2020-10-14 19:02:16.356 UTC [policies] NewManagerImpl -> DEBU 17d1 Proposed new policy Writers for Channel" +"2020-10-14 19:02:16.357 UTC [policies] NewManagerImpl -> DEBU 17d2 Proposed new policy Admins for Channel" +"2020-10-14 19:02:16.357 UTC [policies] NewManagerImpl -> DEBU 17d3 Proposed new policy Readers for Channel" +"2020-10-14 19:02:16.357 UTC [common.configtx] addToMap -> DEBU 17d4 Adding to config map: [Group] /Channel" +"2020-10-14 19:02:16.357 UTC [common.configtx] addToMap -> DEBU 17d5 Adding to config map: [Group] /Channel/Application" +"2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-10-14 19:02:16.358 UTC [common.configtx] addToMap -> DEBU 17da Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17db Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17dc Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17dd Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-10-14 19:02:16.359 UTC [common.configtx] addToMap -> DEBU 17de Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17df Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-10-14 19:02:16.360 UTC [common.configtx] addToMap -> DEBU 17e2 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-10-14 19:02:16.361 UTC [common.configtx] addToMap -> DEBU 17e6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e8 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17e9 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17ea Adding to config map: [Policy] /Channel/Application/Admins" +"2020-10-14 19:02:16.362 UTC [common.configtx] addToMap -> DEBU 17eb Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ed Adding to config map: [Policy] /Channel/Application/Readers" +"2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ee Adding to config map: [Policy] /Channel/Application/Writers" +"2020-10-14 19:02:16.363 UTC [common.configtx] addToMap -> DEBU 17ef Adding to config map: [Group] /Channel/Orderer" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-10-14 19:02:16.364 UTC [common.configtx] addToMap -> DEBU 17f5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17f9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-10-14 19:02:16.365 UTC [common.configtx] addToMap -> DEBU 17fa Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fb Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fc Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fd Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17fe Adding to config map: [Value] /Channel/Capabilities" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 17ff Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-10-14 19:02:16.366 UTC [common.configtx] addToMap -> DEBU 1800 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1801 Adding to config map: [Value] /Channel/Consortium" +"2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1802 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1803 Adding to config map: [Policy] /Channel/Writers" +"2020-10-14 19:02:16.368 UTC [common.configtx] addToMap -> DEBU 1804 Adding to config map: [Policy] /Channel/Admins" +"2020-10-14 19:02:16.369 UTC [common.configtx] addToMap -> DEBU 1805 Adding to config map: [Policy] /Channel/Readers" +"2020-10-14 19:02:16.370 UTC [common.channelconfig] LogSanityChecks -> DEBU 1806 As expected, current configuration has policy '/Channel/Readers'" +"2020-10-14 19:02:16.370 UTC [common.channelconfig] LogSanityChecks -> DEBU 1807 As expected, current configuration has policy '/Channel/Writers'" +"2020-10-14 19:02:16.370 UTC [policies] Manager -> DEBU 1808 Manager Channel looking up path [Application]" +"2020-10-14 19:02:16.370 UTC [policies] Manager -> DEBU 1809 Manager Channel has managers Application" +"2020-10-14 19:02:16.371 UTC [policies] Manager -> DEBU 180a Manager Channel has managers Orderer" +"2020-10-14 19:02:16.371 UTC [policies] Manager -> DEBU 180b Manager Channel/Application looking up path []" +"2020-10-14 19:02:16.372 UTC [policies] Manager -> DEBU 180c Manager Channel/Application has managers Org3MSP" +"2020-10-14 19:02:16.372 UTC [policies] Manager -> DEBU 180d Manager Channel/Application has managers Org1MSP" +"2020-10-14 19:02:16.373 UTC [policies] Manager -> DEBU 180e Manager Channel/Application has managers Org2MSP" +"2020-10-14 19:02:16.373 UTC [common.channelconfig] LogSanityChecks -> DEBU 180f As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-10-14 19:02:16.374 UTC [common.channelconfig] LogSanityChecks -> DEBU 1810 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-10-14 19:02:16.375 UTC [common.channelconfig] LogSanityChecks -> DEBU 1811 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-10-14 19:02:16.375 UTC [policies] Manager -> DEBU 1812 Manager Channel looking up path [Orderer]" +"2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1813 Manager Channel has managers Application" +"2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1814 Manager Channel has managers Orderer" +"2020-10-14 19:02:16.377 UTC [policies] Manager -> DEBU 1815 Manager Channel/Orderer looking up path []" +"2020-10-14 19:02:16.378 UTC [policies] Manager -> DEBU 1816 Manager Channel/Orderer has managers OrdererOrg" +"2020-10-14 19:02:16.378 UTC [common.channelconfig] LogSanityChecks -> DEBU 1817 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-10-14 19:02:16.380 UTC [common.channelconfig] LogSanityChecks -> DEBU 1818 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-10-14 19:02:16.380 UTC [common.channelconfig] LogSanityChecks -> DEBU 1819 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-10-14 19:02:16.384 UTC [common.channelconfig] LogSanityChecks -> DEBU 181a As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-10-14 19:02:16.385 UTC [common.capabilities] Supported -> DEBU 181b Orderer capability V1_4_2 is supported and is enabled" +"2020-10-14 19:02:16.385 UTC [common.capabilities] Supported -> DEBU 181c Channel capability V1_4_3 is supported and is enabled" +"2020-10-14 19:02:16.386 UTC [orderer.common.server] func1 -> DEBU 181d Executing callback to update root CAs" +"2020-10-14 19:02:16.386 UTC [orderer.common.server] updateTrustedRoots -> DEBU 181e updating root CAs for channel [businesschannel]" +"2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 181f adding app root CAs for MSP [Org1MSP]" +"2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1820 adding app root CAs for MSP [Org2MSP]" +"2020-10-14 19:02:16.390 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1821 adding app root CAs for MSP [Org3MSP]" +"2020-10-14 19:02:16.391 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1822 adding orderer root CAs for MSP [OrdererMSP]" +"2020-10-14 19:02:16.395 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1823 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2020-10-14 19:02:16.395 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1824 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2020-10-14 19:02:16.395 UTC [msp] GetDefaultSigningIdentity -> DEBU 1825 Obtaining default signing identity" +"2020-10-14 19:02:16.396 UTC [msp] GetDefaultSigningIdentity -> DEBU 1826 Obtaining default signing identity" +"2020-10-14 19:02:16.397 UTC [msp.identity] Sign -> DEBU 1827 Sign: plaintext: 0A020806120B0A090A03010203100418...BBBAFCF6E4EA2CC06FE6C077F6D5BA8E " +"2020-10-14 19:02:16.397 UTC [msp.identity] Sign -> DEBU 1828 Sign: digest: D0047FC98F5A7C169727C7E88C305EE9084D4EA50CB63B38B3C5B826527473FD " +"2020-10-14 19:02:16.404 UTC [fsblkstorage] indexBlock -> DEBU 1829 Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +]" +"2020-10-14 19:02:16.408 UTC [fsblkstorage] updateCheckpoint -> DEBU 182a Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138568], isChainEmpty=[false], lastBlockNumber=[6]" +"2020-10-14 19:02:16.408 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 182b [channel: businesschannel] Wrote block [6]" +"2020-10-14 19:02:16.517 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:16.518 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 182d Sending msg of 28 bytes to 3 on channel testchainid took 14.9µs" +"2020-10-14 19:02:16.518 UTC [orderer.common.cluster.step] sendMessage -> DEBU 182e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.8µs " +"2020-10-14 19:02:16.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 182f Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +"2020-10-14 19:02:16.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1830 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2020-10-14 19:02:16.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1831 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.4µs " +"2020-10-14 19:02:16.624 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1832 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.8µs " +"2020-10-14 19:02:16.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1833 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:16.625 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1834 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:17.019 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1835 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:17.020 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1836 Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" +"2020-10-14 19:02:17.021 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1837 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 617.7µs " +"2020-10-14 19:02:17.124 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1838 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +"2020-10-14 19:02:17.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 183a Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +"2020-10-14 19:02:17.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU 183b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0088ms " +"2020-10-14 19:02:17.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1839 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 679.2µs " +"2020-10-14 19:02:17.128 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:17.130 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:17.518 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:17.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 183f Sending msg of 28 bytes to 3 on channel testchainid took 836µs" +"2020-10-14 19:02:17.520 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1840 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.7µs " +"2020-10-14 19:02:17.623 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1841 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2020-10-14 19:02:17.624 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1842 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +"2020-10-14 19:02:17.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.3µs " +"2020-10-14 19:02:17.625 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1844 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6575ms " +"2020-10-14 19:02:17.628 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1845 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:17.630 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1846 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:17.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1847 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:17.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1848 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-10-14 19:02:17.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1849 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.6µs " +"2020-10-14 19:02:18.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184a Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2020-10-14 19:02:18.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184b Sending msg of 28 bytes to 3 on channel businesschannel took 64µs" +"2020-10-14 19:02:18.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.9µs " +"2020-10-14 19:02:18.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +"2020-10-14 19:02:18.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:18.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:18.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1850 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:18.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1851 Sending msg of 28 bytes to 3 on channel testchainid took 50µs" +"2020-10-14 19:02:18.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1852 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557.5µs " +"2020-10-14 19:02:18.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1853 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-10-14 19:02:18.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1854 Sending msg of 28 bytes to 3 on channel businesschannel took 41µs" +"2020-10-14 19:02:18.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1855 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 332.4µs " +"2020-10-14 19:02:18.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1856 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.8µs " +"2020-10-14 19:02:18.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1857 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:18.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1858 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:18.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1859 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:18.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185a Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +"2020-10-14 19:02:18.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.9µs " +"2020-10-14 19:02:19.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185c Sending msg of 28 bytes to 2 on channel businesschannel took 126.1µs" +"2020-10-14 19:02:19.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185d Sending msg of 28 bytes to 3 on channel businesschannel took 115.7µs" +"2020-10-14 19:02:19.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 171.7µs " +"2020-10-14 19:02:19.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.9µs " +"2020-10-14 19:02:19.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1860 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:19.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1861 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:19.404 UTC [orderer.common.server] Deliver -> DEBU 1862 Starting new Deliver handler" +"2020-10-14 19:02:19.404 UTC [common.deliver] Handle -> DEBU 1863 Starting new deliver loop for 172.18.0.9:40176" +"2020-10-14 19:02:19.404 UTC [common.deliver] Handle -> DEBU 1864 Attempting to read seek info message from 172.18.0.9:40176" +"2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1865 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1866 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1867 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1868 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:19.405 UTC [policies] Evaluate -> DEBU 1869 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:19.405 UTC [msp] DeserializeIdentity -> DEBU 186a Obtaining identity" +"2020-10-14 19:02:19.406 UTC [msp.identity] newIdentity -> DEBU 186b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-10-14 19:02:19.406 UTC [cauthdsl] func1 -> DEBU 186c 0xc000589320 gate 1602702139406775700 evaluation starts" +"2020-10-14 19:02:19.406 UTC [cauthdsl] func2 -> DEBU 186d 0xc000589320 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:19.406 UTC [cauthdsl] func2 -> DEBU 186e 0xc000589320 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:19.407 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 186f Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-10-14 19:02:19.407 UTC [msp] Validate -> DEBU 1870 MSP OrdererMSP validating identity" +"2020-10-14 19:02:19.407 UTC [msp] getCertificationChain -> DEBU 1871 MSP OrdererMSP getting certification chain" +"2020-10-14 19:02:19.407 UTC [cauthdsl] func2 -> DEBU 1872 0xc000589320 principal matched by identity 0" +"2020-10-14 19:02:19.408 UTC [msp.identity] Verify -> DEBU 1873 Verify: digest = 00000000 0b c9 41 b4 5f 04 e8 7e aa 7b 0e 7e af fd 65 ce |..A._..~.{.~..e.| +00000010 43 8b 38 70 05 48 ee fb 49 ba 3b 0c ad 66 46 17 |C.8p.H..I.;..fF.|" +"2020-10-14 19:02:19.408 UTC [msp.identity] Verify -> DEBU 1874 Verify: sig = 00000000 30 44 02 20 03 b0 b8 f7 09 f1 a0 cb 19 20 a8 7c |0D. ......... .|| +00000010 dc 65 f5 88 78 3b 02 c7 99 7c dd de a5 a0 5c 8e |.e..x;...|....\.| +00000020 06 78 19 43 02 20 72 18 47 52 ff cb 1f 1e 56 10 |.x.C. r.GR....V.| +00000030 c0 a8 ef 51 63 74 17 8c fd a0 21 f5 8e b4 de fd |...Qct....!.....| +00000040 f4 56 0b 57 a6 cb |.V.W..|" +"2020-10-14 19:02:19.408 UTC [cauthdsl] func2 -> DEBU 1875 0xc000589320 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:19.408 UTC [cauthdsl] func1 -> DEBU 1876 0xc000589320 gate 1602702139406775700 evaluation succeeds" +"2020-10-14 19:02:19.408 UTC [policies] Evaluate -> DEBU 1877 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:19.408 UTC [policies] Evaluate -> DEBU 1878 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 1879 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187b Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:19.409 UTC [policies] Evaluate -> DEBU 187c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:19.409 UTC [common.deliver] deliverBlocks -> DEBU 187d [channel: businesschannel] Received seekInfo (0xc00132a080) start: > stop: > from 172.18.0.9:40176" +"2020-10-14 19:02:19.409 UTC [fsblkstorage] Next -> DEBU 187e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:19.410 UTC [fsblkstorage] newBlockfileStream -> DEBU 187f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1880 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1881 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:19.410 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1882 blockbytes [41176] read from file [0]" +"2020-10-14 19:02:19.411 UTC [common.deliver] deliverBlocks -> DEBU 1883 [channel: businesschannel] Delivering block [6] for (0xc00132a080) for 172.18.0.9:40176" +"2020-10-14 19:02:19.412 UTC [common.deliver] deliverBlocks -> DEBU 1884 [channel: businesschannel] Done delivering to 172.18.0.9:40176 for (0xc00132a080)" +"2020-10-14 19:02:19.412 UTC [common.deliver] Handle -> DEBU 1885 Waiting for new SeekInfo from 172.18.0.9:40176" +"2020-10-14 19:02:19.412 UTC [common.deliver] Handle -> DEBU 1886 Attempting to read seek info message from 172.18.0.9:40176" +"2020-10-14 19:02:19.420 UTC [grpc] infof -> DEBU 1887 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:19.420 UTC [common.deliver] Handle -> WARN 1888 Error reading from 172.18.0.9:40176: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:19.420 UTC [orderer.common.server] func1 -> DEBU 1889 Closing Deliver stream" +"2020-10-14 19:02:19.421 UTC [comm.grpc.server] 1 -> INFO 188a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0143ms +"2020-10-14 19:02:19.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188c Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-10-14 19:02:19.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 453.6µs " +"2020-10-14 19:02:19.559 UTC [orderer.common.server] Deliver -> DEBU 188e Starting new Deliver handler" +"2020-10-14 19:02:19.559 UTC [common.deliver] Handle -> DEBU 188f Starting new deliver loop for 172.18.0.9:40178" +"2020-10-14 19:02:19.559 UTC [common.deliver] Handle -> DEBU 1890 Attempting to read seek info message from 172.18.0.9:40178" +"2020-10-14 19:02:19.560 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1892 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1893 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1894 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:19.561 UTC [policies] Evaluate -> DEBU 1895 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:19.561 UTC [cauthdsl] func1 -> DEBU 1896 0xc000c6e370 gate 1602702139561794800 evaluation starts" +"2020-10-14 19:02:19.561 UTC [cauthdsl] func2 -> DEBU 1897 0xc000c6e370 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:19.562 UTC [cauthdsl] func2 -> DEBU 1898 0xc000c6e370 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:19.562 UTC [cauthdsl] func2 -> DEBU 1899 0xc000c6e370 principal matched by identity 0" +"2020-10-14 19:02:19.562 UTC [msp.identity] Verify -> DEBU 189a Verify: digest = 00000000 34 b5 e9 de cc ac 48 65 dc 25 01 7c d2 21 87 7f |4.....He.%.|.!..| +00000010 d0 2e 33 18 02 51 86 41 19 7d 18 b3 0f 1e f5 4e |..3..Q.A.}.....N|" +"2020-10-14 19:02:19.563 UTC [msp.identity] Verify -> DEBU 189b Verify: sig = 00000000 30 44 02 20 1c aa 25 72 87 6f 61 8c 3b 72 eb c2 |0D. ..%r.oa.;r..| +00000010 c2 ba 97 21 15 05 3e bd 42 81 70 a2 7a 94 13 30 |...!..>.B.p.z..0| +00000020 1b d9 95 51 02 20 26 6a f9 e9 61 ca 9e 07 73 74 |...Q. &j..a...st| +00000030 ed f8 50 e1 05 b2 73 34 b1 39 a1 dd 7f da 12 3f |..P...s4.9.....?| +00000040 74 62 05 84 90 8a |tb....|" +"2020-10-14 19:02:19.563 UTC [cauthdsl] func2 -> DEBU 189c 0xc000c6e370 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:19.563 UTC [cauthdsl] func1 -> DEBU 189d 0xc000c6e370 gate 1602702139561794800 evaluation succeeds" +"2020-10-14 19:02:19.563 UTC [policies] Evaluate -> DEBU 189e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 189f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a0 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a2 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:19.564 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:19.565 UTC [common.deliver] deliverBlocks -> DEBU 18a4 [channel: businesschannel] Received seekInfo (0xc00045a040) start: > stop: > from 172.18.0.9:40178" +"2020-10-14 19:02:19.565 UTC [fsblkstorage] Next -> DEBU 18a5 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:19.566 UTC [fsblkstorage] newBlockfileStream -> DEBU 18a6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:19.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a7 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:19.566 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a8 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:19.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18a9 blockbytes [41176] read from file [0]" +"2020-10-14 19:02:19.567 UTC [common.deliver] deliverBlocks -> DEBU 18aa [channel: businesschannel] Delivering block [6] for (0xc00045a040) for 172.18.0.9:40178" +"2020-10-14 19:02:19.567 UTC [common.deliver] deliverBlocks -> DEBU 18ab [channel: businesschannel] Done delivering to 172.18.0.9:40178 for (0xc00045a040)" +"2020-10-14 19:02:19.568 UTC [common.deliver] Handle -> DEBU 18ac Waiting for new SeekInfo from 172.18.0.9:40178" +"2020-10-14 19:02:19.568 UTC [common.deliver] Handle -> DEBU 18ad Attempting to read seek info message from 172.18.0.9:40178" +"2020-10-14 19:02:19.572 UTC [common.deliver] Handle -> WARN 18ae Error reading from 172.18.0.9:40178: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:19.572 UTC [orderer.common.server] func1 -> DEBU 18af Closing Deliver stream" +"2020-10-14 19:02:19.572 UTC [comm.grpc.server] 1 -> INFO 18b0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.5646ms +"2020-10-14 19:02:19.573 UTC [grpc] infof -> DEBU 18b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:19.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b2 Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +"2020-10-14 19:02:19.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b3 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +"2020-10-14 19:02:19.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 321.2µs " +"2020-10-14 19:02:19.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 498.5µs " +"2020-10-14 19:02:19.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:19.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b7 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:19.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18b8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:19.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18b9 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-10-14 19:02:19.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 343.1µs " +"2020-10-14 19:02:20.005 UTC [orderer.common.server] Deliver -> DEBU 18bb Starting new Deliver handler" +"2020-10-14 19:02:20.005 UTC [common.deliver] Handle -> DEBU 18bc Starting new deliver loop for 172.18.0.9:40180" +"2020-10-14 19:02:20.005 UTC [common.deliver] Handle -> DEBU 18bd Attempting to read seek info message from 172.18.0.9:40180" +"2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.007 UTC [policies] Evaluate -> DEBU 18c2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.007 UTC [cauthdsl] func1 -> DEBU 18c3 0xc000ce5570 gate 1602702140007760800 evaluation starts" +"2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c4 0xc000ce5570 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c5 0xc000ce5570 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.008 UTC [cauthdsl] func2 -> DEBU 18c6 0xc000ce5570 principal matched by identity 0" +"2020-10-14 19:02:20.008 UTC [msp.identity] Verify -> DEBU 18c7 Verify: digest = 00000000 0f 8f b0 1d 05 d3 c5 92 a4 0a cd 71 0f 43 e5 d6 |...........q.C..| +00000010 a6 04 d1 35 70 14 98 28 b4 49 2f cb 0b 72 da e6 |...5p..(.I/..r..|" +"2020-10-14 19:02:20.009 UTC [msp.identity] Verify -> DEBU 18c8 Verify: sig = 00000000 30 44 02 20 61 b7 c5 ea e2 e2 df f0 30 a8 88 b1 |0D. a.......0...| +00000010 b9 5b ff 51 f6 2d ee 32 57 c8 ed 3e 14 60 03 58 |.[.Q.-.2W..>.`.X| +00000020 8d 6a fd 81 02 20 02 b0 cb d7 17 47 59 1e 35 06 |.j... .....GY.5.| +00000030 f5 6c ad 58 49 cf a0 ff 74 1b 7e d7 e3 04 1c e0 |.l.XI...t.~.....| +00000040 e2 6b 94 c7 5f 4d |.k.._M|" +"2020-10-14 19:02:20.009 UTC [cauthdsl] func2 -> DEBU 18c9 0xc000ce5570 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.009 UTC [cauthdsl] func1 -> DEBU 18ca 0xc000ce5570 gate 1602702140007760800 evaluation succeeds" +"2020-10-14 19:02:20.009 UTC [policies] Evaluate -> DEBU 18cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cd Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18cf Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.010 UTC [policies] Evaluate -> DEBU 18d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.011 UTC [common.deliver] deliverBlocks -> DEBU 18d1 [channel: businesschannel] Received seekInfo (0xc00132ac80) start: > stop: > from 172.18.0.9:40180" +"2020-10-14 19:02:20.011 UTC [fsblkstorage] Next -> DEBU 18d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.011 UTC [fsblkstorage] newBlockfileStream -> DEBU 18d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d4 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:20.012 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d6 blockbytes [41176] read from file [0]" +"2020-10-14 19:02:20.013 UTC [common.deliver] deliverBlocks -> DEBU 18d7 [channel: businesschannel] Delivering block [6] for (0xc00132ac80) for 172.18.0.9:40180" +"2020-10-14 19:02:20.013 UTC [common.deliver] deliverBlocks -> DEBU 18d8 [channel: businesschannel] Done delivering to 172.18.0.9:40180 for (0xc00132ac80)" +"2020-10-14 19:02:20.014 UTC [common.deliver] Handle -> DEBU 18d9 Waiting for new SeekInfo from 172.18.0.9:40180" +"2020-10-14 19:02:20.015 UTC [common.deliver] Handle -> DEBU 18da Attempting to read seek info message from 172.18.0.9:40180" +"2020-10-14 19:02:20.019 UTC [grpc] infof -> DEBU 18db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:20.020 UTC [common.deliver] Handle -> WARN 18dc Error reading from 172.18.0.9:40180: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:20.020 UTC [orderer.common.server] func1 -> DEBU 18dd Closing Deliver stream" +"2020-10-14 19:02:20.020 UTC [comm.grpc.server] 1 -> INFO 18de streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2676ms +"2020-10-14 19:02:20.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18df Sending msg of 28 bytes to 2 on channel businesschannel took 63.3µs" +"2020-10-14 19:02:20.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18e0 Sending msg of 28 bytes to 3 on channel businesschannel took 18.1µs" +"2020-10-14 19:02:20.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.1µs " +"2020-10-14 19:02:20.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.3µs " +"2020-10-14 19:02:20.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18e3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:20.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18e4 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:20.285 UTC [orderer.common.server] Deliver -> DEBU 18e5 Starting new Deliver handler" +"2020-10-14 19:02:20.285 UTC [common.deliver] Handle -> DEBU 18e6 Starting new deliver loop for 172.18.0.9:40182" +"2020-10-14 19:02:20.285 UTC [common.deliver] Handle -> DEBU 18e7 Attempting to read seek info message from 172.18.0.9:40182" +"2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.286 UTC [policies] Evaluate -> DEBU 18ec == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.287 UTC [cauthdsl] func1 -> DEBU 18ed 0xc000dae030 gate 1602702140286901900 evaluation starts" +"2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18ee 0xc000dae030 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18ef 0xc000dae030 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.287 UTC [cauthdsl] func2 -> DEBU 18f0 0xc000dae030 principal matched by identity 0" +"2020-10-14 19:02:20.287 UTC [msp.identity] Verify -> DEBU 18f1 Verify: digest = 00000000 ae 52 15 22 38 b4 fc 15 82 c5 33 4b fc 00 e2 0a |.R."8.....3K....| +00000010 f9 6b 5f 29 77 48 18 05 03 60 d0 cf af c0 64 32 |.k_)wH...`....d2|" +"2020-10-14 19:02:20.287 UTC [msp.identity] Verify -> DEBU 18f2 Verify: sig = 00000000 30 44 02 20 62 8e 74 e9 12 a0 e9 15 d6 c7 d1 b7 |0D. b.t.........| +00000010 ef 7e 50 f8 66 1b 90 62 43 2d 0d d4 8b c1 40 ff |.~P.f..bC-....@.| +00000020 ba 4b f3 88 02 20 09 ae 3f 49 12 3d 27 c3 f5 03 |.K... ..?I.='...| +00000030 d0 87 31 e6 12 46 a1 c2 f8 ba b8 a6 c3 c2 ea 92 |..1..F..........| +00000040 7b 29 54 aa c0 31 |{)T..1|" +"2020-10-14 19:02:20.288 UTC [cauthdsl] func2 -> DEBU 18f3 0xc000dae030 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.288 UTC [cauthdsl] func1 -> DEBU 18f4 0xc000dae030 gate 1602702140286901900 evaluation succeeds" +"2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f7 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.288 UTC [policies] Evaluate -> DEBU 18f9 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.289 UTC [policies] Evaluate -> DEBU 18fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.289 UTC [common.deliver] deliverBlocks -> DEBU 18fb [channel: businesschannel] Received seekInfo (0xc00132b500) start: > stop: > from 172.18.0.9:40182" +"2020-10-14 19:02:20.289 UTC [fsblkstorage] Next -> DEBU 18fc Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.289 UTC [fsblkstorage] newBlockfileStream -> DEBU 18fd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:20.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18fe Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:20.290 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18ff Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:20.290 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1900 blockbytes [41176] read from file [0]" +"2020-10-14 19:02:20.290 UTC [common.deliver] deliverBlocks -> DEBU 1901 [channel: businesschannel] Delivering block [6] for (0xc00132b500) for 172.18.0.9:40182" +"2020-10-14 19:02:20.291 UTC [common.deliver] deliverBlocks -> DEBU 1902 [channel: businesschannel] Done delivering to 172.18.0.9:40182 for (0xc00132b500)" +"2020-10-14 19:02:20.291 UTC [common.deliver] Handle -> DEBU 1903 Waiting for new SeekInfo from 172.18.0.9:40182" +"2020-10-14 19:02:20.291 UTC [common.deliver] Handle -> DEBU 1904 Attempting to read seek info message from 172.18.0.9:40182" +"2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1905 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1906 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1907 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1908 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.295 UTC [policies] Evaluate -> DEBU 1909 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.295 UTC [cauthdsl] func1 -> DEBU 190a 0xc000cf3020 gate 1602702140295587800 evaluation starts" +"2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190b 0xc000cf3020 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190c 0xc000cf3020 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.295 UTC [cauthdsl] func2 -> DEBU 190d 0xc000cf3020 principal matched by identity 0" +"2020-10-14 19:02:20.296 UTC [msp.identity] Verify -> DEBU 190e Verify: digest = 00000000 06 58 b3 77 6f 61 46 82 94 b1 68 3c 0c 06 5a be |.X.woaF...h<..Z.| +00000010 9c b0 e6 da a8 cb 60 0a 43 5f e8 39 4a 12 d2 1d |......`.C_.9J...|" +"2020-10-14 19:02:20.296 UTC [msp.identity] Verify -> DEBU 190f Verify: sig = 00000000 30 45 02 21 00 d9 2a e4 28 dc df c0 41 ee c8 7a |0E.!..*.(...A..z| +00000010 1e 76 3d fb e8 8c 17 87 5e d9 4c 97 72 34 7c 19 |.v=.....^.L.r4|.| +00000020 59 c9 9a cb bf 02 20 3b 31 26 b3 0c f7 a4 f0 1f |Y..... ;1&......| +00000030 e8 38 88 ac 0d 23 e0 33 0b 6f 65 eb 0a 79 e1 37 |.8...#.3.oe..y.7| +00000040 35 fe 9c c6 8d d2 ff |5......|" +"2020-10-14 19:02:20.297 UTC [cauthdsl] func2 -> DEBU 1910 0xc000cf3020 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.297 UTC [cauthdsl] func1 -> DEBU 1911 0xc000cf3020 gate 1602702140295587800 evaluation succeeds" +"2020-10-14 19:02:20.297 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.297 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1914 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1915 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1916 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.298 UTC [policies] Evaluate -> DEBU 1917 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.298 UTC [common.deliver] deliverBlocks -> DEBU 1918 [channel: businesschannel] Received seekInfo (0xc00045abc0) start: > stop: > from 172.18.0.9:40182" +"2020-10-14 19:02:20.298 UTC [fsblkstorage] Next -> DEBU 1919 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.298 UTC [fsblkstorage] newBlockfileStream -> DEBU 191a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191b Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191c Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:20.299 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 191d blockbytes [41176] read from file [0]" +"2020-10-14 19:02:20.299 UTC [common.deliver] deliverBlocks -> DEBU 191e [channel: businesschannel] Delivering block [6] for (0xc00045abc0) for 172.18.0.9:40182" +"2020-10-14 19:02:20.300 UTC [common.deliver] deliverBlocks -> DEBU 191f [channel: businesschannel] Done delivering to 172.18.0.9:40182 for (0xc00045abc0)" +"2020-10-14 19:02:20.300 UTC [common.deliver] Handle -> DEBU 1920 Waiting for new SeekInfo from 172.18.0.9:40182" +"2020-10-14 19:02:20.300 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 172.18.0.9:40182" +"2020-10-14 19:02:20.306 UTC [common.deliver] Handle -> WARN 1922 Error reading from 172.18.0.9:40182: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:20.306 UTC [orderer.common.server] func1 -> DEBU 1924 Closing Deliver stream" +"2020-10-14 19:02:20.306 UTC [comm.grpc.server] 1 -> INFO 1925 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.2078ms +"2020-10-14 19:02:20.306 UTC [grpc] infof -> DEBU 1923 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:20.475 UTC [orderer.common.server] Deliver -> DEBU 1926 Starting new Deliver handler" +"2020-10-14 19:02:20.475 UTC [common.deliver] Handle -> DEBU 1927 Starting new deliver loop for 172.18.0.9:40184" +"2020-10-14 19:02:20.475 UTC [common.deliver] Handle -> DEBU 1928 Attempting to read seek info message from 172.18.0.9:40184" +"2020-10-14 19:02:20.476 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.477 UTC [policies] Evaluate -> DEBU 192d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.477 UTC [cauthdsl] func1 -> DEBU 192e 0xc001040600 gate 1602702140477772100 evaluation starts" +"2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 192f 0xc001040600 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 1930 0xc001040600 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.478 UTC [cauthdsl] func2 -> DEBU 1931 0xc001040600 principal matched by identity 0" +"2020-10-14 19:02:20.478 UTC [msp.identity] Verify -> DEBU 1932 Verify: digest = 00000000 e0 76 be 9d 98 45 71 02 8a ac 4d 9f 1c c5 65 74 |.v...Eq...M...et| +00000010 02 a2 1c 99 4f f2 6d 49 b7 12 c9 11 b3 44 c6 18 |....O.mI.....D..|" +"2020-10-14 19:02:20.478 UTC [msp.identity] Verify -> DEBU 1933 Verify: sig = 00000000 30 45 02 21 00 e7 b2 9d f9 ce c6 d1 5f 94 c3 be |0E.!........_...| +00000010 0e 4c e1 e1 25 c6 56 4c a0 92 28 f2 49 9e af 8b |.L..%.VL..(.I...| +00000020 3d 41 f0 03 7d 02 20 40 59 78 05 0b bd 48 f0 df |=A..}. @Yx...H..| +00000030 d6 2c 5d 97 5e f8 4f d1 b3 91 af 80 bd 0f 3c 3b |.,].^.O.......<;| +00000040 97 e3 c6 2d ec 49 f8 |...-.I.|" +"2020-10-14 19:02:20.479 UTC [cauthdsl] func2 -> DEBU 1934 0xc001040600 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.479 UTC [cauthdsl] func1 -> DEBU 1935 0xc001040600 gate 1602702140477772100 evaluation succeeds" +"2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1936 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1937 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1938 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 1939 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.479 UTC [policies] Evaluate -> DEBU 193a Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.480 UTC [policies] Evaluate -> DEBU 193b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.480 UTC [common.deliver] deliverBlocks -> DEBU 193c [channel: businesschannel] Received seekInfo (0xc00132bc80) start: > stop: > from 172.18.0.9:40184" +"2020-10-14 19:02:20.480 UTC [fsblkstorage] Next -> DEBU 193d Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 193e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 193f Remaining bytes=[138568], Going to peek [8] bytes" +"2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1940 Returning blockbytes - length=[28471], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:20.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1941 blockbytes [28471] read from file [0]" +"2020-10-14 19:02:20.481 UTC [common.deliver] deliverBlocks -> DEBU 1942 [channel: businesschannel] Delivering block [0] for (0xc00132bc80) for 172.18.0.9:40184" +"2020-10-14 19:02:20.482 UTC [common.deliver] deliverBlocks -> DEBU 1943 [channel: businesschannel] Done delivering to 172.18.0.9:40184 for (0xc00132bc80)" +"2020-10-14 19:02:20.482 UTC [common.deliver] Handle -> DEBU 1944 Waiting for new SeekInfo from 172.18.0.9:40184" +"2020-10-14 19:02:20.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1946 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:20.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1947 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2020-10-14 19:02:20.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1948 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242µs " +"2020-10-14 19:02:20.482 UTC [common.deliver] Handle -> DEBU 1945 Attempting to read seek info message from 172.18.0.9:40184" +"2020-10-14 19:02:20.494 UTC [common.deliver] Handle -> WARN 1949 Error reading from 172.18.0.9:40184: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:20.494 UTC [orderer.common.server] func1 -> DEBU 194b Closing Deliver stream" +"2020-10-14 19:02:20.494 UTC [comm.grpc.server] 1 -> INFO 194c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5779ms +"2020-10-14 19:02:20.494 UTC [grpc] infof -> DEBU 194a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:20.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194d Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-10-14 19:02:20.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 194e Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-10-14 19:02:20.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 194f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 263.1µs " +"2020-10-14 19:02:20.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1950 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.6µs " +"2020-10-14 19:02:20.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1951 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:20.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1952 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:20.726 UTC [orderer.common.server] Deliver -> DEBU 1953 Starting new Deliver handler" +"2020-10-14 19:02:20.726 UTC [common.deliver] Handle -> DEBU 1954 Starting new deliver loop for 172.18.0.9:40186" +"2020-10-14 19:02:20.726 UTC [common.deliver] Handle -> DEBU 1955 Attempting to read seek info message from 172.18.0.9:40186" +"2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1956 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1957 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1958 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 1959 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.727 UTC [policies] Evaluate -> DEBU 195a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.727 UTC [cauthdsl] func1 -> DEBU 195b 0xc000ebffd0 gate 1602702140727385800 evaluation starts" +"2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195c 0xc000ebffd0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195d 0xc000ebffd0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.727 UTC [cauthdsl] func2 -> DEBU 195e 0xc000ebffd0 principal matched by identity 0" +"2020-10-14 19:02:20.728 UTC [msp.identity] Verify -> DEBU 195f Verify: digest = 00000000 7e 14 bd a0 e6 22 8c 0a 8d 1a 40 d8 fc b2 c1 0f |~...."....@.....| +00000010 e5 a5 5b e7 30 df 82 73 af 99 8d df 39 f9 6e 5e |..[.0..s....9.n^|" +"2020-10-14 19:02:20.728 UTC [msp.identity] Verify -> DEBU 1960 Verify: sig = 00000000 30 45 02 21 00 bf 31 2d 35 49 2e 5b dd f9 c8 8c |0E.!..1-5I.[....| +00000010 a0 ac 2b 9a 5e 79 ca 9e 50 57 d3 ca fb 42 49 a7 |..+.^y..PW...BI.| +00000020 40 bc 62 18 78 02 20 26 36 97 be ce ed 76 00 07 |@.b.x. &6....v..| +00000030 85 fe 2f 60 5c 1d eb 72 f3 d0 97 fc e6 e0 bf 01 |../`\..r........| +00000040 82 eb fe 2a 9f 2a fb |...*.*.|" +"2020-10-14 19:02:20.728 UTC [cauthdsl] func2 -> DEBU 1961 0xc000ebffd0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.728 UTC [cauthdsl] func1 -> DEBU 1962 0xc000ebffd0 gate 1602702140727385800 evaluation succeeds" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1963 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1964 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1965 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1966 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1967 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.728 UTC [policies] Evaluate -> DEBU 1968 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.729 UTC [common.deliver] deliverBlocks -> DEBU 1969 [channel: businesschannel] Received seekInfo (0xc00045b740) start: > stop: > from 172.18.0.9:40186" +"2020-10-14 19:02:20.729 UTC [fsblkstorage] Next -> DEBU 196a Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.729 UTC [fsblkstorage] newBlockfileStream -> DEBU 196b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28474]" +"2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196c Remaining bytes=[110094], Going to peek [8] bytes" +"2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196d Returning blockbytes - length=[28164], placementInfo={fileNum=[0], startOffset=[28474], bytesOffset=[28477]}" +"2020-10-14 19:02:20.730 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196e blockbytes [28164] read from file [0]" +"2020-10-14 19:02:20.730 UTC [common.deliver] deliverBlocks -> DEBU 196f [channel: businesschannel] Delivering block [1] for (0xc00045b740) for 172.18.0.9:40186" +"2020-10-14 19:02:20.730 UTC [common.deliver] deliverBlocks -> DEBU 1970 [channel: businesschannel] Done delivering to 172.18.0.9:40186 for (0xc00045b740)" +"2020-10-14 19:02:20.730 UTC [common.deliver] Handle -> DEBU 1971 Waiting for new SeekInfo from 172.18.0.9:40186" +"2020-10-14 19:02:20.730 UTC [common.deliver] Handle -> DEBU 1972 Attempting to read seek info message from 172.18.0.9:40186" +"2020-10-14 19:02:20.742 UTC [grpc] infof -> DEBU 1973 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:20.742 UTC [common.deliver] Handle -> WARN 1974 Error reading from 172.18.0.9:40186: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:20.742 UTC [orderer.common.server] func1 -> DEBU 1975 Closing Deliver stream" +"2020-10-14 19:02:20.742 UTC [comm.grpc.server] 1 -> INFO 1976 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40186 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.1193ms +"2020-10-14 19:02:20.916 UTC [orderer.common.server] Deliver -> DEBU 1977 Starting new Deliver handler" +"2020-10-14 19:02:20.916 UTC [common.deliver] Handle -> DEBU 1978 Starting new deliver loop for 172.18.0.9:40188" +"2020-10-14 19:02:20.916 UTC [common.deliver] Handle -> DEBU 1979 Attempting to read seek info message from 172.18.0.9:40188" +"2020-10-14 19:02:20.917 UTC [policies] Evaluate -> DEBU 197a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:20.917 UTC [policies] Evaluate -> DEBU 197b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:20.918 UTC [policies] Evaluate -> DEBU 197e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:20.919 UTC [cauthdsl] func1 -> DEBU 197f 0xc00113e500 gate 1602702140919030700 evaluation starts" +"2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1980 0xc00113e500 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1981 0xc00113e500 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:20.919 UTC [cauthdsl] func2 -> DEBU 1982 0xc00113e500 principal matched by identity 0" +"2020-10-14 19:02:20.919 UTC [msp.identity] Verify -> DEBU 1983 Verify: digest = 00000000 0a a9 24 f6 77 f1 33 64 d1 1d 2d 62 c3 ca f0 11 |..$.w.3d..-b....| +00000010 1b db 8b 3c fa cb 77 3b ba 9a f9 a5 5d 96 43 b6 |...<..w;....].C.|" +"2020-10-14 19:02:20.921 UTC [msp.identity] Verify -> DEBU 1984 Verify: sig = 00000000 30 44 02 20 48 07 9f 2f cc 21 4b 37 ab f6 c4 96 |0D. H../.!K7....| +00000010 e7 54 78 b2 ba e0 a2 2e a6 7c fc 38 93 33 4d 41 |.Tx......|.8.3MA| +00000020 f6 0f 99 13 02 20 27 9d e9 50 55 d1 42 34 bf 4d |..... '..PU.B4.M| +00000030 b6 61 86 17 2e 7d f6 bc 05 74 4e 15 b3 6f 31 a3 |.a...}...tN..o1.| +00000040 be 8d c7 9c 9e 20 |..... |" +"2020-10-14 19:02:20.922 UTC [cauthdsl] func2 -> DEBU 1985 0xc00113e500 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:20.922 UTC [cauthdsl] func1 -> DEBU 1986 0xc00113e500 gate 1602702140919030700 evaluation succeeds" +"2020-10-14 19:02:20.922 UTC [policies] Evaluate -> DEBU 1987 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.922 UTC [policies] Evaluate -> DEBU 1988 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 1989 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198b Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:20.923 UTC [policies] Evaluate -> DEBU 198c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:20.924 UTC [common.deliver] deliverBlocks -> DEBU 198d [channel: businesschannel] Received seekInfo (0xc00045bdc0) start: > stop: > from 172.18.0.9:40188" +"2020-10-14 19:02:20.924 UTC [fsblkstorage] Next -> DEBU 198e Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:20.924 UTC [fsblkstorage] newBlockfileStream -> DEBU 198f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56641]" +"2020-10-14 19:02:20.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1990 Remaining bytes=[81927], Going to peek [8] bytes" +"2020-10-14 19:02:20.925 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1991 Returning blockbytes - length=[28172], placementInfo={fileNum=[0], startOffset=[56641], bytesOffset=[56644]}" +"2020-10-14 19:02:20.926 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1992 blockbytes [28172] read from file [0]" +"2020-10-14 19:02:20.926 UTC [common.deliver] deliverBlocks -> DEBU 1993 [channel: businesschannel] Delivering block [2] for (0xc00045bdc0) for 172.18.0.9:40188" +"2020-10-14 19:02:20.928 UTC [common.deliver] deliverBlocks -> DEBU 1994 [channel: businesschannel] Done delivering to 172.18.0.9:40188 for (0xc00045bdc0)" +"2020-10-14 19:02:20.928 UTC [common.deliver] Handle -> DEBU 1995 Waiting for new SeekInfo from 172.18.0.9:40188" +"2020-10-14 19:02:20.928 UTC [common.deliver] Handle -> DEBU 1996 Attempting to read seek info message from 172.18.0.9:40188" +"2020-10-14 19:02:20.937 UTC [grpc] infof -> DEBU 1997 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:20.938 UTC [common.deliver] Handle -> WARN 1998 Error reading from 172.18.0.9:40188: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:20.938 UTC [orderer.common.server] func1 -> DEBU 1999 Closing Deliver stream" +"2020-10-14 19:02:20.938 UTC [comm.grpc.server] 1 -> INFO 199a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40188 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.465ms +"2020-10-14 19:02:20.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 199b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:20.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199c Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +"2020-10-14 19:02:20.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 199d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.1µs " +"2020-10-14 19:02:21.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199e Sending msg of 28 bytes to 2 on channel businesschannel took 59.6µs" +"2020-10-14 19:02:21.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 199f Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2020-10-14 19:02:21.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 312.2µs " +"2020-10-14 19:02:21.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19a1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.8µs " +"2020-10-14 19:02:21.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a2 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:21.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19a3 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:21.127 UTC [orderer.common.server] Deliver -> DEBU 19a4 Starting new Deliver handler" +"2020-10-14 19:02:21.127 UTC [common.deliver] Handle -> DEBU 19a5 Starting new deliver loop for 172.18.0.9:40190" +"2020-10-14 19:02:21.127 UTC [common.deliver] Handle -> DEBU 19a6 Attempting to read seek info message from 172.18.0.9:40190" +"2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.130 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:21.130 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000c8aa40 gate 1602702141130732500 evaluation starts" +"2020-10-14 19:02:21.130 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000c8aa40 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000c8aa40 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19af 0xc000c8aa40 principal matched by identity 0" +"2020-10-14 19:02:21.131 UTC [msp.identity] Verify -> DEBU 19b0 Verify: digest = 00000000 44 53 14 62 f8 4f 94 67 01 88 6d c4 bf ce 0a 71 |DS.b.O.g..m....q| +00000010 0c 79 7c 2a 2c 71 70 e8 07 04 ef ac 2a 24 5f cc |.y|*,qp.....*$_.|" +"2020-10-14 19:02:21.131 UTC [msp.identity] Verify -> DEBU 19b1 Verify: sig = 00000000 30 45 02 21 00 b1 fe ea 8c 4d 2f d2 bb 0b 94 d0 |0E.!.....M/.....| +00000010 93 07 2d 39 68 51 22 86 35 aa 56 ce 30 b6 17 d5 |..-9hQ".5.V.0...| +00000020 76 55 21 99 f2 02 20 56 fb ab ed dd 10 4e 06 c0 |vU!... V.....N..| +00000030 29 f7 5f 2a 18 1c df d6 24 36 19 0d b4 db a4 08 |)._*....$6......| +00000040 70 5e b6 39 ce 32 32 |p^.9.22|" +"2020-10-14 19:02:21.131 UTC [cauthdsl] func2 -> DEBU 19b2 0xc000c8aa40 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:21.132 UTC [cauthdsl] func1 -> DEBU 19b3 0xc000c8aa40 gate 1602702141130732500 evaluation succeeds" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b6 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b8 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:21.132 UTC [policies] Evaluate -> DEBU 19b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:21.133 UTC [common.deliver] deliverBlocks -> DEBU 19ba [channel: businesschannel] Received seekInfo (0xc00045a0c0) start: > stop: > from 172.18.0.9:40190" +"2020-10-14 19:02:21.133 UTC [fsblkstorage] Next -> DEBU 19bb Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:21.133 UTC [fsblkstorage] newBlockfileStream -> DEBU 19bc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84816]" +"2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bd Remaining bytes=[53752], Going to peek [8] bytes" +"2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19be Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84816], bytesOffset=[84818]}" +"2020-10-14 19:02:21.133 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19bf blockbytes [4550] read from file [0]" +"2020-10-14 19:02:21.133 UTC [common.deliver] deliverBlocks -> DEBU 19c0 [channel: businesschannel] Delivering block [3] for (0xc00045a0c0) for 172.18.0.9:40190" +"2020-10-14 19:02:21.134 UTC [common.deliver] deliverBlocks -> DEBU 19c1 [channel: businesschannel] Done delivering to 172.18.0.9:40190 for (0xc00045a0c0)" +"2020-10-14 19:02:21.134 UTC [common.deliver] Handle -> DEBU 19c2 Waiting for new SeekInfo from 172.18.0.9:40190" +"2020-10-14 19:02:21.134 UTC [common.deliver] Handle -> DEBU 19c3 Attempting to read seek info message from 172.18.0.9:40190" +"2020-10-14 19:02:21.145 UTC [common.deliver] Handle -> WARN 19c4 Error reading from 172.18.0.9:40190: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:21.145 UTC [orderer.common.server] func1 -> DEBU 19c6 Closing Deliver stream" +"2020-10-14 19:02:21.145 UTC [grpc] infof -> DEBU 19c5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:21.146 UTC [comm.grpc.server] 1 -> INFO 19c7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40190 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.1361ms +"2020-10-14 19:02:21.337 UTC [orderer.common.server] Deliver -> DEBU 19c8 Starting new Deliver handler" +"2020-10-14 19:02:21.338 UTC [common.deliver] Handle -> DEBU 19c9 Starting new deliver loop for 172.18.0.9:40192" +"2020-10-14 19:02:21.338 UTC [common.deliver] Handle -> DEBU 19ca Attempting to read seek info message from 172.18.0.9:40192" +"2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.339 UTC [policies] Evaluate -> DEBU 19cd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:21.340 UTC [policies] Evaluate -> DEBU 19ce This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.340 UTC [policies] Evaluate -> DEBU 19cf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:21.340 UTC [cauthdsl] func1 -> DEBU 19d0 0xc0009c94d0 gate 1602702141340784700 evaluation starts" +"2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d1 0xc0009c94d0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d2 0xc0009c94d0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:21.341 UTC [cauthdsl] func2 -> DEBU 19d3 0xc0009c94d0 principal matched by identity 0" +"2020-10-14 19:02:21.341 UTC [msp.identity] Verify -> DEBU 19d4 Verify: digest = 00000000 03 db 91 9e 03 dd d7 d2 32 1c 31 78 41 25 29 5f |........2.1xA%)_| +00000010 51 65 2a 20 ee db 8e 5e 24 dc af f6 f5 e9 30 78 |Qe* ...^$.....0x|" +"2020-10-14 19:02:21.341 UTC [msp.identity] Verify -> DEBU 19d5 Verify: sig = 00000000 30 44 02 20 14 f4 c5 ca 44 d7 0d d1 8b 68 f0 2d |0D. ....D....h.-| +00000010 95 33 39 46 2c 5b 66 6d 8f 7d a7 01 43 1a bb 79 |.39F,[fm.}..C..y| +00000020 a9 e2 fa a6 02 20 6b ed 32 2e 99 70 0d 45 ec ec |..... k.2..p.E..| +00000030 4f 0d 9e d3 46 60 52 7b cd ce b8 7f 3b 8d df fa |O...F`R{....;...| +00000040 03 cd 86 2b a4 58 |...+.X|" +"2020-10-14 19:02:21.342 UTC [cauthdsl] func2 -> DEBU 19d6 0xc0009c94d0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:21.343 UTC [cauthdsl] func1 -> DEBU 19d7 0xc0009c94d0 gate 1602702141340784700 evaluation succeeds" +"2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19d8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19da Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.343 UTC [policies] Evaluate -> DEBU 19db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.344 UTC [policies] Evaluate -> DEBU 19dc Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:21.344 UTC [policies] Evaluate -> DEBU 19dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:21.344 UTC [common.deliver] deliverBlocks -> DEBU 19de [channel: businesschannel] Received seekInfo (0xc00045a840) start: > stop: > from 172.18.0.9:40192" +"2020-10-14 19:02:21.344 UTC [fsblkstorage] Next -> DEBU 19df Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:21.345 UTC [fsblkstorage] newBlockfileStream -> DEBU 19e0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89368]" +"2020-10-14 19:02:21.345 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e1 Remaining bytes=[49200], Going to peek [8] bytes" +"2020-10-14 19:02:21.345 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e2 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89368], bytesOffset=[89370]}" +"2020-10-14 19:02:21.346 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19e3 blockbytes [4010] read from file [0]" +"2020-10-14 19:02:21.346 UTC [common.deliver] deliverBlocks -> DEBU 19e4 [channel: businesschannel] Delivering block [4] for (0xc00045a840) for 172.18.0.9:40192" +"2020-10-14 19:02:21.346 UTC [common.deliver] deliverBlocks -> DEBU 19e5 [channel: businesschannel] Done delivering to 172.18.0.9:40192 for (0xc00045a840)" +"2020-10-14 19:02:21.347 UTC [common.deliver] Handle -> DEBU 19e6 Waiting for new SeekInfo from 172.18.0.9:40192" +"2020-10-14 19:02:21.347 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 172.18.0.9:40192" +"2020-10-14 19:02:21.353 UTC [grpc] infof -> DEBU 19e8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:21.353 UTC [common.deliver] Handle -> WARN 19e9 Error reading from 172.18.0.9:40192: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:21.353 UTC [orderer.common.server] func1 -> DEBU 19ea Closing Deliver stream" +"2020-10-14 19:02:21.353 UTC [comm.grpc.server] 1 -> INFO 19eb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40192 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.282ms +"2020-10-14 19:02:21.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19ec Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:21.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19ed Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2020-10-14 19:02:21.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19ee Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 386.2µs " +"2020-10-14 19:02:21.541 UTC [orderer.common.server] Deliver -> DEBU 19ef Starting new Deliver handler" +"2020-10-14 19:02:21.541 UTC [common.deliver] Handle -> DEBU 19f0 Starting new deliver loop for 172.18.0.9:40194" +"2020-10-14 19:02:21.541 UTC [common.deliver] Handle -> DEBU 19f1 Attempting to read seek info message from 172.18.0.9:40194" +"2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.543 UTC [policies] Evaluate -> DEBU 19f6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:21.544 UTC [cauthdsl] func1 -> DEBU 19f7 0xc000d0c0a0 gate 1602702141543775600 evaluation starts" +"2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000d0c0a0 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000d0c0a0 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19fa 0xc000d0c0a0 principal matched by identity 0" +"2020-10-14 19:02:21.544 UTC [msp.identity] Verify -> DEBU 19fb Verify: digest = 00000000 f3 46 f9 26 44 1d 7a a1 fe 0d 9c d7 be 5d 52 d1 |.F.&D.z......]R.| +00000010 d0 2f b1 ea 0c a4 c6 85 d9 bd 3a 00 42 3f 0e 06 |./........:.B?..|" +"2020-10-14 19:02:21.544 UTC [msp.identity] Verify -> DEBU 19fc Verify: sig = 00000000 30 45 02 21 00 85 19 d3 b2 04 2c bd b6 6d 58 27 |0E.!......,..mX'| +00000010 f6 ef d1 49 2b 5e 59 43 10 7b c6 68 b8 bd 91 0e |...I+^YC.{.h....| +00000020 ca 18 f1 29 fa 02 20 11 68 79 57 d9 26 8e 47 a4 |...).. .hyW.&.G.| +00000030 13 e9 0c b0 5c b5 e5 e8 43 8f 31 c7 3e 3f 6b fa |....\...C.1.>?k.| +00000040 4d fa 78 5d 6f cc 02 |M.x]o..|" +"2020-10-14 19:02:21.544 UTC [cauthdsl] func2 -> DEBU 19fd 0xc000d0c0a0 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:21.545 UTC [cauthdsl] func1 -> DEBU 19fe 0xc000d0c0a0 gate 1602702141543775600 evaluation succeeds" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 19ff Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a00 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a01 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a03 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:21.545 UTC [policies] Evaluate -> DEBU 1a04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:21.545 UTC [common.deliver] deliverBlocks -> DEBU 1a05 [channel: businesschannel] Received seekInfo (0xc00045b380) start: > stop: > from 172.18.0.9:40194" +"2020-10-14 19:02:21.546 UTC [fsblkstorage] Next -> DEBU 1a06 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:21.546 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a07 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93380]" +"2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a08 Remaining bytes=[45188], Going to peek [8] bytes" +"2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a09 Returning blockbytes - length=[4007], placementInfo={fileNum=[0], startOffset=[93380], bytesOffset=[93382]}" +"2020-10-14 19:02:21.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a0a blockbytes [4007] read from file [0]" +"2020-10-14 19:02:21.546 UTC [common.deliver] deliverBlocks -> DEBU 1a0b [channel: businesschannel] Delivering block [5] for (0xc00045b380) for 172.18.0.9:40194" +"2020-10-14 19:02:21.547 UTC [common.deliver] deliverBlocks -> DEBU 1a0c [channel: businesschannel] Done delivering to 172.18.0.9:40194 for (0xc00045b380)" +"2020-10-14 19:02:21.547 UTC [common.deliver] Handle -> DEBU 1a0d Waiting for new SeekInfo from 172.18.0.9:40194" +"2020-10-14 19:02:21.547 UTC [common.deliver] Handle -> DEBU 1a0e Attempting to read seek info message from 172.18.0.9:40194" +"2020-10-14 19:02:21.555 UTC [grpc] infof -> DEBU 1a0f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:21.555 UTC [common.deliver] Handle -> WARN 1a10 Error reading from 172.18.0.9:40194: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:21.556 UTC [orderer.common.server] func1 -> DEBU 1a11 Closing Deliver stream" +"2020-10-14 19:02:21.556 UTC [comm.grpc.server] 1 -> INFO 1a12 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40194 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.7933ms +"2020-10-14 19:02:21.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a13 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-10-14 19:02:21.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a14 Sending msg of 28 bytes to 3 on channel businesschannel took 6.2µs" +"2020-10-14 19:02:21.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a15 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 460.2µs " +"2020-10-14 19:02:21.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 354.6µs " +"2020-10-14 19:02:21.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:21.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a18 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:21.749 UTC [orderer.common.server] Deliver -> DEBU 1a19 Starting new Deliver handler" +"2020-10-14 19:02:21.750 UTC [common.deliver] Handle -> DEBU 1a1a Starting new deliver loop for 172.18.0.9:40196" +"2020-10-14 19:02:21.750 UTC [common.deliver] Handle -> DEBU 1a1b Attempting to read seek info message from 172.18.0.9:40196" +"2020-10-14 19:02:21.750 UTC [policies] Evaluate -> DEBU 1a1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.751 UTC [policies] Evaluate -> DEBU 1a20 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:21.752 UTC [cauthdsl] func1 -> DEBU 1a21 0xc000cccc80 gate 1602702141752019500 evaluation starts" +"2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a22 0xc000cccc80 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a23 0xc000cccc80 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:21.752 UTC [cauthdsl] func2 -> DEBU 1a24 0xc000cccc80 principal matched by identity 0" +"2020-10-14 19:02:21.753 UTC [msp.identity] Verify -> DEBU 1a25 Verify: digest = 00000000 be af 21 60 67 e4 f7 30 8d 26 c9 18 eb ad 09 62 |..!`g..0.&.....b| +00000010 ed 49 71 9a 85 7f eb af 80 3f 2a 45 bd ef 7b 67 |.Iq......?*E..{g|" +"2020-10-14 19:02:21.753 UTC [msp.identity] Verify -> DEBU 1a26 Verify: sig = 00000000 30 45 02 21 00 ca 6c c7 4f fc 4b c4 a7 e5 3c 3a |0E.!..l.O.K...<:| +00000010 34 6f b3 94 44 cd df 28 09 d3 1f a9 1d 04 3d 0b |4o..D..(......=.| +00000020 03 51 a1 b1 16 02 20 64 de b1 27 37 c2 ba e3 b1 |.Q.... d..'7....| +00000030 bf 79 0e 1d a1 46 90 71 39 44 4c fc 31 12 9a 21 |.y...F.q9DL.1..!| +00000040 f0 57 37 a5 df 00 4e |.W7...N|" +"2020-10-14 19:02:21.753 UTC [cauthdsl] func2 -> DEBU 1a27 0xc000cccc80 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:21.754 UTC [cauthdsl] func1 -> DEBU 1a28 0xc000cccc80 gate 1602702141752019500 evaluation succeeds" +"2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a29 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2b Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.754 UTC [policies] Evaluate -> DEBU 1a2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.755 UTC [policies] Evaluate -> DEBU 1a2d Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:21.755 UTC [policies] Evaluate -> DEBU 1a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:21.755 UTC [common.deliver] deliverBlocks -> DEBU 1a2f [channel: businesschannel] Received seekInfo (0xc00045bc40) start: > stop: > from 172.18.0.9:40196" +"2020-10-14 19:02:21.756 UTC [fsblkstorage] Next -> DEBU 1a30 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-10-14 19:02:21.756 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a31 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97389]" +"2020-10-14 19:02:21.756 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a32 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-10-14 19:02:21.757 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a33 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97389], bytesOffset=[97392]}" +"2020-10-14 19:02:21.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a34 blockbytes [41176] read from file [0]" +"2020-10-14 19:02:21.758 UTC [common.deliver] deliverBlocks -> DEBU 1a35 [channel: businesschannel] Delivering block [6] for (0xc00045bc40) for 172.18.0.9:40196" +"2020-10-14 19:02:21.759 UTC [common.deliver] deliverBlocks -> DEBU 1a36 [channel: businesschannel] Done delivering to 172.18.0.9:40196 for (0xc00045bc40)" +"2020-10-14 19:02:21.759 UTC [common.deliver] Handle -> DEBU 1a37 Waiting for new SeekInfo from 172.18.0.9:40196" +"2020-10-14 19:02:21.759 UTC [common.deliver] Handle -> DEBU 1a38 Attempting to read seek info message from 172.18.0.9:40196" +"2020-10-14 19:02:21.766 UTC [grpc] infof -> DEBU 1a39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:21.766 UTC [common.deliver] Handle -> WARN 1a3a Error reading from 172.18.0.9:40196: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:21.767 UTC [orderer.common.server] func1 -> DEBU 1a3b Closing Deliver stream" +"2020-10-14 19:02:21.767 UTC [comm.grpc.server] 1 -> INFO 1a3c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40196 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.66ms +"2020-10-14 19:02:21.968 UTC [orderer.common.server] Deliver -> DEBU 1a3d Starting new Deliver handler" +"2020-10-14 19:02:21.968 UTC [common.deliver] Handle -> DEBU 1a3e Starting new deliver loop for 172.18.0.9:40198" +"2020-10-14 19:02:21.968 UTC [common.deliver] Handle -> DEBU 1a3f Attempting to read seek info message from 172.18.0.9:40198" +"2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a40 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a41 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a42 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a43 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:21.970 UTC [policies] Evaluate -> DEBU 1a44 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:21.970 UTC [cauthdsl] func1 -> DEBU 1a45 0xc0003da760 gate 1602702141970251400 evaluation starts" +"2020-10-14 19:02:21.970 UTC [cauthdsl] func2 -> DEBU 1a46 0xc0003da760 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:21.970 UTC [cauthdsl] func2 -> DEBU 1a47 0xc0003da760 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:21.971 UTC [cauthdsl] func2 -> DEBU 1a48 0xc0003da760 principal matched by identity 0" +"2020-10-14 19:02:21.971 UTC [msp.identity] Verify -> DEBU 1a49 Verify: digest = 00000000 22 14 59 6a 93 5f e8 34 1a c2 f7 16 ee 88 f5 18 |".Yj._.4........| +00000010 22 f2 16 40 77 bb ee 0b f9 da 92 d7 5d 1c 32 56 |"..@w.......].2V|" +"2020-10-14 19:02:21.971 UTC [msp.identity] Verify -> DEBU 1a4a Verify: sig = 00000000 30 45 02 21 00 be 69 95 ca 6c ff 0b 9f c6 8a ae |0E.!..i..l......| +00000010 c5 f9 76 bb 29 13 f1 89 63 a4 84 2a 37 37 c3 6b |..v.)...c..*77.k| +00000020 a1 01 ce f9 c4 02 20 5b f3 80 49 19 33 0b 81 d4 |...... [..I.3...| +00000030 1e 52 05 99 38 08 6b ae c0 22 96 b2 26 d9 a9 32 |.R..8.k.."..&..2| +00000040 59 81 08 06 87 af f8 |Y......|" +"2020-10-14 19:02:21.971 UTC [cauthdsl] func2 -> DEBU 1a4b 0xc0003da760 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:21.972 UTC [cauthdsl] func1 -> DEBU 1a4c 0xc0003da760 gate 1602702141970251400 evaluation succeeds" +"2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a4f Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a50 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:21.972 UTC [policies] Evaluate -> DEBU 1a51 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:21.973 UTC [policies] Evaluate -> DEBU 1a52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:21.973 UTC [common.deliver] deliverBlocks -> DEBU 1a53 [channel: testchainid] Received seekInfo (0xc000d1a5c0) start: > stop: > from 172.18.0.9:40198" +"2020-10-14 19:02:21.973 UTC [fsblkstorage] Next -> DEBU 1a54 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:21.973 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a55 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a56 Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a57 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:21.974 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a58 blockbytes [30405] read from file [0]" +"2020-10-14 19:02:21.974 UTC [common.deliver] deliverBlocks -> DEBU 1a59 [channel: testchainid] Delivering block [1] for (0xc000d1a5c0) for 172.18.0.9:40198" +"2020-10-14 19:02:21.975 UTC [common.deliver] deliverBlocks -> DEBU 1a5a [channel: testchainid] Done delivering to 172.18.0.9:40198 for (0xc000d1a5c0)" +"2020-10-14 19:02:21.976 UTC [common.deliver] Handle -> DEBU 1a5b Waiting for new SeekInfo from 172.18.0.9:40198" +"2020-10-14 19:02:21.976 UTC [common.deliver] Handle -> DEBU 1a5c Attempting to read seek info message from 172.18.0.9:40198" +"2020-10-14 19:02:21.981 UTC [grpc] infof -> DEBU 1a5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:21.981 UTC [common.deliver] Handle -> WARN 1a5e Error reading from 172.18.0.9:40198: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:21.981 UTC [orderer.common.server] func1 -> DEBU 1a5f Closing Deliver stream" +"2020-10-14 19:02:21.982 UTC [comm.grpc.server] 1 -> INFO 1a60 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40198 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3632ms +"2020-10-14 19:02:21.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a61 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:21.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a62 Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-10-14 19:02:21.988 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a63 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 554.7µs " +"2020-10-14 19:02:22.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a64 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2020-10-14 19:02:22.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.2µs " +"2020-10-14 19:02:22.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a66 Sending msg of 28 bytes to 3 on channel businesschannel took 15.4µs" +"2020-10-14 19:02:22.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a67 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:22.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 334.2µs " +"2020-10-14 19:02:22.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a69 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:22.337 UTC [orderer.common.server] Deliver -> DEBU 1a6a Starting new Deliver handler" +"2020-10-14 19:02:22.337 UTC [common.deliver] Handle -> DEBU 1a6b Starting new deliver loop for 172.18.0.9:40200" +"2020-10-14 19:02:22.337 UTC [common.deliver] Handle -> DEBU 1a6c Attempting to read seek info message from 172.18.0.9:40200" +"2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.338 UTC [policies] Evaluate -> DEBU 1a71 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:22.339 UTC [cauthdsl] func1 -> DEBU 1a72 0xc0001b4600 gate 1602702142339110500 evaluation starts" +"2020-10-14 19:02:22.339 UTC [cauthdsl] func2 -> DEBU 1a73 0xc0001b4600 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:22.339 UTC [cauthdsl] func2 -> DEBU 1a74 0xc0001b4600 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:22.340 UTC [cauthdsl] func2 -> DEBU 1a75 0xc0001b4600 principal matched by identity 0" +"2020-10-14 19:02:22.341 UTC [msp.identity] Verify -> DEBU 1a76 Verify: digest = 00000000 aa a3 e9 64 85 f8 49 d6 a1 d0 3f ff 6d 26 f5 c3 |...d..I...?.m&..| +00000010 dc d1 52 cc 24 00 e1 b1 c7 c6 00 42 4d 61 cd 6f |..R.$......BMa.o|" +"2020-10-14 19:02:22.342 UTC [msp.identity] Verify -> DEBU 1a77 Verify: sig = 00000000 30 44 02 20 08 ef ce 46 d8 55 23 ee fa f8 7e be |0D. ...F.U#...~.| +00000010 73 e0 dd 69 50 17 bb 36 4f dd 42 aa 51 3a 1a 28 |s..iP..6O.B.Q:.(| +00000020 17 ae 0f d8 02 20 59 a9 d9 5e bf 99 7a 21 fe cc |..... Y..^..z!..| +00000030 e0 ee 9b ef 15 24 74 97 dd 9b 30 04 8b d9 11 7e |.....$t...0....~| +00000040 7a 8b 08 dc eb cd |z.....|" +"2020-10-14 19:02:22.342 UTC [cauthdsl] func2 -> DEBU 1a78 0xc0001b4600 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:22.342 UTC [cauthdsl] func1 -> DEBU 1a79 0xc0001b4600 gate 1602702142339110500 evaluation succeeds" +"2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.342 UTC [policies] Evaluate -> DEBU 1a7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.343 UTC [policies] Evaluate -> DEBU 1a7e Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:22.343 UTC [policies] Evaluate -> DEBU 1a7f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:22.347 UTC [common.deliver] deliverBlocks -> DEBU 1a80 [channel: testchainid] Received seekInfo (0xc000cb0ec0) start: > stop: > from 172.18.0.9:40200" +"2020-10-14 19:02:22.348 UTC [fsblkstorage] Next -> DEBU 1a81 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:22.349 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a82 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a83 Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a84 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:22.350 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a85 blockbytes [30405] read from file [0]" +"2020-10-14 19:02:22.351 UTC [common.deliver] deliverBlocks -> DEBU 1a86 [channel: testchainid] Delivering block [1] for (0xc000cb0ec0) for 172.18.0.9:40200" +"2020-10-14 19:02:22.351 UTC [common.deliver] deliverBlocks -> DEBU 1a87 [channel: testchainid] Done delivering to 172.18.0.9:40200 for (0xc000cb0ec0)" +"2020-10-14 19:02:22.352 UTC [common.deliver] Handle -> DEBU 1a88 Waiting for new SeekInfo from 172.18.0.9:40200" +"2020-10-14 19:02:22.352 UTC [common.deliver] Handle -> DEBU 1a89 Attempting to read seek info message from 172.18.0.9:40200" +"2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.360 UTC [policies] Evaluate -> DEBU 1a8e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:22.360 UTC [cauthdsl] func1 -> DEBU 1a8f 0xc0002ac130 gate 1602702142360631700 evaluation starts" +"2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a90 0xc0002ac130 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a91 0xc0002ac130 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:22.360 UTC [cauthdsl] func2 -> DEBU 1a92 0xc0002ac130 principal matched by identity 0" +"2020-10-14 19:02:22.360 UTC [msp.identity] Verify -> DEBU 1a93 Verify: digest = 00000000 81 9d d2 42 d6 ea f8 c1 59 11 f8 e4 5e 96 9f 0f |...B....Y...^...| +00000010 78 0b 4d cc 3c 1d e9 2b 06 33 cc da 77 cc 6f 01 |x.M.<..+.3..w.o.|" +"2020-10-14 19:02:22.360 UTC [msp.identity] Verify -> DEBU 1a94 Verify: sig = 00000000 30 45 02 21 00 c7 bb be 33 3c 7d 01 b7 2e 5c e6 |0E.!....3<}...\.| +00000010 ca 05 0a 23 eb ee 79 72 ee b3 7d 3c f7 7e e2 7e |...#..yr..}<.~.~| +00000020 fc e5 fe 21 65 02 20 40 bb d4 86 c1 16 9d b4 9d |...!e. @........| +00000030 2c 98 65 ee fe 9d a0 18 e6 54 88 07 8d aa 5a ed |,.e......T....Z.| +00000040 e2 32 7f 24 9e 07 56 |.2.$..V|" +"2020-10-14 19:02:22.361 UTC [cauthdsl] func2 -> DEBU 1a95 0xc0002ac130 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:22.361 UTC [cauthdsl] func1 -> DEBU 1a96 0xc0002ac130 gate 1602702142360631700 evaluation succeeds" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a97 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a99 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9b Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:22.361 UTC [policies] Evaluate -> DEBU 1a9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1a9d [channel: testchainid] Received seekInfo (0xc000cb1380) start: > stop: > from 172.18.0.9:40200" +"2020-10-14 19:02:22.361 UTC [fsblkstorage] Next -> DEBU 1a9e Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:22.361 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a9f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa0 Remaining bytes=[53338], Going to peek [8] bytes" +"2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa1 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:22.361 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aa2 blockbytes [22927] read from file [0]" +"2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1aa3 [channel: testchainid] Delivering block [0] for (0xc000cb1380) for 172.18.0.9:40200" +"2020-10-14 19:02:22.361 UTC [common.deliver] deliverBlocks -> DEBU 1aa4 [channel: testchainid] Done delivering to 172.18.0.9:40200 for (0xc000cb1380)" +"2020-10-14 19:02:22.361 UTC [common.deliver] Handle -> DEBU 1aa5 Waiting for new SeekInfo from 172.18.0.9:40200" +"2020-10-14 19:02:22.361 UTC [common.deliver] Handle -> DEBU 1aa6 Attempting to read seek info message from 172.18.0.9:40200" +"2020-10-14 19:02:22.368 UTC [common.deliver] Handle -> WARN 1aa7 Error reading from 172.18.0.9:40200: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:22.370 UTC [orderer.common.server] func1 -> DEBU 1aa8 Closing Deliver stream" +"2020-10-14 19:02:22.370 UTC [comm.grpc.server] 1 -> INFO 1aa9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40200 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.1342ms +"2020-10-14 19:02:22.371 UTC [grpc] infof -> DEBU 1aaa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:22.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1aab Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:22.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aac Sending msg of 28 bytes to 3 on channel testchainid took 525.3µs" +"2020-10-14 19:02:22.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1aad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1873ms " +"2020-10-14 19:02:22.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aae Sending msg of 28 bytes to 2 on channel businesschannel took 81.8µs" +"2020-10-14 19:02:22.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aaf Sending msg of 28 bytes to 3 on channel businesschannel took 52.4µs" +"2020-10-14 19:02:22.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.8µs " +"2020-10-14 19:02:22.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ab1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 289.4µs " +"2020-10-14 19:02:22.594 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab2 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:22.594 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ab3 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:22.667 UTC [orderer.common.server] Deliver -> DEBU 1ab4 Starting new Deliver handler" +"2020-10-14 19:02:22.667 UTC [common.deliver] Handle -> DEBU 1ab5 Starting new deliver loop for 172.18.0.9:40202" +"2020-10-14 19:02:22.668 UTC [common.deliver] Handle -> DEBU 1ab6 Attempting to read seek info message from 172.18.0.9:40202" +"2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.675 UTC [policies] Evaluate -> DEBU 1ab9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:22.676 UTC [policies] Evaluate -> DEBU 1aba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.676 UTC [policies] Evaluate -> DEBU 1abb == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:22.677 UTC [cauthdsl] func1 -> DEBU 1abc 0xc0002df960 gate 1602702142677419600 evaluation starts" +"2020-10-14 19:02:22.677 UTC [cauthdsl] func2 -> DEBU 1abd 0xc0002df960 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:22.677 UTC [cauthdsl] func2 -> DEBU 1abe 0xc0002df960 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:22.678 UTC [cauthdsl] func2 -> DEBU 1abf 0xc0002df960 principal matched by identity 0" +"2020-10-14 19:02:22.678 UTC [msp.identity] Verify -> DEBU 1ac0 Verify: digest = 00000000 53 23 a7 4b 9f e4 b2 92 2b 5f 1b db e5 b5 3b 80 |S#.K....+_....;.| +00000010 28 be 91 a7 45 b9 19 9e c8 ed 1a cf 03 07 70 e5 |(...E.........p.|" +"2020-10-14 19:02:22.678 UTC [msp.identity] Verify -> DEBU 1ac1 Verify: sig = 00000000 30 45 02 21 00 cd 67 80 36 ed cc f7 07 00 fe f4 |0E.!..g.6.......| +00000010 be 8d 60 3a 23 9b b0 e6 fb c1 c0 13 1a e3 62 bf |..`:#.........b.| +00000020 5a 75 52 12 2c 02 20 19 6c 25 51 e8 88 cb fa cb |ZuR.,. .l%Q.....| +00000030 64 05 7f 6a 27 1a 8c d2 3e 4f 0f 0c 63 24 b7 91 |d..j'...>O..c$..| +00000040 81 21 74 3b 7a 84 0f |.!t;z..|" +"2020-10-14 19:02:22.678 UTC [cauthdsl] func2 -> DEBU 1ac2 0xc0002df960 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:22.678 UTC [cauthdsl] func1 -> DEBU 1ac3 0xc0002df960 gate 1602702142677419600 evaluation succeeds" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac6 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac8 Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:22.679 UTC [policies] Evaluate -> DEBU 1ac9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:22.679 UTC [common.deliver] deliverBlocks -> DEBU 1aca [channel: testchainid] Received seekInfo (0xc000cb19c0) start: > stop: > from 172.18.0.9:40202" +"2020-10-14 19:02:22.679 UTC [fsblkstorage] Next -> DEBU 1acb Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:22.680 UTC [fsblkstorage] newBlockfileStream -> DEBU 1acc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1acd Remaining bytes=[53338], Going to peek [8] bytes" +"2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ace Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-10-14 19:02:22.680 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1acf blockbytes [22927] read from file [0]" +"2020-10-14 19:02:22.680 UTC [common.deliver] deliverBlocks -> DEBU 1ad0 [channel: testchainid] Delivering block [0] for (0xc000cb19c0) for 172.18.0.9:40202" +"2020-10-14 19:02:22.682 UTC [common.deliver] deliverBlocks -> DEBU 1ad1 [channel: testchainid] Done delivering to 172.18.0.9:40202 for (0xc000cb19c0)" +"2020-10-14 19:02:22.682 UTC [common.deliver] Handle -> DEBU 1ad2 Waiting for new SeekInfo from 172.18.0.9:40202" +"2020-10-14 19:02:22.682 UTC [common.deliver] Handle -> DEBU 1ad3 Attempting to read seek info message from 172.18.0.9:40202" +"2020-10-14 19:02:22.705 UTC [common.deliver] Handle -> WARN 1ad4 Error reading from 172.18.0.9:40202: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:22.705 UTC [orderer.common.server] func1 -> DEBU 1ad5 Closing Deliver stream" +"2020-10-14 19:02:22.706 UTC [comm.grpc.server] 1 -> INFO 1ad6 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40202 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9904ms +"2020-10-14 19:02:22.706 UTC [grpc] infof -> DEBU 1ad7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:22.936 UTC [orderer.common.server] Deliver -> DEBU 1ad8 Starting new Deliver handler" +"2020-10-14 19:02:22.936 UTC [common.deliver] Handle -> DEBU 1ad9 Starting new deliver loop for 172.18.0.9:40204" +"2020-10-14 19:02:22.937 UTC [common.deliver] Handle -> DEBU 1ada Attempting to read seek info message from 172.18.0.9:40204" +"2020-10-14 19:02:22.946 UTC [policies] Evaluate -> DEBU 1adb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-10-14 19:02:22.947 UTC [policies] Evaluate -> DEBU 1adc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.947 UTC [policies] Evaluate -> DEBU 1add == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-10-14 19:02:22.948 UTC [policies] Evaluate -> DEBU 1ade This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-10-14 19:02:22.948 UTC [policies] Evaluate -> DEBU 1adf == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-10-14 19:02:22.948 UTC [cauthdsl] func1 -> DEBU 1ae0 0xc000362a70 gate 1602702142948629500 evaluation starts" +"2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae1 0xc000362a70 signed by 0 principal evaluation starts (used [false])" +"2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae2 0xc000362a70 processing identity 0 with bytes of fe2870" +"2020-10-14 19:02:22.949 UTC [cauthdsl] func2 -> DEBU 1ae3 0xc000362a70 principal matched by identity 0" +"2020-10-14 19:02:22.950 UTC [msp.identity] Verify -> DEBU 1ae4 Verify: digest = 00000000 69 47 f3 31 ee c7 7f 9f 41 d0 e9 39 bb 9d 26 16 |iG.1....A..9..&.| +00000010 16 c2 fe 66 98 78 2f 9f d1 b1 83 a8 79 27 27 92 |...f.x/.....y''.|" +"2020-10-14 19:02:22.950 UTC [msp.identity] Verify -> DEBU 1ae5 Verify: sig = 00000000 30 44 02 20 5d a4 2d 6c 39 ef fb 91 0b 75 ab 04 |0D. ].-l9....u..| +00000010 47 d1 aa 24 b5 b0 ee 0b 63 6e 11 87 af c3 b4 c5 |G..$....cn......| +00000020 af 24 ed dc 02 20 77 1e e3 94 bb f4 57 88 05 f8 |.$... w.....W...| +00000030 38 8b bf 0d 01 3d cd 10 04 b4 2d ea c6 be 7e 71 |8....=....-...~q| +00000040 5d c2 14 00 a2 14 |].....|" +"2020-10-14 19:02:22.951 UTC [cauthdsl] func2 -> DEBU 1ae6 0xc000362a70 principal evaluation succeeds for identity 0" +"2020-10-14 19:02:22.951 UTC [cauthdsl] func1 -> DEBU 1ae7 0xc000362a70 gate 1602702142948629500 evaluation succeeds" +"2020-10-14 19:02:22.951 UTC [policies] Evaluate -> DEBU 1ae8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.952 UTC [policies] Evaluate -> DEBU 1ae9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-10-14 19:02:22.952 UTC [policies] Evaluate -> DEBU 1aea Signature set satisfies policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aeb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aec Signature set satisfies policy /Channel/Readers" +"2020-10-14 19:02:22.953 UTC [policies] Evaluate -> DEBU 1aed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-10-14 19:02:22.953 UTC [common.deliver] deliverBlocks -> DEBU 1aee [channel: testchainid] Received seekInfo (0xc000d2a140) start: > stop: > from 172.18.0.9:40204" +"2020-10-14 19:02:22.954 UTC [fsblkstorage] Next -> DEBU 1aef Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-10-14 19:02:22.954 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-10-14 19:02:22.955 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af1 Remaining bytes=[30408], Going to peek [8] bytes" +"2020-10-14 19:02:22.956 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af2 Returning blockbytes - length=[30405], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-10-14 19:02:22.957 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af3 blockbytes [30405] read from file [0]" +"2020-10-14 19:02:22.957 UTC [common.deliver] deliverBlocks -> DEBU 1af4 [channel: testchainid] Delivering block [1] for (0xc000d2a140) for 172.18.0.9:40204" +"2020-10-14 19:02:22.958 UTC [common.deliver] deliverBlocks -> DEBU 1af5 [channel: testchainid] Done delivering to 172.18.0.9:40204 for (0xc000d2a140)" +"2020-10-14 19:02:22.959 UTC [common.deliver] Handle -> DEBU 1af6 Waiting for new SeekInfo from 172.18.0.9:40204" +"2020-10-14 19:02:22.960 UTC [common.deliver] Handle -> DEBU 1af7 Attempting to read seek info message from 172.18.0.9:40204" +"2020-10-14 19:02:22.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1af8 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:22.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1af9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-10-14 19:02:22.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1afa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 833.6µs " +"2020-10-14 19:02:22.987 UTC [common.deliver] Handle -> WARN 1afb Error reading from 172.18.0.9:40204: rpc error: code = Canceled desc = context canceled" +"2020-10-14 19:02:22.987 UTC [orderer.common.server] func1 -> DEBU 1afc Closing Deliver stream" +"2020-10-14 19:02:22.987 UTC [comm.grpc.server] 1 -> INFO 1afd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:40204 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.2774ms +"2020-10-14 19:02:22.988 UTC [grpc] infof -> DEBU 1afe transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-10-14 19:02:23.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1aff Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2020-10-14 19:02:23.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b00 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-10-14 19:02:23.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.2µs " +"2020-10-14 19:02:23.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.7µs " +"2020-10-14 19:02:23.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b03 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:23.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b04 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:23.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b05 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:23.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b06 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-10-14 19:02:23.483 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.6µs " +"2020-10-14 19:02:23.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b08 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-10-14 19:02:23.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b09 Sending msg of 28 bytes to 3 on channel businesschannel took 17µs" +"2020-10-14 19:02:23.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +"2020-10-14 19:02:23.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.8µs " +"2020-10-14 19:02:23.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:23.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:23.984 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b0e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:23.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b0f Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +"2020-10-14 19:02:23.985 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 318.1µs " +"2020-10-14 19:02:24.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b11 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2020-10-14 19:02:24.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b12 Sending msg of 28 bytes to 3 on channel businesschannel took 76.9µs" +"2020-10-14 19:02:24.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.2µs " +"2020-10-14 19:02:24.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.1µs " +"2020-10-14 19:02:24.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b15 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:24.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b16 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:24.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b17 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:24.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b18 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2020-10-14 19:02:24.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.9µs " +"2020-10-14 19:02:24.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b1a Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +"2020-10-14 19:02:24.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b1b Sending msg of 28 bytes to 3 on channel businesschannel took 16.4µs" +"2020-10-14 19:02:24.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.5µs " +"2020-10-14 19:02:24.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80.3µs " +"2020-10-14 19:02:24.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b1e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:24.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b1f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:24.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b20 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:24.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b21 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +"2020-10-14 19:02:24.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " +"2020-10-14 19:02:25.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b23 Sending msg of 28 bytes to 2 on channel businesschannel took 34.3µs" +"2020-10-14 19:02:25.091 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b24 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2020-10-14 19:02:25.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283.9µs " +"2020-10-14 19:02:25.092 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3258ms " +"2020-10-14 19:02:25.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b27 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:25.096 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b28 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:25.485 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b29 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:25.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2a Sending msg of 28 bytes to 3 on channel testchainid took 62.9µs" +"2020-10-14 19:02:25.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.1µs " +"2020-10-14 19:02:25.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2c Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2020-10-14 19:02:25.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2d Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-10-14 19:02:25.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.7µs " +"2020-10-14 19:02:25.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +"2020-10-14 19:02:25.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b30 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:25.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b31 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:25.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b32 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:25.993 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b33 Sending msg of 28 bytes to 3 on channel testchainid took 18.3µs" +"2020-10-14 19:02:25.994 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.9µs " +"2020-10-14 19:02:26.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b35 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2020-10-14 19:02:26.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b36 Sending msg of 28 bytes to 3 on channel businesschannel took 26.6µs" +"2020-10-14 19:02:26.095 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 903.7µs " +"2020-10-14 19:02:26.096 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.3µs " +"2020-10-14 19:02:26.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b39 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:26.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:26.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b3b Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:26.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3c Sending msg of 28 bytes to 3 on channel testchainid took 20.5µs" +"2020-10-14 19:02:26.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 407.7µs " +"2020-10-14 19:02:26.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3e Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2020-10-14 19:02:26.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b3f Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2020-10-14 19:02:26.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81µs " +"2020-10-14 19:02:26.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.3µs " +"2020-10-14 19:02:26.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b42 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:26.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b43 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:26.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b44 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:26.984 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b45 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2020-10-14 19:02:26.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +"2020-10-14 19:02:27.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b47 Sending msg of 28 bytes to 2 on channel businesschannel took 46.2µs" +"2020-10-14 19:02:27.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 3 on channel businesschannel took 16.6µs" +"2020-10-14 19:02:27.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +"2020-10-14 19:02:27.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.5µs " +"2020-10-14 19:02:27.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:27.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:27.492 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4d Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:27.493 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b4e Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2020-10-14 19:02:27.497 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6613ms " +"2020-10-14 19:02:27.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b50 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-10-14 19:02:27.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b51 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2020-10-14 19:02:27.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2020-10-14 19:02:27.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b53 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:27.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b54 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.9µs " +"2020-10-14 19:02:27.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b55 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:27.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b56 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:27.985 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b57 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-10-14 19:02:27.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +"2020-10-14 19:02:28.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b59 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-10-14 19:02:28.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b5a Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-10-14 19:02:28.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +"2020-10-14 19:02:28.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5c Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:28.091 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b5d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3689ms " +"2020-10-14 19:02:28.092 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:28.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b5f Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:28.485 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b60 Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2020-10-14 19:02:28.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 656.5µs " +"2020-10-14 19:02:28.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b62 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2020-10-14 19:02:28.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b63 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +"2020-10-14 19:02:28.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 199.7µs " +"2020-10-14 19:02:28.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 266.9µs " +"2020-10-14 19:02:28.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b66 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:28.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b67 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:28.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b68 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:28.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b69 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-10-14 19:02:28.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +"2020-10-14 19:02:29.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6b Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2020-10-14 19:02:29.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b6c Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +"2020-10-14 19:02:29.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.5µs " +"2020-10-14 19:02:29.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 718.6µs " +"2020-10-14 19:02:29.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b6f Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:29.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b70 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:29.485 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b71 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:29.486 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b72 Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2020-10-14 19:02:29.486 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.9µs " +"2020-10-14 19:02:29.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b74 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2020-10-14 19:02:29.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b75 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2020-10-14 19:02:29.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 549.7µs " +"2020-10-14 19:02:29.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.6µs " +"2020-10-14 19:02:29.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b78 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:29.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b79 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:29.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:29.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7b Sending msg of 28 bytes to 3 on channel testchainid took 16.8µs" +"2020-10-14 19:02:29.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.8µs " +"2020-10-14 19:02:30.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 2 on channel businesschannel took 33.9µs" +"2020-10-14 19:02:30.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7e Sending msg of 28 bytes to 3 on channel businesschannel took 71.7µs" +"2020-10-14 19:02:30.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223µs " +"2020-10-14 19:02:30.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.3µs " +"2020-10-14 19:02:30.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b81 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:30.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b82 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:30.483 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:30.483 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b84 Sending msg of 28 bytes to 3 on channel testchainid took 23.9µs" +"2020-10-14 19:02:30.485 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1634ms " +"2020-10-14 19:02:30.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b86 Sending msg of 28 bytes to 2 on channel businesschannel took 54.3µs" +"2020-10-14 19:02:30.590 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b87 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2020-10-14 19:02:30.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.3µs " +"2020-10-14 19:02:30.591 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 786.2µs " +"2020-10-14 19:02:30.593 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8a Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:30.595 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8b Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:30.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b8c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:30.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8d Sending msg of 28 bytes to 3 on channel testchainid took 39.6µs" +"2020-10-14 19:02:30.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +"2020-10-14 19:02:31.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b8f Sending msg of 28 bytes to 2 on channel businesschannel took 51.1µs" +"2020-10-14 19:02:31.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 193.9µs " +"2020-10-14 19:02:31.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b91 Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-10-14 19:02:31.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b92 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:31.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7417ms " +"2020-10-14 19:02:31.094 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b94 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:31.484 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b95 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:31.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b96 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2020-10-14 19:02:31.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.7µs " +"2020-10-14 19:02:31.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2020-10-14 19:02:31.589 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b99 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-10-14 19:02:31.589 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +"2020-10-14 19:02:31.590 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 152.3µs " +"2020-10-14 19:02:31.590 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9c Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:31.591 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9d Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:31.983 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b9e Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel testchainid with payload of size 28" +"2020-10-14 19:02:31.983 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b9f Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +"2020-10-14 19:02:31.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.5µs " +"2020-10-14 19:02:32.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba1 Sending msg of 28 bytes to 2 on channel businesschannel took 48.8µs" +"2020-10-14 19:02:32.090 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ba2 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +"2020-10-14 19:02:32.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.5µs " +"2020-10-14 19:02:32.090 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.5µs " +"2020-10-14 19:02:32.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba5 Received message from orderer1.example.com(172.18.0.2:53736): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-10-14 19:02:32.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ba6 Received message from orderer2.example.com(172.18.0.4:35132): ConsensusRequest for channel businesschannel with payload of size 28" diff --git a/hyperledger_fabric/v1.4.9/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.9/raft/logs/dev_peer0.log new file mode 100644 index 00000000..9cfa6642 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/raft/logs/dev_peer0.log @@ -0,0 +1,23345 @@ +[001 10-14 19:00:49.87 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +[002 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[003 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +[004 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +[005 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +[006 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +[007 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +[008 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +[009 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +[00a 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[00b 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +[00c 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +[00d 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[00e 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +[00f 10-14 19:00:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[010 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +[011 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +[012 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[013 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +[014 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[015 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +[016 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[017 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +[018 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[019 10-14 19:00:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +[01a 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +[01b 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +[01c 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +[01d 10-14 19:00:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +[01e 10-14 19:00:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +[01f 10-14 19:00:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +[020 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +[021 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +[022 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +[023 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +[024 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +[025 10-14 19:00:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +[026 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +[027 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +[028 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +[029 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +[02a 10-14 19:00:49.93 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +[02b 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[02c 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[02d 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +[02e 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[02f 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[030 10-14 19:00:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[031 10-14 19:00:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +[032 10-14 19:00:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[033 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +[034 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: + Version: 1.4.9 + Commit SHA: development build + Go version: go1.13.15 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.21 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger +[035 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[036 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[037 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[038 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +[039 10-14 19:00:50.03 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +[03a 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[03b 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[03c 10-14 19:00:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[03d 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[03e 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[03f 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[040 10-14 19:00:50.06 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[041 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +[042 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +[043 10-14 19:00:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +[044 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +[045 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +[046 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +[047 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +[048 10-14 19:00:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +[049 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[04a 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[04b 10-14 19:00:50.35 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[04c 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +[04d 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +[04e 10-14 19:00:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +[04f 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +[050 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +[051 10-14 19:00:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +[052 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[053 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[054 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[055 10-14 19:00:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[056 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +[057 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +[058 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +[059 10-14 19:00:50.50 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +[05a 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05b 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +[05c 10-14 19:00:50.51 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05d 10-14 19:00:50.52 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +[05e 10-14 19:00:50.53 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +[05f 10-14 19:00:50.53 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +[060 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.9 +[061 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[062 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.9 +[063 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[064 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.9 +[065 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +[066 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +[067 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +[068 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[069 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +[06a 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +[06b 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +[06c 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[06d 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +[06e 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[06f 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +[070 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +[071 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +[072 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[073 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +[074 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[075 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +[076 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +[077 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +[078 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +[079 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +[07a 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +[07b 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO The enrollment certificate will expire on 2030-02-18 18:24:00 +0000 UTC +[07c 10-14 19:00:50.54 UTC] [%{longpkg}] %{callpath} -> INFO The server TLS certificate will expire on 2030-02-18 18:24:00 +0000 UTC +[07d 10-14 19:00:50.56 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[07e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[07f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[080 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[081 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[082 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +[083 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[084 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[085 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[086 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +[087 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +[088 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +[089 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +[08a 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +[08b 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU No peers to send to, aborting membership sync +[08c 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +[08d 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[08e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.9 +[08f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[090 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.9 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[091 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +[092 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +[093 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.9 +[094 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +[095 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.9) lock +[096 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.9) lock +[097 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.9) +[098 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.9 +[099 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.9 +[09a 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[09b 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[09c 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.9 +[09d 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.9" , sending back REGISTERED +[09e 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.9" +[09f 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.9" +[0a0 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.9" +[0a1 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0a2 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0a3 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [bcfb1102] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0a4 10-14 19:00:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU [bcfb1102] notifying Txid:bcfb1102-86e8-4897-9cfa-be0107292c7a, channelID: +[0a5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0a6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0a7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0a8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.9 +[0a9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0aa 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.9 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0ab 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +[0ac 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +[0ad 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.9 +[0ae 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +[0b1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.9) lock +[0af 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.9 +[0b0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.9 +[0b2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0b3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0b4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.9 +[0b5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.9" , sending back REGISTERED +[0b6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.9" +[0b7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.9" +[0b8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.9" +[0b9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0ba 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0bb 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[0bc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [9e9645dc] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0bd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [9e9645dc] notifying Txid:9e9645dc-398e-431d-9b9e-182d1bae6169, channelID: +[0be 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0bf 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[0c0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.9,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0c1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.9 +[0c2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0c3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.9 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0c4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +[0c5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +[0c6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.9 +[0c7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +[0c8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.9) lock +[0c9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.9) lock +[0ca 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.9) +[0cb 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.9 +[0cc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.9 +[0cd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0ce 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0cf 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.9 +[0d0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.9" , sending back REGISTERED +[0d1 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.9" +[0d2 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.9" +[0d3 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.9" +[0d4 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0d5 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0d6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[0d7 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [37f67fe6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0d8 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU [37f67fe6] notifying Txid:37f67fe6-e3e3-427c-865d-b5e7023bf7cd, channelID: +[0d9 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0da 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +[0db 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[0dc 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +[0dd 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[0de 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +[0df 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +[0e0 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e1 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e2 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +[0e3 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +[0e4 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +[0e5 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +[0e6 10-14 19:00:50.58 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.9) lock +[0e7 10-14 19:00:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.9) +[0e8 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:00:53.429Z grpc.peer_address=172.18.0.8:52120 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.3µs +[0e9 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[0ea 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[0eb 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[0ec 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52120 +[0ed 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52120 +[0ee 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[0ef 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[0f0 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[0f1 10-14 19:00:51.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[0f2 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[0f3 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[0f4 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e 9e 2d 28 bd 65 42 e8 1d 69 96 |0E.!...-(.eB..i.| +00000010 68 62 3c 9f b0 d5 28 11 61 ab 41 57 80 03 4b 47 |hb<...(.a.AW..KG| +00000020 61 ec c3 c8 12 02 20 5c d2 00 84 bd c5 a3 ad 62 |a..... \.......b| +00000030 55 50 d4 50 78 6f 45 6d 85 53 58 e7 bb 02 55 58 |UP.PxoEm.SX...UX| +00000040 ad 07 14 b0 3e e2 c6 |....>..| +[0f5 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52120 +[0f6 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52120 +[0f7 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52120 disconnected +[0f9 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[0f8 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:01.434Z grpc.peer_address=172.18.0.8:52120 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6834ms +[0fa 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[0fb 10-14 19:00:51.44 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:00:53.447Z grpc.peer_address=172.18.0.8:52122 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=545.9µs +[0fc 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[0fd 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[0fe 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[0ff 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52122 +[100 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52122 +[101 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[102 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c1 2b e7 9b e1 04 e4 f5 6a 6c a8 |0E.!..+......jl.| +00000010 9e aa 48 b6 3b 28 50 8f 27 e4 c0 74 0d b7 34 6b |..H.;(P.'..t..4k| +00000020 9f a7 a2 eb 0a 02 20 65 ca 25 27 3f f0 e6 ab ea |...... e.%'?....| +00000030 aa 83 e6 65 0d a9 0b d4 a3 a5 f7 da 15 a0 12 3e |...e...........>| +00000040 96 1b 14 45 f2 ec a5 |...E...| +[103 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52122 +[104 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52122 +[105 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes +[106 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107 10-14 19:00:51.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7060301027453028519 tag:EMPTY mem_req:\374q" > > > , Envelope: 1108 bytes, Signature: 0 bytes +[108 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7c fc f2 d1 d5 cc fa 50 e0 ec 41 bd c9 79 0d 81 ||......P..A..y..| +00000010 ff e8 75 91 d4 63 c5 25 b1 2f b7 ed 1d b3 5f 8b |..u..c.%./...._.| +[109 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 23 b7 e2 48 bd 49 b2 97 42 a1 26 |0D. .#..H.I..B.&| +00000010 de 57 bd 75 c6 9b b3 02 32 9d fd 43 84 43 be 3d |.W.u....2..C.C.=| +00000020 79 ae 02 9e 02 20 39 fc c4 9e ef 24 04 25 98 5f |y.... 9....$.%._| +00000030 2c e2 84 f6 7e aa 4d e5 f6 4c 00 dc 36 f4 3b 05 |,...~.M..L..6.;.| +00000040 b5 c1 b7 4e 4e f2 |...NN.| +[10a 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[10b 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 38 cd 16 00 e7 31 12 8a 1e 7f |0E.!..8....1....| +00000010 6f e1 03 4f 61 84 c1 86 ca f7 67 e6 85 9c fb b3 |o..Oa.....g.....| +00000020 29 04 67 61 95 02 20 74 96 38 14 a9 aa 62 ad fe |).ga.. t.8...b..| +00000030 05 38 88 eb 78 d5 7a c3 4d 1f f1 d6 61 75 d0 2b |.8..x.z.M...au.+| +00000040 96 ca 48 75 3e fc 71 |..Hu>.q| +[10c 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[10d 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +[10e 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[10f 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[110 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[112 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[113 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[114 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[115 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82B9204592AAFC80288654E4D9DB1F1209EE5FC706EEDA11D35EBB32723126F4 +[116 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[117 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[118 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[119 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes to 1 peers +[11a 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\374q" > > alive: > +[11b 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7060301027453028519, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +[11c 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[111 10-14 19:00:51.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[11e 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[11f 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[120 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes +[122 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[123 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1099 bytes, Signature: 0 bytes +[124 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a db b0 ed a7 65 d8 aa 1f e2 a1 84 1f d8 20 95 |Z....e........ .| +00000010 54 7b c9 ba 59 c6 93 64 ed a7 23 3c 31 7b 90 03 |T{..Y..d..#<1{..| +[125 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a5 3f a1 67 9e 33 4f b7 f8 08 |0E.!...?.g.3O...| +00000010 b6 f0 8a bd 61 f8 6c 90 d1 fb 97 8e 92 05 15 7a |....a.l........z| +00000020 9b 05 a3 f6 ea 02 20 2a 55 79 65 2f a1 fb d9 8e |...... *Uye/....| +00000030 e1 f7 87 70 9b db c7 5d 8e f7 90 7f 95 cd 8e 1c |...p...]........| +00000040 02 ce ec 53 1f cf d4 |...S...| +[126 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[127 10-14 19:00:54.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 c9 18 56 a1 c4 63 4a 56 64 9f |0E.!....V..cJVd.| +00000010 bb 32 87 17 92 cd 8a b1 7b 86 66 98 29 c4 e6 51 |.2......{.f.)..Q| +00000020 29 da 89 39 fc 02 20 39 87 08 a8 83 c9 83 80 5b |)..9.. 9.......[| +00000030 e2 ab 4a 75 7a ba 2e 33 02 51 ed 2b 59 ae e0 fc |..Juz..3.Q.+Y...| +00000040 eb 51 9c 55 a7 0e fa |.Q.U...| +[128 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[129 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[12a 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12b 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12c 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[12d 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12e 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[130 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[131 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[132 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[133 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DC69EEB80055E454E8CADD1A6E484C87D36588654F3D4D2711026E26AB50277 +[134 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[135 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[136 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[137 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes to 1 peers +[138 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\253)M\344j\261\360\223\036(\0165a\013\026\363e\344\264\372\003\204\005|S0\261$\370v\t" secret_envelope: > +[139 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2193 bytes, Signature: 0 bytes +[13a 10-14 19:00:54.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[13c 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[13d 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[13e 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[140 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[141 10-14 19:00:54.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1305474A630528A4B852DBFB7E9F0CBD45F9906051DF2982836FF12E5A7E7CC1 +[142 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[144 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[145 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[143 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[146 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[147 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[148 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +[149 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\373f\316\340\271\002 \016\273\244\037\270\330\260\030|Y\221\331\351\246\342\005\2602Y$\231fj\\\036N\245\256\357\354\232|" secret_envelope: > > , Envelope: 1098 bytes, Signature: 0 bytes +[14b 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[14c 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a 10-14 19:00:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[14e 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 05 47 4a 63 05 28 a4 b8 52 db fb 7e 9f 0c bd |..GJc.(..R..~...| +00000010 45 f9 90 60 51 df 29 82 83 6f f1 2e 5a 7e 7c c1 |E..`Q.)..o..Z~|.| +[14f 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 76 8f c0 34 10 71 bc 07 05 93 d3 |0D. Mv..4.q.....| +00000010 0e 01 51 fc 87 a5 63 d7 ce e5 70 61 41 fb 3e fb |..Q...c...paA.>.| +00000020 66 ce e0 b9 02 20 0e bb a4 1f b8 d8 b0 18 7c 59 |f.... ........|Y| +00000030 91 d9 e9 a6 e2 05 b0 32 59 24 99 66 6a 5c 1e 4e |.......2Y$.fj\.N| +00000040 a5 ae ef ec 9a 7c |.....|| +[150 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[151 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 45 f7 30 af a9 bb b9 84 cb 66 |0E.!..E.0......f| +00000010 1e 16 4a 94 49 ef ef 83 39 f4 f8 ae fa fc e3 b2 |..J.I...9.......| +00000020 13 79 c6 6b 48 02 20 12 1b 2c d8 32 f9 1a 67 e2 |.y.kH. ..,.2..g.| +00000030 ed ba f4 25 20 e0 38 0c fa 5e 57 39 ea 2f db 6a |...% .8..^W9./.j| +00000040 af 85 e6 fb c9 24 4c |.....$L| +[152 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[153 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[154 10-14 19:00:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 35 77 1c 9c 09 ea 80 f6 02 02 b4 94 9f 65 97 |g5w...........e.| +00000010 6c a7 4a da fc ab 8c b6 db c3 26 d3 ba b1 91 87 |l.J.......&.....| +[156 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b d0 31 19 c2 44 d8 7f ae 82 47 02 |0D. ..1..D....G.| +00000010 9c 86 e1 00 48 c4 bd 6a a1 7d 81 7b d9 d5 03 a3 |....H..j.}.{....| +00000020 ce 9d 3f 32 02 20 6d 84 70 c2 ed 54 8d c6 7b 66 |..?2. m.p..T..{f| +00000030 9c 97 c2 52 a5 c8 ad 3b e9 61 b8 39 88 5d d2 42 |...R...;.a.9.].B| +00000040 45 d8 e3 4f c6 70 |E..O.p| +[157 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[158 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 fc 64 e6 c4 b2 8e 7f 77 b6 c6 |0E.!...d.....w..| +00000010 a8 3e a1 04 f0 28 ac d3 2f 6d 6d 12 27 aa 3d 1d |.>...(../mm.'.=.| +00000020 2a 3b 5e 25 22 02 20 4e e1 ff 64 34 70 d0 8b 61 |*;^%". N..d4p..a| +00000030 05 39 98 c5 82 18 e3 9d cc ee 92 67 d3 5a e5 23 |.9.........g.Z.#| +00000040 64 84 a2 c5 f7 0b 22 |d....."| +[159 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15a 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[15b 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[15c 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[15d 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[15e 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[160 10-14 19:00:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[161 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[162 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[163 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[165 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[166 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[167 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[168 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 44 c1 ba 3b a4 3d 4b 23 2c 88 a5 c4 0c 1f 83 |.D..;.=K#,......| +00000010 ff f3 cc a0 dd b7 e7 ec d6 ba 06 ed 8f 39 dd 02 |.............9..| +[169 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 55 91 10 a7 70 b4 b8 17 de 41 ff |0D. GU...p....A.| +00000010 29 12 18 7f c7 69 84 7e 0c f0 26 2f 7f c8 91 e2 |)....i.~..&/....| +00000020 8d d7 55 44 02 20 76 c1 eb 7a ca 78 86 14 60 95 |..UD. v..z.x..`.| +00000030 53 16 91 c6 77 f5 01 74 7f 65 b5 95 a3 32 f1 53 |S...w..t.e...2.S| +00000040 f8 bd 0c 73 38 82 |...s8.| +[16a 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[16b 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 9e 05 18 72 bd a0 99 c4 fa a0 d7 |0D. 8...r.......| +00000010 24 fd 83 b0 72 85 d3 0a de f8 40 31 6f f8 3e e9 |$...r.....@1o.>.| +00000020 ba 3f 44 8a 02 20 49 d2 f9 e9 b0 32 da 63 3a cf |.?D.. I....2.c:.| +00000030 f9 31 18 a6 ab 38 24 e8 03 48 90 07 0c fe eb 2a |.1...8$..H.....*| +00000040 7a 88 0e 1d bd c5 |z.....| +[16c 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[16d 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[16e 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[16f 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[170 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[171 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[172 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173 10-14 19:00:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[174 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[175 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[176 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1BE20E27FE2DCDA075D076A5443FF52CA646BA918AED766AA782FCD89A1CEE24 +[177 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +[178 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17a 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[179 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[17b 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[17c 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[17d 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[17e 10-14 19:00:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17f 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8777768387817457078, Envelope: 961 bytes, Signature: 0 bytes +[180 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[182 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +[183 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 93 db 1d 90 04 4a 71 e3 4a 77 |0E.!.......Jq.Jw| +00000010 5d 7d 59 25 26 9c b2 e2 4a 04 18 6b 92 b9 a2 98 |]}Y%&...J..k....| +00000020 25 fd b2 b1 b6 02 20 04 49 ec a7 b5 ab 8c 08 e9 |%..... .I.......| +00000030 49 a6 25 70 bd dd 25 38 c8 05 4d 66 a1 ec c4 c9 |I.%p..%8..Mf....| +00000040 55 58 a2 d0 10 df 2d |UX....-| +[181 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[184 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8777768387817457078, Envelope: 961 bytes, Signature: 0 bytes +[186 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[187 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +[188 10-14 19:00:55.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[189 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18a 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18b 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[18c 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes +[18e 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18f 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\217\310\206\260c_%\254" > > > , Envelope: 1099 bytes, Signature: 0 bytes +[190 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 2c c0 26 ff b9 df dd 74 3a 98 c9 71 b6 db 97 |[,.&....t:..q...| +00000010 34 d6 c0 66 7e 8b 9c 4f e6 ca 2a 25 c7 e1 64 0c |4..f~..O..*%..d.| +[191 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dc 41 f5 d5 4e d2 30 03 03 0b 4c |0E.!..A..N.0...L| +00000010 09 e0 fe a1 b7 99 0e 51 ea 37 f2 a2 50 1e f8 e1 |.......Q.7..P...| +00000020 23 41 f0 b2 43 02 20 0a a7 21 7e f1 30 d4 d1 ce |#A..C. ..!~.0...| +00000030 3f 37 73 73 45 3f b1 29 3b d1 20 8a b5 0c 26 74 |?7ssE?.);. ...&t| +00000040 d1 91 65 00 6e 7e 3b |..e.n~;| +[192 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[193 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 44 fc f2 5e 71 48 14 f5 b7 0e |0E.!..D..^qH....| +00000010 7e 21 75 a8 1c b2 c0 71 73 20 89 1d 14 cc a1 5b |~!u....qs .....[| +00000020 78 a1 09 5b bb 02 20 7c 7b 6d 10 ef 35 62 96 d8 |x..[.. |{m..5b..| +00000030 ff 2a d5 e0 26 fd 25 bc 1f 53 04 c6 1a 9b 3e 8f |.*..&.%..S....>.| +00000040 c8 86 b0 63 5f 25 ac |...c_%.| +[194 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[195 10-14 19:00:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[196 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[197 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[198 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[199 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[19c 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +[19e 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\217\310\206\260c_%\254" > > alive: > +[19f 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[1a0 10-14 19:00:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a1 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1a2 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1a3 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a4 10-14 19:00:58.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a5 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[1a6 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[1a7 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1a9 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[1aa 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CD989DCF15BB329F0D3D00C4D6E94459731B898D493006EF3039DA706335BBF +[1ab 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ac 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1ad 10-14 19:00:58.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1ae 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +[1af 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\324\317\316\375y\374[0\377\320bnN\351\204\220\020" > > > , Envelope: 1098 bytes, Signature: 0 bytes +[1b0 10-14 19:00:58.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b1 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +[1b2 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2190 bytes, Signature: 0 bytes +[1b4 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c d9 89 dc f1 5b b3 29 f0 d3 d0 0c 4d 6e 94 45 |.....[.)....Mn.E| +00000010 97 31 b8 98 d4 93 00 6e f3 03 9d a7 06 33 5b bf |.1.....n.....3[.| +[1b5 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a3 2c 92 9e 53 73 da a8 47 8b 96 |0D. [.,..Ss..G..| +00000010 a5 db 10 54 40 56 ce b9 d5 df 21 bb b6 07 86 2e |...T@V....!.....| +00000020 6d ac bb f5 02 20 61 3c 58 e2 bf 54 cb 74 52 f9 |m.... a DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1b7 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 4f 68 c4 9a 99 c7 cd f0 15 13 |0E.!..Oh........| +00000010 36 97 ef 28 e5 f7 ab 4a dc ae ea d3 5a 5a a7 9e |6..(...J....ZZ..| +00000020 28 4d c7 66 03 02 20 21 4e 8d 1b 5b 8f 43 96 77 |(M.f.. !N..[.C.w| +00000030 38 d4 0a 3b be 3e d4 cf ce fd 79 fc 5b 30 ff d0 |8..;.>....y.[0..| +00000040 62 6e 4e e9 84 90 10 |bnN....| +[1b8 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b9 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1ba 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb 10-14 19:00:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bc 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1bd 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1bf 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1c0 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d5 88 59 45 13 de d1 40 9e e9 5b 14 6a eb 49 |`..YE...@..[.j.I| +00000010 c2 7f 51 60 51 b3 3e 8a 2f 5f 84 92 f6 e5 c1 32 |..Q`Q.>./_.....2| +[1c1 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 b1 a2 9d d3 99 75 87 e8 ba 3d 24 |0D. v.....u...=$| +00000010 0e 7d 60 38 58 11 d7 5b 5a 43 ec f1 50 86 c7 2f |.}`8X..[ZC..P../| +00000020 de ec 97 d3 02 20 18 f6 e2 29 b3 96 90 d0 f4 22 |..... ...)....."| +00000030 d0 19 cc b5 2b de eb 0e 46 75 99 0c ee fc b3 3b |....+...Fu.....;| +00000040 b8 b6 7a 1b e9 de |..z...| +[1c2 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1c3 10-14 19:01:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 3c 4f 19 fb 22 6e 54 32 89 db fb |0D. . DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c5 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1c6 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c7 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c8 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1c9 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb 10-14 19:01:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cc 10-14 19:01:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1cd 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161007 +[1ce 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D7464D613B7CCC493FDE03C5CBA8BF1F5CE57D597B5A45332B776F92A26A553 +[1cf 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d0 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1d1 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1d2 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1d3 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[1d4 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1d5 10-14 19:01:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d6 10-14 19:01:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41666 +[1d7 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002946460 +[1d8 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[1d9 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[1da 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1db 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[1dc 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[1dd 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1de 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1df 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[1e0 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 88 96 ba 69 ce 68 1f 86 ec 54 91 82 39 5d 6c |....i.h...T..9]l| +00000010 b4 97 ce b8 49 b6 5c a6 b8 50 08 c5 d6 d3 ca f2 |....I.\..P......| +[1e1 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1d fb 91 ad 2c d1 fc 06 bd 82 a5 |0D. 9....,......| +00000010 fe c5 ec 84 b8 3d 88 bd ba c9 93 91 cc 64 6e 8b |.....=.......dn.| +00000020 a0 53 c8 9c 02 20 50 b3 93 3e 56 36 81 d4 c9 38 |.S... P..>V6...8| +00000030 8f d2 b4 c8 a2 a3 6c f6 9e 9b e1 7c 0c 25 6e 5d |......l....|.%n]| +00000040 b8 4c 60 e5 13 20 |.L`.. | +[1e2 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[1e3 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cfea0, header 0xc002946d70 +[1e4 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[1e5 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] processing txid: 9bfc48aeb1a2ab57085ed14a1091c211424fc9a3c081edeb0134860cfa4f73f8 +[1e6 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] Entry chaincode: name:"cscc" +[1e7 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [][9bfc48ae] Entry chaincode: name:"cscc" +[1e8 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[1e9 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +[1ea 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[1eb 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[1ec 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[1ed 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1ee 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[1ef 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[1f0 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 88 96 ba 69 ce 68 1f 86 ec 54 91 82 39 5d 6c |....i.h...T..9]l| +00000010 b4 97 ce b8 49 b6 5c a6 b8 50 08 c5 d6 d3 ca f2 |....I.\..P......| +[1f1 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 1d fb 91 ad 2c d1 fc 06 bd 82 a5 |0D. 9....,......| +00000010 fe c5 ec 84 b8 3d 88 bd ba c9 93 91 cc 64 6e 8b |.....=.......dn.| +00000020 a0 53 c8 9c 02 20 50 b3 93 3e 56 36 81 d4 c9 38 |.S... P..>V6...8| +00000030 8f d2 b4 c8 a2 a3 6c f6 9e 9b e1 7c 0c 25 6e 5d |......l....|.%n]| +00000040 b8 4c 60 e5 13 20 |.L`.. | +[1f2 10-14 19:01:01.85 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +[1f3 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[1f4 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +[1f5 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +[1f6 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +[1f7 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[1f8 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +[1f9 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +[1fa 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[1fb 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +[1fc 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +[1fd 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002a72080)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[1fe 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[1ff 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +[201 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +[200 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +[202 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +[203 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +[204 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +[205 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +[206 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +[207 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +[208 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +[209 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +[20a 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +[20b 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +[20c 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[20d 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +[20e 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +[20f 10-14 19:01:01.87 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +[210 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +[211 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[212 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[213 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[214 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +[215 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[216 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[217 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[218 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[219 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[21a 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[21b 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[21c 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[21d 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[21e 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[21f 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +[220 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a331c0)} +[221 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[222 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[223 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[224 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +[225 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +[226 10-14 19:01:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +[227 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +[228 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x62, 0x2a, 0xf5, 0x9e, 0xff, 0x79, 0x56, 0x36, 0x38, 0x82, 0x91, 0xb5, 0x7b, 0x9f, 0xfb, 0xc5, 0xa2, 0xee, 0x65, 0x4d, 0x17, 0x2f, 0x85, 0xd9, 0x1b, 0xc5, 0xdf, 0xa8, 0xbd, 0xbf, 0xf5, 0xd6} txOffsets= +txId=bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec locPointer=offset=39, bytesLength=28429 +] +[229 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to txid-index +[22a 10-14 19:01:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28429] for tx number:[0] ID: [bd5d101c51a489571492d6553e435dfeab318bc2c6d5909f872ad848b3a3c9ec] to blockNumTranNum index +[22b 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0] +[22c 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +[22d 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +[22e 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +[22f 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +[230 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +[231 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +[232 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +[233 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[234 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +[236 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +[235 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[237 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +[238 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[239 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[23a 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[23b 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[23c 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +[23d 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +[23e 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +[23f 10-14 19:01:01.90 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[240 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +[241 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[242 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[243 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[244 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 34ms (state_validation=6ms block_and_pvtdata_commit=16ms state_commit=7ms) commitHash=[] +[245 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +[246 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a31b6670-80e5-401b-a70e-7b9afbc8bc9a] +[247 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +[248 10-14 19:01:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a31b6670-80e5-401b-a70e-7b9afbc8bc9a] +[249 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[24a 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[24b 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[24c 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[24d 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[24e 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[24f 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[250 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[251 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[252 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[253 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[254 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[255 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[256 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[257 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[258 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[259 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[25a 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[25b 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[25c 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[25d 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[25e 10-14 19:01:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[25f 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[260 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[261 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[262 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[263 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[264 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[265 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[266 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +[267 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[268 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[269 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[26a 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[26b 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[26c 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[26d 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[26e 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[26f 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[270 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[271 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[272 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[273 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[274 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[275 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[276 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[277 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[278 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[279 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[27a 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[27b 10-14 19:01:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[27c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[27d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[27e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[27f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[280 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[281 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[282 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[283 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[284 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[285 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[286 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +[287 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[288 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[289 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[28a 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[28b 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[28c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[28d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[28e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[28f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[290 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[291 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[292 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[293 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[294 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[295 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[296 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[297 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[298 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[299 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[29a 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[29b 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[29c 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[29d 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[29e 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[29f 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[2a0 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[2a1 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[2a2 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[2a3 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +[2a4 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[2a5 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[2a6 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[2a7 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[2a8 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[2a9 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[2aa 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[2ab 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[2ac 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[2ad 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[2ae 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[2af 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[2b0 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[2b1 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[2b2 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[2b3 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[2b4 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[2b5 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[2b6 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[2b7 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[2b8 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[2b9 10-14 19:01:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[2ba 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[2bb 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[2bc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[2bd 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[2be 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[2bf 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[2c0 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[2c1 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[2c2 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[2c3 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[2c4 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[2c5 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[2c6 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[2c7 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[2c8 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[2c9 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[2ca 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[2cb 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[2cc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[2cd 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[2ce 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[2cf 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[2d0 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[2d1 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[2d2 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[2d3 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +[2d4 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[2d5 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2d6 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2d7 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +[2d8 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 15E7C93E7C5E98F226110C490D26EFA65A9344E3AABBC45F1956BDFF92FF5C50 +[2d9 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[2da 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +[2db 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[2dc 10-14 19:01:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[2dd 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[2de 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[2df 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[2e0 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[2e1 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +[2e2 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +[2e3 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +[2e4 10-14 19:01:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[2e5 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2e6 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[2e7 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[2e8 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +[2e9 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +[2ea 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +[2eb 10-14 19:01:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +[2ec 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +[2ee 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2ed 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2ef 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +[2f0 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f1 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [69463385-4c0a-4b7e-977b-2b7599a5d555] +[2f2 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f3 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [69463385] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f4 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [69463385] notifying Txid:69463385-4c0a-4b7e-977b-2b7599a5d555, channelID:businesschannel +[2f5 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f6 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[2f7 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [69463385-4c0a-4b7e-977b-2b7599a5d555] +[2f8 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f9 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [37cb7972-24af-4629-a9a3-1a8b9395249c] +[2fa 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2fb 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[2fc 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [37cb7972] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2fd 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [37cb7972] notifying Txid:37cb7972-24af-4629-a9a3-1a8b9395249c, channelID:businesschannel +[2fe 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2ff 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[300 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [37cb7972-24af-4629-a9a3-1a8b9395249c] +[301 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[302 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c86b0933-1fdb-4eaf-9900-db1777bc7163] +[303 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[304 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[305 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [c86b0933] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[306 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU [c86b0933] notifying Txid:c86b0933-1fdb-4eaf-9900-db1777bc7163, channelID:businesschannel +[307 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[308 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +[309 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c86b0933-1fdb-4eaf-9900-db1777bc7163] +[30a 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[30b 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ea343cc4-ea62-479b-8acb-7c663ee6c48d] +[30c 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[30d 10-14 19:01:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ea343cc4-ea62-479b-8acb-7c663ee6c48d] +[30e 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[30f 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +[310 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E80CA59D4B5D2E53BC03E275B038F2E83D346351F41D5ACAFD982B571F37FAD +[311 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[312 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [9bfc48ae] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[313 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [9bfc48ae] notifying Txid:9bfc48aeb1a2ab57085ed14a1091c211424fc9a3c081edeb0134860cfa4f73f8, channelID: +[314 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[315 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> INFO [][9bfc48ae] Exit chaincode: name:"cscc" (149ms) +[316 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][9bfc48ae] Exit +[317 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41666 +[318 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41666 grpc.code=OK grpc.call_duration=154.2405ms +[319 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +[31a 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[31b 10-14 19:01:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c 10-14 19:01:02.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41666: read: connection reset by peer +[31d 10-14 19:01:02.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[31e 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[31f 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[320 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[321 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[322 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[323 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[324 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[325 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[326 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[327 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[328 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 gate 1602702062396672700 evaluation starts +[329 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 signed by 0 principal evaluation starts (used [false]) +[32a 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 processing identity 0 with bytes of 115a6c0 +[32b 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[32c 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 principal evaluation fails +[32d 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bc740 gate 1602702062396672700 evaluation fails +[32e 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[32f 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[330 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[331 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 gate 1602702062398866200 evaluation starts +[332 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 signed by 0 principal evaluation starts (used [false]) +[333 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 processing identity 0 with bytes of 115a6c0 +[334 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[335 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[336 10-14 19:01:02.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[337 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 principal matched by identity 0 +[338 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[339 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[33a 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 principal evaluation succeeds for identity 0 +[33b 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd590 gate 1602702062398866200 evaluation succeeds +[33c 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[33d 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[33e 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33f 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[340 10-14 19:01:02.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[341 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[342 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[343 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[344 10-14 19:01:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[345 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[346 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[347 10-14 19:01:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[348 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[349 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 7a 6d c5 60 ce 44 28 a3 ae 43 d5 60 44 c6 16 |.zm.`.D(..C.`D..| +00000010 e7 25 ad 02 71 dc 9a 00 2a 1e 0c 79 25 5a 67 10 |.%..q...*..y%Zg.| +[34a 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 cc ef 61 c2 35 54 9a fc ee 3a 59 |0D. ...a.5T...:Y| +00000010 c3 39 2e 9b 27 30 0d 6d 26 d5 56 98 2f de cb 11 |.9..'0.m&.V./...| +00000020 9f ac b6 03 02 20 3e 4a eb 2f 1d e7 cd 43 4e 2b |..... >J./...CN+| +00000030 56 58 79 3c 7f 5c f3 50 a1 3a 76 82 7a 36 cb a5 |VXy<.\.P.:v.z6..| +00000040 51 e7 ad d3 cd 1d |Q.....| +[34b 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[34c 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db ee 3d 86 9a 0e e7 e3 75 48 f4 |0E.!...=.....uH.| +00000010 4e 9c 95 5f 58 a7 db 58 e1 2e 2f 39 33 f9 51 c9 |N.._X..X../93.Q.| +00000020 43 08 20 ae 5d 02 20 5e 40 95 ab 20 44 72 16 6a |C. .]. ^@.. Dr.j| +00000030 e0 31 a3 5d b4 47 cd 6a 78 9d 92 6a 10 80 41 05 |.1.].G.jx..j..A.| +00000040 71 ef c7 b1 e4 01 8e |q......| +[34d 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[34e 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[34f 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[350 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[351 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[352 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[353 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[354 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[355 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[356 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +[357 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:J\353/\035\347\315CN+VXy<\177\\\363P\241:v\202z6\313\245Q\347\255\323\315\035" secret_envelope: > alive:\364\366\311\014\377+,\353\032\347~\211\234h\014i\254\017" secret_envelope: > +[358 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[359 10-14 19:01:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35a 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[35b 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[35c 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[35d 10-14 19:01:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35e 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[35f 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[360 10-14 19:01:02.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[361 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[362 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161008 +[363 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DA3FFCD2AF4722E55E656241F0293E3A0CA0DAE356391AF059362D34F429DB3 +[364 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[365 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[366 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[367 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[368 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\206)\261\325\346<\3635\215\3724eWsN\357b\006x\360\367\214\002 _\225\330\264E\005\354\201&\226\264}\276]>\311.)\034\240&\r\022\365T@\036\257\245\004\\\213" > > > , Envelope: 272 bytes, Signature: 0 bytes +[369 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36a 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[36b 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[36d 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[36e 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d a3 ff cd 2a f4 72 2e 55 e6 56 24 1f 02 93 e3 |}...*.r.U.V$....| +00000010 a0 ca 0d ae 35 63 91 af 05 93 62 d3 4f 42 9d b3 |....5c....b.OB..| +[36f 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 1d 62 02 6a 23 7e 2d 76 2e a6 |0E.!...b.j#~-v..| +00000010 13 1b a7 a0 93 0a d9 1a a7 8b 24 6a df 7d 28 27 |..........$j.}('| +00000020 f3 08 cc 01 54 02 20 36 55 a7 01 c0 9f f7 ec 6b |....T. 6U......k| +00000030 ac 77 fa a9 51 1e 9d 34 eb df 99 70 6a 98 4c 2d |.w..Q..4...pj.L-| +00000040 79 75 a4 f6 39 90 ca |yu..9..| +[370 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[371 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 88 45 bf 76 3b b9 61 c8 3e 86 |0E.!...E.v;.a.>.| +00000010 29 b1 d5 e6 3c f3 35 8d fa 34 65 57 73 4e ef 62 |)...<.5..4eWsN.b| +00000020 06 78 f0 f7 8c 02 20 5f 95 d8 b4 45 05 ec 81 26 |.x.... _...E...&| +00000030 96 b4 7d be 5d 3e c9 2e 29 1c a0 26 0d 12 f5 54 |..}.]>..)..&...T| +00000040 40 1e af a5 04 5c 8b |@....\.| +[372 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[373 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[374 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[375 10-14 19:01:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[376 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41674 +[377 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0031c71d0 +[378 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[379 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[37a 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[37b 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[37c 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 09 b4 95 ed 97 7c 82 52 8d dd 92 8e e9 40 51 |......|.R.....@Q| +00000010 38 46 c5 84 c0 78 64 39 f8 f8 e0 4f af e0 82 3e |8F...xd9...O...>| +[37d 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 5e 56 9b 46 ff c2 fa 69 06 d7 |0E.!..^V.F...i..| +00000010 50 81 02 00 ec 5a af 35 f3 b4 b3 aa 6a d4 6e d6 |P....Z.5....j.n.| +00000020 8f d5 3b 6f b8 02 20 0b 35 2c 24 22 ef c6 2b 97 |..;o.. .5,$"..+.| +00000030 cb 2b e9 cd d7 60 7f 7a db 32 c7 e9 c9 86 aa 89 |.+...`.z.2......| +00000040 93 fb 49 6b 5d 40 51 |..Ik]@Q| +[37e 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[37f 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e16c0, header 0xc0031c75e0 +[380 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[381 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] processing txid: abdafc19fa063b4a226cc0b3405d67c8ab53ac1a421c467c4927b17d7dba3886 +[382 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] Entry chaincode: name:"cscc" +[383 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO [][abdafc19] Entry chaincode: name:"cscc" +[384 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[385 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[386 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[387 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[388 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[389 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 09 b4 95 ed 97 7c 82 52 8d dd 92 8e e9 40 51 |......|.R.....@Q| +00000010 38 46 c5 84 c0 78 64 39 f8 f8 e0 4f af e0 82 3e |8F...xd9...O...>| +[38a 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 5e 56 9b 46 ff c2 fa 69 06 d7 |0E.!..^V.F...i..| +00000010 50 81 02 00 ec 5a af 35 f3 b4 b3 aa 6a d4 6e d6 |P....Z.5....j.n.| +00000020 8f d5 3b 6f b8 02 20 0b 35 2c 24 22 ef c6 2b 97 |..;o.. .5,$"..+.| +00000030 cb 2b e9 cd d7 60 7f 7a db 32 c7 e9 c9 86 aa 89 |.+...`.z.2......| +00000040 93 fb 49 6b 5d 40 51 |..Ik]@Q| +[38b 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [abdafc19] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[38c 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [abdafc19] notifying Txid:abdafc19fa063b4a226cc0b3405d67c8ab53ac1a421c467c4927b17d7dba3886, channelID: +[38d 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[38e 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO [][abdafc19] Exit chaincode: name:"cscc" (3ms) +[38f 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU [][abdafc19] Exit +[390 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41674 +[391 10-14 19:01:03.41 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41674 grpc.code=OK grpc.call_duration=6.763ms +[392 10-14 19:01:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[393 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +[394 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[395 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[396 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[397 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[398 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C08C0CBCAED8AA1FC9E161001 +[399 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9BF3FFF4F73C6C61D8B3BD721C9722A66915A6819EDFC0D34F7645023ADC2529 +[39a 10-14 19:01:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[39b 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes to 1 peers +[39c 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: > , Envelope: 70 bytes, Signature: 70 bytes +[39d 10-14 19:01:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39e 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41682 +[39f 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00325a460 +[3a0 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3a1 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3a2 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3a3 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3a4 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 8b 73 48 06 86 d3 f8 71 51 0d ae ae 8d 52 5e |..sH....qQ....R^| +00000010 47 8d 69 0d 50 98 6e 18 6a 04 0b b2 0d 67 93 a7 |G.i.P.n.j....g..| +[3a5 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 51 f4 47 1a ca 79 ff d2 b2 5c |0E.!..Q.G..y...\| +00000010 3e 96 ca 9b 68 4f 95 f8 0a 5d ea 7c 19 19 ad 3c |>...hO...].|...<| +00000020 b7 6c 68 e3 dc 02 20 58 f8 c0 75 fa b8 ce c4 12 |.lh... X..u.....| +00000030 3d 7f d2 8c 0c d0 d7 77 ee 34 01 1d df 40 76 64 |=......w.4...@vd| +00000040 a2 d9 89 9b 29 d5 9b |....)..| +[3a6 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3a7 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e1c70, header 0xc00325a870 +[3a8 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[3a9 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] processing txid: 3ad0fce8e380797bc4744f1ef3a30915f025925a7694ea92334f7c11e956910e +[3aa 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] Entry chaincode: name:"qscc" +[3ab 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> INFO [][3ad0fce8] Entry chaincode: name:"qscc" +[3ac 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3ad 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[3ae 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[3af 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3b0 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b1 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b2 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3b3 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b4 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[3b5 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 gate 1602702064328925100 evaluation starts +[3b6 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 signed by 0 principal evaluation starts (used [false]) +[3b7 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 processing identity 0 with bytes of 115a6c0 +[3b8 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3b9 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 principal evaluation fails +[3ba 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00328b1c0 gate 1602702064328925100 evaluation fails +[3bb 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3bc 10-14 19:01:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3bd 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3be 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 gate 1602702064330066700 evaluation starts +[3bf 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 signed by 0 principal evaluation starts (used [false]) +[3c0 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 processing identity 0 with bytes of 115a6c0 +[3c1 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[3c2 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[3c3 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[3c4 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 principal matched by identity 0 +[3c5 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 8b 73 48 06 86 d3 f8 71 51 0d ae ae 8d 52 5e |..sH....qQ....R^| +00000010 47 8d 69 0d 50 98 6e 18 6a 04 0b b2 0d 67 93 a7 |G.i.P.n.j....g..| +[3c6 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 51 f4 47 1a ca 79 ff d2 b2 5c |0E.!..Q.G..y...\| +00000010 3e 96 ca 9b 68 4f 95 f8 0a 5d ea 7c 19 19 ad 3c |>...hO...].|...<| +00000020 b7 6c 68 e3 dc 02 20 58 f8 c0 75 fa b8 ce c4 12 |.lh... X..u.....| +00000030 3d 7f d2 8c 0c d0 d7 77 ee 34 01 1d df 40 76 64 |=......w.4...@vd| +00000040 a2 d9 89 9b 29 d5 9b |....)..| +[3c7 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 principal evaluation succeeds for identity 0 +[3c8 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a4010 gate 1602702064330066700 evaluation succeeds +[3c9 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3ca 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3cb 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3cc 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3cd 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [3ad0fce8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3ce 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [3ad0fce8] notifying Txid:3ad0fce8e380797bc4744f1ef3a30915f025925a7694ea92334f7c11e956910e, channelID: +[3cf 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3d0 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> INFO [][3ad0fce8] Exit chaincode: name:"qscc" (8ms) +[3d1 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][3ad0fce8] Exit +[3d2 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41682 +[3d3 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41682 grpc.code=OK grpc.call_duration=12.0289ms +[3d4 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41682: read: connection reset by peer +[3d5 10-14 19:01:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3d6 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3d7 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d8 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3d9 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3da 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 56 8e 24 d1 48 8a 58 40 ad 5f 1e 75 73 06 1f |.V.$.H.X@._.us..| +00000010 4a ab 81 b2 c0 13 8b 35 c6 3d 74 d7 3e 6d c7 69 |J......5.=t.>m.i| +[3db 10-14 19:01:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 ca db be 91 c0 b5 c4 6e b5 39 04 |0D. ........n.9.| +00000010 0c c3 d2 12 d5 83 4a ba c4 1d 4a 32 cd cd d9 dc |......J...J2....| +00000020 7f 3b 9d 2b 02 20 1d ea 4b 0b 02 8b 04 bd 5e e0 |.;.+. ..K.....^.| +00000030 ee 37 82 ac b4 8e 3a 0f 75 8e 33 fd 82 dd 60 5a |.7....:.u.3...`Z| +00000040 5d 2b 13 ce 3f 9e |]+..?.| +[3dc 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3dd 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 02 52 08 fe c0 b0 66 ba ae 3e 99 |0D. ..R....f..>.| +00000010 4e 2d f7 d8 ec 1c 32 65 da 5a 95 aa 6a 70 60 b4 |N-....2e.Z..jp`.| +00000020 bb 9d 48 0a 02 20 24 d7 f5 bc 11 91 12 07 4c f9 |..H.. $.......L.| +00000030 51 2d b6 5e 17 a3 19 72 29 b8 43 f6 87 4a e9 43 |Q-.^...r).C..J.C| +00000040 6b 93 7d cd a1 17 |k.}...| +[3de 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3df 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3e0 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3e1 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3e2 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3e3 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e5 10-14 19:01:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e6 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e7 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161009 +[3e8 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B9CE9DC7436526318CED2D2BC5C9A2EAD8D51456B7D52B4B04B1B61842A585E9 +[3e9 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ea 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3eb 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3ec 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3ed 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[3ee 10-14 19:01:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3ef 10-14 19:01:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f0 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3f1 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +[3f2 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f4 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f3 10-14 19:01:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3f6 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3f7 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[3f8 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f5 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3f9 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[3fa 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[3fb 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fc 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020801 +[3fd 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E80CA59D4B5D2E53BC03E275B038F2E83D346351F41D5ACAFD982B571F37FAD +[3fe 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +[3ff 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[400 10-14 19:01:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[401 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[402 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[403 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[404 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[405 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[406 10-14 19:01:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[407 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[408 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb fc 80 42 35 24 a9 74 28 e9 78 |0E.!....B5$.t(.x| +00000010 7c f8 85 70 64 44 10 e1 ab 13 af fb 36 de 4d b1 ||..pdD......6.M.| +00000020 5c bd ec ac f7 02 20 0d c7 77 59 7c 21 39 23 26 |\..... ..wY|!9#&| +00000030 c3 3d 1a 03 f5 48 69 fa 96 75 8c 4a 53 76 4f 65 |.=...Hi..u.JSvOe| +00000040 83 37 4e 7e 88 2f fc |.7N~./.| +[409 10-14 19:01:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40a 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40b 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[40c 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[40d 10-14 19:01:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[40f 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[410 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[411 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[412 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c2 5e 03 50 4f 17 af 37 62 cb 29 aa a6 fc f5 |O.^.PO..7b.)....| +00000010 2b 6e 97 d1 43 5f ec df 92 24 c0 a5 c7 90 34 f6 |+n..C_...$....4.| +[413 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 d7 0e b6 36 90 5d cc 50 1d |0E.!......6.].P.| +00000010 92 d7 2d 10 f0 67 12 ae a4 15 28 3d 73 39 c6 e0 |..-..g....(=s9..| +00000020 87 2a a2 e3 2e 02 20 58 97 17 97 a7 09 0a 15 f2 |.*.... X........| +00000030 b0 22 c6 2f 75 ef 8c e1 bd b9 e0 33 5f c8 9c 05 |."./u......3_...| +00000040 9b 93 54 14 9d d7 02 |..T....| +[414 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[415 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 98 4b ce b4 ff 7e d9 71 d0 39 d0 |0D. B.K...~.q.9.| +00000010 29 31 b9 e7 d0 10 dc 1d 5f 4a e2 bc ec 05 2b 19 |)1......_J....+.| +00000020 82 f4 5d 3f 02 20 04 9d 0c 55 df 9f 8e a5 c1 e4 |..]?. ...U......| +00000030 ab b3 81 28 70 da 81 d6 4d 21 a0 5e 6b 75 48 40 |...(p...M!.^kuH@| +00000040 37 1a 8d 6c 08 b4 |7..l..| +[416 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[417 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[418 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[419 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[41a 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[41b 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41e 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[41f 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +[420 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[421 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +[422 10-14 19:01:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[423 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[424 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[425 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[426 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[427 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[428 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[429 10-14 19:01:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42a 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[42b 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16100A +[42c 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BE742A05D3C4372C09F173865C39323EDC160DEE37C3A1A6BEF83A7D540FC8A5 +[42d 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[42e 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[42f 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[430 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[431 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:)\274\377" > > > , Envelope: 272 bytes, Signature: 0 bytes +[432 10-14 19:01:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[433 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[434 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[435 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[436 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[437 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be 74 2a 05 d3 c4 37 2c 09 f1 73 86 5c 39 32 3e |.t*...7,..s.\92>| +00000010 dc 16 0d ee 37 c3 a1 a6 be f8 3a 7d 54 0f c8 a5 |....7.....:}T...| +[438 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f 2c c4 84 d1 7f b6 e5 d2 82 84 |0E.!..,.........| +00000010 4a 37 27 2c ec ab f5 33 18 f0 1a b7 81 64 f7 84 |J7',...3.....d..| +00000020 e7 cb 38 da e8 02 20 4a c0 b6 b8 03 13 8e 43 93 |..8... J......C.| +00000030 f7 dc 4c 1d c1 be 94 e5 c9 08 47 4e 80 e5 8a d1 |..L.......GN....| +00000040 5d a6 7d 23 e3 0b cd |].}#...| +[439 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[43a 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 8b bf 4f 88 1d 9a 5b 11 86 15 |0E.!....O...[...| +00000010 8e e2 06 b2 96 8f 46 dc 72 9d d7 b3 6d ca 87 df |......F.r...m...| +00000020 94 48 6b 78 63 02 20 12 cb 74 9d f3 cc 24 aa 65 |.Hkxc. ..t...$.e| +00000030 e8 35 a9 e2 f6 4b 66 98 7a 8d 6b 0c b5 c1 56 9f |.5...Kf.z.k...V.| +00000040 20 34 ff 3e 29 bc ff | 4.>)..| +[43b 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[43c 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[43d 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43e 10-14 19:01:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43f 10-14 19:01:06.95 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +[440 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[441 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 4d 8f b1 a3 89 6b e2 82 b6 0c 88 63 2b 03 a7 |;M....k.....c+..| +00000010 1b 4b ae bc fe 6e 63 b0 d9 9c 4d 48 51 ed 93 1a |.K...nc...MHQ...| +[442 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 77 28 d9 83 99 fc 0a 36 40 23 |0E.!..w(.....6@#| +00000010 66 00 6a 42 e7 03 30 92 cb 15 a0 43 cf 9b ab 43 |f.jB..0....C...C| +00000020 09 aa cd b6 43 02 20 12 60 06 35 64 41 b6 9e 84 |....C. .`.5dA...| +00000030 a5 c0 44 a2 c0 df 54 5f 14 aa ab 57 06 62 6d 4f |..D...T_...W.bmO| +00000040 c0 58 e3 0b 67 01 ad |.X..g..| +[443 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[444 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[445 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[446 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[447 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Some peer is already a leader +[448 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[449 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[44a 10-14 19:01:08.39 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[44b 10-14 19:01:08.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes +[44c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[44e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[44f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[450 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[451 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[452 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +zT4JIZZIt8ZQKDz2PbySBfC+rA== +-----END CERTIFICATE----- +[453 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 gate 1602702068421362100 evaluation starts +[454 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 signed by 0 principal evaluation starts (used [false]) +[455 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 processing identity 0 with bytes of 115a6c0 +[456 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[457 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[458 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[459 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 principal matched by identity 0 +[45a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff cb e9 0a dc dd 93 4b 3a c6 d4 40 fe b8 22 cb |.......K:..@..".| +00000010 cc 9a ca 35 fb e8 e7 51 b6 74 3d 19 c8 72 98 71 |...5...Q.t=..r.q| +[45b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 09 11 d5 2a 27 eb 58 ea 8d dd af |0D. ....*'.X....| +00000010 cb f5 4b 6d a8 69 80 dd ae 0a bc 98 b8 e4 6a d0 |..Km.i........j.| +00000020 b4 1c 06 30 02 20 4c 8d 36 00 c8 70 00 d6 7e 55 |...0. L.6..p..~U| +00000030 5b 01 0a c8 f3 03 b6 26 b9 34 f3 61 fb b1 37 96 |[......&.4.a..7.| +00000040 de 4a 4a 2d c9 e7 |.JJ-..| +[45c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 principal evaluation succeeds for identity 0 +[45d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f1090 gate 1602702068421362100 evaluation succeeds +[45e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[45f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[460 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[461 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[462 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28180 bytes, seq: 1}, Envelope: 28213 bytes, Signature: 0 bytes to the block puller +[463 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +[464 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[465 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[466 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[467 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +[468 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +[469 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +[46a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +[46b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +[46c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[46d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0032e6580 env 0xc0031f7e00 txn 0 +[46e 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031f7e00 +[46f 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +[470 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[471 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[472 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[473 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[474 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[475 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[476 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[477 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[478 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[479 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 cc 88 08 db 23 45 ac 6d f1 cf 96 75 c2 6b 83 |.....#E.m...u.k.| +00000010 8f f1 6a 38 16 43 87 49 2d 22 ca eb e1 2c 91 ba |..j8.C.I-"...,..| +[47a 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 3a b3 ee a3 98 a0 88 14 be 5d 2b |0D. .:........]+| +00000010 84 41 a1 86 5c 60 90 cc 0e 33 4a 53 7b 1f e5 30 |.A..\`...3JS{..0| +00000020 55 cc c6 b3 02 20 4b 51 fe 4c 6c 98 ca 31 26 d3 |U.... KQ.Ll..1&.| +00000030 79 c9 0e c2 73 93 09 22 ec ec 0c bb fe 97 bf 02 |y...s.."........| +00000040 69 60 4d b6 27 ea |i`M.'.| +[47b 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[47c 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0033ab500, header channel_header:"\010\001\032\006\010\361\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\220-\243`j\344\315\244\375\225\272\357\240t\225QD\317\311\260\340\206}\203" +[47d 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[47e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[47f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[480 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[481 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[482 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[483 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[484 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[485 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[486 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[487 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[488 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[489 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[48a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[48b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[48c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[48d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +[48e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +[48f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[490 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[491 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[492 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[493 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[494 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[495 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +[496 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[497 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[498 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +[499 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[49a 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 gate 1602702068430926900 evaluation starts +[49b 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 signed by 0 principal evaluation starts (used [false]) +[49c 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 processing identity 0 with bytes of 115a6c0 +[49d 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[49e 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[49f 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4a0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4a1 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[4a2 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4a3 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 principal matched by identity 0 +[4a4 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e 41 f6 ad 34 83 54 25 b3 78 7d d7 67 87 62 d4 |.A..4.T%.x}.g.b.| +00000010 d9 68 50 4e 6b 3c 38 a8 8f e4 db 9d 25 84 bb e6 |.hPNk<8.....%...| +[4a5 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 f2 21 31 50 25 af 39 88 d3 ca 1f |0D. T.!1P%.9....| +00000010 81 c2 31 d0 37 2f cf 9b 50 ef 80 9b 54 40 3c c5 |..1.7/..P...T@<.| +00000020 18 56 32 9b 02 20 2c e7 a5 ba 85 24 b7 e3 4e 8c |.V2.. ,....$..N.| +00000030 45 02 e9 e2 c9 7d bd 80 ca d9 84 a8 47 e8 1f d7 |E....}......G...| +00000040 4b 9a 28 c2 f7 c3 |K.(...| +[4a6 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 principal evaluation succeeds for identity 0 +[4a7 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e08f0 gate 1602702068430926900 evaluation succeeds +[4a8 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[4a9 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[4aa 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +[4ab 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4ac 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4ad 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4ae 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4af 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[4b0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4b1 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4b2 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[4b3 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[4b4 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[4b5 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4b6 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4b7 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4b8 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4b9 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4ba 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4bb 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4bc 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[4bd 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4be 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4bf 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4c0 10-14 19:01:08.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4c1 10-14 19:01:08.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4c2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52122 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes +[4c3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4c4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[4c5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[4c6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4c7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[4c8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 gate 1602702068442446700 evaluation starts +[4c9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 signed by 0 principal evaluation starts (used [false]) +[4ca 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 processing identity 0 with bytes of 115a6c0 +[4cb 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 principal matched by identity 0 +[4cc 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 f9 c1 20 15 cf df 55 6d 9b a0 06 f0 99 6b 98 |x.. ...Um.....k.| +00000010 b6 83 2e 5e 9e 97 be fe 6e 72 f7 f6 67 73 da 4e |...^....nr..gs.N| +[4cd 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb d0 f8 7c 65 7e 6d ba 5f 50 a4 |0E.!....|e~m._P.| +00000010 ec 57 38 53 da de 25 9c b6 3d 35 53 5d 6e 35 5f |.W8S..%..=5S]n5_| +00000020 88 fa ad 23 85 02 20 36 31 a6 08 99 74 aa 1f f1 |...#.. 61...t...| +00000030 15 e0 c7 e6 aa 19 d4 db 07 58 1a 05 88 1b f9 96 |.........X......| +00000040 d9 ad 45 4e 69 e5 27 |..ENi.'| +[4ce 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 principal evaluation succeeds for identity 0 +[4cf 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398a30 gate 1602702068442446700 evaluation succeeds +[4d0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[4d1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[4d2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[4d3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[4d5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[4d6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[4d4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28188 bytes, seq: 2}, Envelope: 28221 bytes, Signature: 0 bytes to the block puller +[4d7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +[4d8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[4d9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4da 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[4db 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[4dc 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[4dd 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4de 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[4df 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[4e1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[4e0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[4e2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[4e3 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[4e4 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[4e5 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[4e6 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4e7 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[4e8 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[4e9 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4ea 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4eb 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[4ec 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4ed 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4ee 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[4ef 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[4f0 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[4f1 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[4f2 10-14 19:01:08.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4f3 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4f4 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4f5 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4f6 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4f7 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[4f8 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[4f9 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4fa 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4fb 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[4fc 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[4fd 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4fe 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4ff 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[500 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[501 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[502 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[503 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[504 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[505 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[506 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[507 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[508 10-14 19:01:08.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[509 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[50a 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[50b 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[50c 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[50d 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[50e 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[50f 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[510 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[511 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[512 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[514 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[515 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[513 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.463Z grpc.peer_address=172.18.0.8:52172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=226.4µs +[516 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[517 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[518 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[519 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[51a 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[51b 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[51c 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[51d 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[51e 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[51f 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[520 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[521 10-14 19:01:08.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[522 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[523 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[524 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[525 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[526 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[527 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[528 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[529 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[52a 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[52b 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[52c 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[52d 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[52e 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:52172 +[52f 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52172 +[530 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[531 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 3c 6e c8 06 0a c8 90 4b d4 c2 |0E.!.. DEBU Authenticated 172.18.0.8:52172 +[533 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52172 +[534 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52122 disconnected +[535 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:52122 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.0238402s +[536 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[537 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[538 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52172 disconnected +[539 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.473Z grpc.peer_address=172.18.0.8:52172 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.1156ms +[53a 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[53b 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[53c 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[53d 10-14 19:01:08.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[53e 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[53f 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[540 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[541 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[542 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[543 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[544 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[545 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[546 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[547 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[548 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[549 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[54a 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[54b 10-14 19:01:08.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[54c 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[54d 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[54e 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[54f 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[550 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[551 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[552 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[553 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[554 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[555 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[556 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[557 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[558 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[559 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[55a 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[55b 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[55c 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[55d 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[55e 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[55f 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[560 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[561 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[562 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[563 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[564 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[565 10-14 19:01:08.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[566 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[567 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[568 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[569 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[56a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[56b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[56c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[56d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[56e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[56f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[570 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[571 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[572 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[573 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[574 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[575 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[576 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[577 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[578 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[579 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[57a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[57b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[57c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[57d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[57e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[57f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[580 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 gate 1602702068501315500 evaluation starts +[581 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 signed by 0 principal evaluation starts (used [false]) +[582 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 processing identity 0 with bytes of 115a6c0 +[583 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[584 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 principal evaluation fails +[585 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355da20 gate 1602702068501315500 evaluation fails +[586 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[587 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[588 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[589 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 gate 1602702068503512100 evaluation starts +[58a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 signed by 0 principal evaluation starts (used [false]) +[58b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 processing identity 0 with bytes of 115a6c0 +[58c 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 principal matched by identity 0 +[58d 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[58e 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[58f 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 principal evaluation succeeds for identity 0 +[590 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355df90 gate 1602702068503512100 evaluation succeeds +[591 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[592 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[593 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[594 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[595 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[596 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[597 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[598 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[599 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[59a 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +[59b 10-14 19:01:08.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[59c 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[59d 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[59e 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[59f 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[5a0 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[5a1 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0032e6580 env 0xc0031f7e00 txn 0 +[5a2 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[5a3 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 96ms +[5a4 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[5a5 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[5a6 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[5a7 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +[5a8 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[5a9 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[5aa 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[5ab 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +[5ac 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[5ad 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[5ae 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[5af 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[5b0 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[5b1 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[5b2 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[5b3 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[5b4 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[5b5 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[5b6 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +[5b7 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00357b100)} +[5b8 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[5b9 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[5ba 10-14 19:01:08.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[5bb 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +[5bc 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +[5bd 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +[5be 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +[5bf 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0x61, 0xea, 0xdf, 0x30, 0xce, 0x87, 0x8c, 0x45, 0x6b, 0x52, 0x2, 0x21, 0x98, 0x65, 0xb7, 0x28, 0xa3, 0x3b, 0xb5, 0x61, 0x9e, 0x30, 0xd0, 0x1c, 0x9c, 0xa, 0x9f, 0xb, 0x10, 0xd4, 0x3a, 0x7c} txOffsets= +txId=a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205 locPointer=offset=71, bytesLength=27135 +] +[5c0 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to txid-index +[5c1 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28546, bytesLength=27135] for tx number:[0] ID: [a8f4442e27115147072188a9918bcf81cba378abf482af235c241800418d9205] to blockNumTranNum index +[5c2 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56677], isChainEmpty=[false], lastBlockNumber=[1] +[5c3 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +[5c4 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +[5c5 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +[5c6 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[5c7 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[5c8 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[5c9 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[5ca 10-14 19:01:08.53 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[5cb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[5cc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +[5cd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +[5ce 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +[5cf 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[5d0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +[5d1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[5d2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[5d3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[5d4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 19ms (state_validation=5ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +[5d5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +[5d6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +[5d7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +[5d8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +[5d9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +[5da 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[5db 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00357b440 env 0xc0036a00f0 txn 0 +[5dc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0036a00f0 +[5dd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +[5de 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[5df 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[5e0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[5e1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5e2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[5e3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[5e4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[5e5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[5e6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[5e7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 94 f2 ea e7 a7 61 13 61 d9 ff 50 7b fa ea 1f |......a.a..P{...| +00000010 b9 06 87 71 7e 07 a8 95 bc 30 56 f8 0b a8 40 32 |...q~....0V...@2| +[5e8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cc 65 f3 74 a3 d2 27 7a a3 60 |0E.!...e.t..'z.`| +00000010 c1 a4 a2 b9 74 15 cc 88 83 d8 e9 5f b5 7b 43 c2 |....t......_.{C.| +00000020 c4 30 51 3c fe 02 20 49 7e f0 23 7d 86 fc 4a 5c |.0Q<.. I~.#}..J\| +00000030 d4 90 30 5b ad 13 19 2c 90 0f f8 1c e1 90 b7 e3 |..0[...,........| +00000040 7f 4b 57 be 84 c8 e9 |.KW....| +[5e9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[5ea 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0036b3500, header channel_header:"\010\001\032\006\010\363\225\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\016\264\315\261Xv?TM6?\361m\224\355\274\357\373\340\203\340t\327:" +[5eb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[5ec 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5ed 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5ee 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5ef 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5f0 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5f1 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5f2 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5f3 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5f4 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5f5 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5f6 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5f7 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[5f8 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5f9 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5fa 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5fb 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +[5fc 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +[5fd 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[5fe 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[5ff 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[600 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[601 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[602 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[603 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +[604 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[605 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[606 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +[607 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[608 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[609 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[60a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 gate 1602702068547646400 evaluation starts +[60b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 signed by 0 principal evaluation starts (used [false]) +[60c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 processing identity 0 with bytes of 115a6c0 +[60d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[60e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[60f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[610 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[611 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[612 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[613 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 principal matched by identity 0 +[614 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 5d 40 f9 f6 dd 39 45 30 5f 39 cb ba 14 16 ef |.]@...9E0_9.....| +00000010 14 68 af bd 7a 43 89 9a f2 a2 1d 44 08 75 62 99 |.h..zC.....D.ub.| +[615 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 48 ad 4c 5c d6 fd ff 68 f1 f2 |0E.!..H.L\...h..| +00000010 56 58 83 5a 2b 7f 72 83 ec e6 9a 81 a5 83 d7 a6 |VX.Z+.r.........| +00000020 e1 85 34 a9 7c 02 20 33 fa 13 d2 1d 76 ee f4 89 |..4.|. 3....v...| +00000030 8b ee 49 15 52 c6 a0 14 d5 c8 f9 b6 c3 88 bb 10 |..I.R...........| +00000040 a1 ce b7 6d c5 7f dd |...m...| +[616 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 principal evaluation succeeds for identity 0 +[617 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036cd800 gate 1602702068547646400 evaluation succeeds +[618 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[619 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[61a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +[61b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[61c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[61d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[61e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[61f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[620 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[621 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[622 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[623 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[624 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[625 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[626 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[627 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[628 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[629 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[62a 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[62b 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[62c 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[62d 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[62e 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[62f 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[630 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[631 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[632 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[633 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[634 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[635 10-14 19:01:08.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[636 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[637 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[638 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[639 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[63a 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[63b 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[63c 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[63d 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[63e 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[63f 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[640 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[641 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[642 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[643 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[644 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[645 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[646 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[647 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[648 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[649 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[64a 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[64b 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[64c 10-14 19:01:08.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[64d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[64e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[64f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[650 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[651 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[652 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[653 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[654 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[655 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[656 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[657 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[658 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[659 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[65a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[65b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[65c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[65d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[65e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[65f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[660 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[661 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[662 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[663 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[664 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[665 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[666 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[667 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[668 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[669 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[66a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[66b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[66c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[66d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[66e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[66f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[670 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[671 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[672 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[673 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[674 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[675 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[676 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[677 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[678 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[679 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[67a 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[67b 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[67c 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[67d 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[67e 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[67f 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[680 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[681 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[682 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[683 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[684 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[685 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[686 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[687 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[688 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[689 10-14 19:01:08.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[68a 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[68b 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[68c 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[68d 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[68e 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[68f 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[690 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[691 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[692 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[693 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[694 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[695 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[696 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[697 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[698 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[699 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[69a 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[69b 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[69c 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[69d 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[69e 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[69f 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[6a0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[6a1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[6a2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[6a3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[6a4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[6a5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[6a6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[6a7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[6a8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[6a9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[6aa 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[6ab 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[6ac 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[6ad 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[6ae 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[6af 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[6b0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[6b1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[6b2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[6b3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[6b4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[6b5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[6b6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[6b7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[6b8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[6b9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[6ba 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[6bb 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[6bc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[6bd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[6be 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[6bf 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[6c0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[6c1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[6c2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[6c3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[6c4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6c5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[6c6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 gate 1602702068573307900 evaluation starts +[6c7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 signed by 0 principal evaluation starts (used [false]) +[6c8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 processing identity 0 with bytes of 115a6c0 +[6c9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[6ca 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[6cb 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[6cc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 principal matched by identity 0 +[6cd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[6ce 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[6cf 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 principal evaluation succeeds for identity 0 +[6d0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c86e0 gate 1602702068573307900 evaluation succeeds +[6d1 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[6d2 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[6d3 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[6d4 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[6d5 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[6d6 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[6d7 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[6d8 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +[6d9 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[6da 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[6dc 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[6dd 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[6de 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[6df 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[6e0 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003802830, CONNECTING +[6db 10-14 19:01:08.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[6e1 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +[6e2 10-14 19:01:08.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[6e3 10-14 19:01:08.60 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003802830, READY +[6e4 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6e5 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[6e6 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[6e7 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[6e8 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[6e9 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[6ea 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[6eb 10-14 19:01:08.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +[6ec 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[6ed 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00357b440 env 0xc0036a00f0 txn 0 +[6ee 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[6ef 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 78ms +[6f0 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[6f1 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[6f2 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[6f3 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +[6f4 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[6f5 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[6f6 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[6f7 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +[6f8 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[6f9 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[6fa 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[6fb 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[6fc 10-14 19:01:08.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +[6fe 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6fd 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[6ff 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[701 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[700 10-14 19:01:08.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[702 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[703 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[704 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[705 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[707 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[708 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[709 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[70a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[706 10-14 19:01:08.64 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[70c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[70d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[70e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +[70f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0037a2f40)} +[710 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[70b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[711 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[712 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[714 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[715 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[716 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[717 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[718 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 gate 1602702068658154900 evaluation starts +[719 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 signed by 0 principal evaluation starts (used [false]) +[71a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 processing identity 0 with bytes of 115a6c0 +[71b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[71c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[71d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[71e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 principal matched by identity 0 +[71f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[720 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 21 00 d0 1e e5 a9 dc 91 40 0d 64 63 21 |0D.!.......@.dc!| +00000010 81 9a 71 3f 37 f9 2c 8b 62 5e 9c a0 b3 9f 12 9c |..q?7.,.b^......| +00000020 10 0e 8f cd 89 02 1f 2b 56 9e 63 f4 3c 1b 27 6e |.......+V.c.<.'n| +00000030 10 00 4c dd 45 84 82 c4 76 99 d2 14 84 d4 6e 48 |..L.E...v.....nH| +00000040 23 db b9 b9 48 cb |#...H.| +[721 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 principal evaluation succeeds for identity 0 +[722 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00395d270 gate 1602702068658154900 evaluation succeeds +[723 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[724 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[725 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[726 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[727 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[728 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[729 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[72a 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161010 +[72b 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B7AA8CD36B0199C6AFB8DE04027CC74DDD6348856745F69EFA42E5356BA3B11C +[72c 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[72d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[72e 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[72f 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[730 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +[731 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:16827831503943818323 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[732 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[733 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[734 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[735 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[736 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[737 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039b9b50, CONNECTING +[713 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[738 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +[739 10-14 19:01:08.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +[73a 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +[73b 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[73c 10-14 19:01:08.67 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +[73d 10-14 19:01:08.65 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.652Z grpc.peer_address=172.18.0.8:52178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=23.4363ms +[73e 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xc, 0x0, 0x8, 0xba, 0xdf, 0x8d, 0x10, 0xb5, 0xfb, 0xd7, 0x6, 0x1a, 0x0, 0x2a, 0xe8, 0xd6, 0x4a, 0xd, 0x75, 0xa6, 0xe0, 0xb8, 0x67, 0xfc, 0x7, 0xfe, 0x1, 0xfe, 0xda, 0xf8, 0x3, 0x41} txOffsets= +txId=dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373 locPointer=offset=71, bytesLength=27142 +] +[73f 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to txid-index +[740 10-14 19:01:08.68 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56748, bytesLength=27142] for tx number:[0] ID: [dd4d681d364c11808a3a351229b686575c320559d7d294f1be35fcd2489f9373] to blockNumTranNum index +[741 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +[742 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0039b9b50, READY +[743 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[744 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[745 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[746 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +[747 10-14 19:01:08.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +[748 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[749 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[74b 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +[74c 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +[74d 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[74e 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[74f 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[750 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[751 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[74a 10-14 19:01:08.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[752 10-14 19:01:08.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[753 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +[754 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +[755 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +[756 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[757 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +[758 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[759 10-14 19:01:08.72 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[75a 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +[75c 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[75d 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[75e 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[75b 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:52178 +[75f 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[760 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[761 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[762 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[765 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[763 10-14 19:01:08.73 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52178 +[764 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[766 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[767 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[768 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[769 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 gate 1602702068744865100 evaluation starts +[76a 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 signed by 0 principal evaluation starts (used [false]) +[76b 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 processing identity 0 with bytes of 115a6c0 +[76c 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 principal matched by identity 0 +[76d 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[76e 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 116ms (state_validation=40ms block_and_pvtdata_commit=46ms state_commit=6ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +[770 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +[76f 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 9c 95 58 ea 6d 98 19 aa 1b fc e9 |0D. P..X.m......| +00000010 24 98 e0 d6 9c 40 4a 2c ba 01 97 db 10 ca 4e 14 |$....@J,......N.| +00000020 72 d9 31 b5 02 20 59 33 86 08 44 53 b3 ae a0 df |r.1.. Y3..DS....| +00000030 22 35 ad 75 53 81 f9 5c 18 5e b3 08 ec 44 8c fa |"5.uS..\.^...D..| +00000040 a2 dd d6 ee 31 d1 |....1.| +[771 10-14 19:01:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[772 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 46 48 f2 b2 9a 7f df df a9 f1 79 |0D. HFH........y| +00000010 98 98 2c c9 e6 c6 a4 38 a6 d2 b0 48 82 64 5b 16 |..,....8...H.d[.| +00000020 a6 da 79 91 02 20 3b c8 85 93 d7 97 52 85 58 6c |..y.. ;.....R.Xl| +00000030 f1 df 38 46 43 ba 74 7d 1b 14 23 b1 a8 a5 48 66 |..8FC.t}..#...Hf| +00000040 32 9f 45 34 54 4d |2.E4TM| +[773 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52178 +[774 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52178 +[775 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 principal evaluation succeeds for identity 0 +[776 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a76c20 gate 1602702068744865100 evaluation succeeds +[777 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[778 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[779 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[77a 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[77b 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[77c 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[77d 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52178 disconnected +[77e 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[77f 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.707Z grpc.peer_address=172.18.0.8:52178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=47.3305ms +[780 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[781 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[782 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[783 10-14 19:01:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[784 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +[785 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +[786 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[787 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 16827831503943818323, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes +[788 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[789 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 aa 8c d3 6b 01 99 c6 af b8 de 04 02 7c c7 4d |....k........|.M| +00000010 dd 63 48 85 67 45 f6 9e fa 42 e5 35 6b a3 b1 1c |.cH.gE...B.5k...| +[78a 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 3a e9 47 12 cf ac 65 b1 96 12 cd |0D. #:.G...e....| +00000010 9d 67 71 fa 41 d8 b8 8a 6e b6 0b df 6a 40 69 64 |.gq.A...n...j@id| +00000020 27 5a 24 80 02 20 57 f1 52 9f e2 c8 7d 4e 67 71 |'Z$.. W.R...}Ngq| +00000030 6f a1 10 f5 d1 6a 84 ac 49 c1 47 12 bf d0 b1 96 |o....j..I.G.....| +00000040 18 33 db 7a 92 d8 |.3.z..| +[78b 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[78c 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[78d 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[78e 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[78f 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[790 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[791 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[792 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[793 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[794 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[795 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[796 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 gate 1602702068774399300 evaluation starts +[797 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 signed by 0 principal evaluation starts (used [false]) +[798 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 processing identity 0 with bytes of 115a6c0 +[799 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 principal matched by identity 0 +[79a 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a 5c 5b a1 c5 d0 42 f3 10 98 4b f1 8d e3 43 fc |.\[...B...K...C.| +00000010 67 11 54 45 40 fd 8a 65 ab 61 da 15 f4 7e 48 13 |g.TE@..e.a...~H.| +[79b 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 06 f7 ae a6 36 b3 63 21 97 3f |0E.!......6.c!.?| +00000010 c6 51 e5 6d 55 64 cc 8b 3d 95 83 05 41 ae c5 e4 |.Q.mUd..=...A...| +00000020 38 e7 9f 29 ad 02 20 00 d1 69 7d 61 4c c5 ad b4 |8..).. ..i}aL...| +00000030 4c f6 4f 44 15 1d 7a c5 f0 c6 24 90 74 ba d9 b9 |L.OD..z...$.t...| +00000040 6c 4d 5e a0 99 01 36 |lM^...6| +[79c 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 principal evaluation succeeds for identity 0 +[79d 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0d50 gate 1602702068774399300 evaluation succeeds +[79e 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[79f 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7a0 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7a1 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7a2 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[7a3 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +[7a4 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[7a5 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7a6 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7a7 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7a8 10-14 19:01:08.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.776Z grpc.peer_address=172.18.0.8:52186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=246.3µs +[7a9 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7aa 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7ab 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7ac 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52186 +[7ad 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52186 +[7ae 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[7af 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 30 4f 97 1a 9c de 8b de 90 c7 |0E.!..0O........| +00000010 87 95 4a 60 f6 6a 8a ff 2e b6 6e 12 28 b7 9a 83 |..J`.j....n.(...| +00000020 ba 2d 8e b1 77 02 20 03 bf d4 7f d3 e8 20 d1 42 |.-..w. ...... .B| +00000030 8a 42 f4 01 6e 9b 45 73 31 4a 43 de 6f b7 e5 2d |.B..n.Es1JC.o..-| +00000040 48 74 9d 96 47 bc 34 |Ht..G.4| +[7b0 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52186 +[7b1 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52186 +[7b2 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes +[7b3 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7b4 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:17975552199130515386 tag:EMPTY mem_req: > > , Envelope: 283 bytes, Signature: 0 bytes +[7b5 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[7b6 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 63 d2 70 fd b9 b4 07 72 54 43 81 39 e7 1c cf |.c.p....rTC.9...| +00000010 66 35 af f7 bf 8b fa 5f c5 2f 7b 10 a8 5e 9f c9 |f5....._./{..^..| +[7b7 10-14 19:01:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 68 02 fe a3 8f 18 16 6e 63 35 |0E.!..h......nc5| +00000010 eb 59 92 99 f4 4d ac fa 1c f4 ae 43 16 84 fb f0 |.Y...M.....C....| +00000020 66 0f b4 ed fb 02 20 3b f0 af fc 75 d9 2c b0 d4 |f..... ;...u.,..| +00000030 73 3b 58 a7 1f 07 88 f4 ef fd 3c 65 54 fe 33 7e |s;X....... DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[7b9 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 8c 4f da db d1 c3 f5 b1 09 cd |0E.!...O........| +00000010 b4 42 0e fa d2 31 6c 3d c8 56 d7 b2 39 09 75 ab |.B...1l=.V..9.u.| +00000020 37 b4 35 e6 6c 02 20 1f 88 94 5f 1e a5 35 87 2b |7.5.l. ..._..5.+| +00000030 1c f7 c2 90 68 c8 e4 a8 c0 52 1d bd 05 1f 6d 13 |....h....R....m.| +00000040 61 09 7f 51 ba 9a 98 |a..Q...| +[7ba 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[7bb 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[7bc 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[7bd 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[7be 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[7bf 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7c0 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7c1 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7c2 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[7c3 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7c4 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes to 1 peers +[7c5 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[7c6 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17975552199130515386, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 550 bytes, Signature: 0 bytes +[7c7 10-14 19:01:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7c8 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.842Z grpc.peer_address=172.18.0.7:45778 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=233µs +[7c9 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7ca 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7cb 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7cc 10-14 19:01:08.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45778 +[7cd 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45778 +[7ce 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7cf 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7d0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7d1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7d2 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7d3 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7d4 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7d5 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7d6 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7d7 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7d8 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7d9 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 gate 1602702068854722100 evaluation starts +[7da 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 signed by 0 principal evaluation starts (used [false]) +[7db 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 processing identity 0 with bytes of 115a6c0 +[7dc 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 principal matched by identity 0 +[7dd 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[7de 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 22 ec 4f 11 79 4d ad af 4d 76 ea |0D. .".O.yM..Mv.| +00000010 79 0e e5 a4 20 af 82 a8 a5 a5 42 c5 6c a1 df 21 |y... .....B.l..!| +00000020 56 2c 1b 6d 02 20 29 5e e5 fb 4b 0d 91 5a 83 97 |V,.m. )^..K..Z..| +00000030 1c 99 dd ac dc ce 1c 66 1e 97 cc 52 74 1f a7 3e |.......f...Rt..>| +00000040 a9 c1 31 46 30 90 |..1F0.| +[7df 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 principal evaluation succeeds for identity 0 +[7e0 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72950 gate 1602702068854722100 evaluation succeeds +[7e1 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7e2 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7e3 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7e4 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7e5 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45778 +[7e6 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45778 +[7e7 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7e8 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7e9 10-14 19:01:08.85 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[7ea 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7eb 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45778 disconnected +[7ec 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.845Z grpc.peer_address=172.18.0.7:45778 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.246ms +[7ed 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7ee 10-14 19:01:08.86 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7ef 10-14 19:01:08.87 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.874Z grpc.peer_address=172.18.0.7:45780 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=781.8µs +[7f0 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7f1 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7f2 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7f3 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45780 +[7f4 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45780 +[7f5 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f6 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f7 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f8 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f9 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7fa 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7fb 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7fc 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7fd 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7fe 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7ff 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[800 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 gate 1602702068888504100 evaluation starts +[801 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 signed by 0 principal evaluation starts (used [false]) +[802 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 processing identity 0 with bytes of 115a6c0 +[803 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 principal matched by identity 0 +[804 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[805 10-14 19:01:08.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 96 ab e5 e9 db 84 dd b8 16 53 1b |0D. L.........S.| +00000010 62 50 40 08 b9 31 34 ee db 6e 40 06 cf 04 33 36 |bP@..14..n@...36| +00000020 12 fa aa 59 02 20 00 af 23 4b fe 51 a5 cc 68 83 |...Y. ..#K.Q..h.| +00000030 4c a8 7b 10 b8 71 8a 0c 38 ac 3c 70 2f d5 09 cb |L.{..q..8.

DEBU 0xc002969e10 principal evaluation succeeds for identity 0 +[807 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969e10 gate 1602702068888504100 evaluation succeeds +[808 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[809 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[80a 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[80b 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[80c 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45780 +[80d 10-14 19:01:08.89 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45780 +[80e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45780 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[80f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[810 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:323551260776122666 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[811 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[812 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[813 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[814 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[815 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[816 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[817 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[818 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[819 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 gate 1602702068922018600 evaluation starts +[81a 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 signed by 0 principal evaluation starts (used [false]) +[81b 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 processing identity 0 with bytes of 115a6c0 +[81c 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 principal matched by identity 0 +[81d 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 d5 7e 86 78 cd 4b eb 80 d5 68 10 92 99 09 65 |..~.x.K...h....e| +00000010 93 f1 5e 1e af 40 ab 24 c1 42 26 52 a3 2b b0 f9 |..^..@.$.B&R.+..| +[81e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 60 20 e1 90 42 97 7e 78 b5 e5 b2 |0D. N` ..B.~x...| +00000010 17 52 0b 48 5e ea 8f 88 78 38 be 34 20 ae d4 da |.R.H^...x8.4 ...| +00000020 0f 65 5f 99 02 20 68 54 55 b8 f5 d0 52 0b cc c1 |.e_.. hTU...R...| +00000030 35 13 d0 5b b6 7f 9c bf 91 60 87 c7 84 59 5c dd |5..[.....`...Y\.| +00000040 6c ab 52 18 ef 92 |l.R...| +[81f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 principal evaluation succeeds for identity 0 +[820 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000353430 gate 1602702068922018600 evaluation succeeds +[821 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[822 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[823 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[824 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[825 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[826 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[827 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[828 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[829 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[82a 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[82b 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[82c 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[82d 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[82e 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[82f 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[830 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +[831 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[832 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 323551260776122666, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +[833 10-14 19:01:08.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[834 10-14 19:01:08.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:10.948Z grpc.peer_address=172.18.0.7:45782 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=272.6µs +[835 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[836 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[837 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[838 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:45782 +[839 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45782 +[83a 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[83b 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[83c 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[83d 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[83e 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[83f 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[840 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[841 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[842 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[843 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[844 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[845 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 gate 1602702068954996100 evaluation starts +[846 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 signed by 0 principal evaluation starts (used [false]) +[847 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 processing identity 0 with bytes of 115a6c0 +[848 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 principal matched by identity 0 +[849 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[84a 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 d8 12 dd e7 dc f4 e8 e1 75 94 0c |0D. .........u..| +00000010 42 a1 1e 2c 7e b3 bd 54 ce 62 2b 6d 77 b2 e5 09 |B..,~..T.b+mw...| +00000020 16 ad 05 b4 02 20 7a 2e 5b dc bc c0 6e 7a 9f 06 |..... z.[...nz..| +00000030 a3 0b 48 9e 58 4d 4d 15 1f 54 37 e6 50 f1 28 7f |..H.XMM..T7.P.(.| +00000040 d6 cd 02 2a 3c 8f |...*<.| +[84b 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 principal evaluation succeeds for identity 0 +[84c 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003de950 gate 1602702068954996100 evaluation succeeds +[84d 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[84e 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[84f 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[850 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[851 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45782 +[852 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45782 +[853 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[854 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45780 disconnected +[855 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45780 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=73.4672ms +[856 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[857 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45782 disconnected +[858 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:18.951Z grpc.peer_address=172.18.0.7:45782 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.0486ms +[859 10-14 19:01:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[85a 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[85b 10-14 19:01:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[85c 10-14 19:01:09.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.108Z grpc.peer_address=172.18.0.6:48726 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=232.1µs +[85d 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[85e 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[85f 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[860 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:48726 +[861 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48726 +[862 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[863 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[864 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[865 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[866 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[867 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[868 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[869 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[86a 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[86b 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[86c 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[86d 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[86e 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[86f 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[870 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[871 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[872 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 gate 1602702069117496500 evaluation starts +[873 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 signed by 0 principal evaluation starts (used [false]) +[874 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 processing identity 0 with bytes of 115a6c0 +[875 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[876 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[877 10-14 19:01:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[878 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 principal matched by identity 0 +[879 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[87a 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 87 7f b9 18 de 16 f1 7b a7 d1 |0E.!.........{..| +00000010 ba a1 1a ef 4e ee 3f c0 03 a4 8b ed 52 6b cf 10 |....N.?.....Rk..| +00000020 31 bd fb 39 82 02 20 11 a3 3f 08 e3 19 93 c8 56 |1..9.. ..?.....V| +00000030 df cf 89 2a c6 f3 34 3b 12 67 0b 6f 84 da 22 c9 |...*..4;.g.o..".| +00000040 88 bd 2c 3a 89 d0 2e |..,:...| +[87b 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 principal evaluation succeeds for identity 0 +[87c 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7cd0 gate 1602702069117496500 evaluation succeeds +[87d 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[87e 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[87f 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[880 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[881 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48726 +[882 10-14 19:01:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48726 +[883 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[884 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[885 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48726 disconnected +[886 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:19.111Z grpc.peer_address=172.18.0.6:48726 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.624ms +[887 10-14 19:01:09.14 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[888 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.164Z grpc.peer_address=172.18.0.6:48728 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=209.4µs +[889 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[88a 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[88b 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[88c 10-14 19:01:09.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:48728 +[88d 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48728 +[88e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[88f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[890 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[891 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[892 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[893 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[894 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[895 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[896 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[897 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[898 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[899 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 gate 1602702069174059000 evaluation starts +[89a 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 signed by 0 principal evaluation starts (used [false]) +[89b 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 processing identity 0 with bytes of 115a6c0 +[89c 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 principal matched by identity 0 +[89d 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[89e 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 28 86 44 46 ec b1 5b 82 29 22 9d |0D. Q(.DF..[.)".| +00000010 a4 54 7d 86 07 a4 87 0c 2c c1 95 35 ce bc 90 d3 |.T}.....,..5....| +00000020 4e 11 a6 d7 02 20 0b 67 00 70 94 9e ad 95 5d 59 |N.... .g.p....]Y| +00000030 62 79 34 d7 15 96 87 5d 33 cd 08 1f 79 60 3b 85 |by4....]3...y`;.| +00000040 40 ab ec 75 bf 53 |@..u.S| +[89f 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 principal evaluation succeeds for identity 0 +[8a0 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027e4d0 gate 1602702069174059000 evaluation succeeds +[8a1 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8a2 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8a3 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8a4 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8a5 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48728 +[8a6 10-14 19:01:09.17 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48728 +[8a7 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48728 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes +[8a8 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8a9 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:16860402723125902142 tag:EMPTY mem_req:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > > , Envelope: 176 bytes, Signature: 0 bytes +[8aa 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[8ab 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8ac 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8ad 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8ae 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8af 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8b0 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8b1 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8b2 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 gate 1602702069198677900 evaluation starts +[8b3 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 signed by 0 principal evaluation starts (used [false]) +[8b4 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 processing identity 0 with bytes of 115a6c0 +[8b5 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 principal matched by identity 0 +[8b6 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 93 da 1f b7 61 97 34 2d a2 c7 7f d4 ee 06 db |.....a.4-.......| +00000010 b7 a5 c8 74 35 6a 48 04 7a 40 1e ef ce 20 d2 9a |...t5jH.z@... ..| +[8b7 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 1c 82 5d c3 66 d1 1b f6 3c dd 86 |0D. :..].f...<..| +00000010 8b d2 67 74 03 08 9d c1 f1 28 89 d4 d8 f7 3e 7c |..gt.....(....>|| +00000020 d8 d1 4d 5d 02 20 43 c6 59 86 4a ac 0c e6 cf 1e |..M]. C.Y.J.....| +00000030 b1 ec 53 3a 42 62 e2 22 1b 20 5f 62 27 a6 88 9c |..S:Bb.". _b'...| +00000040 94 10 bd 9c c9 63 |.....c| +[8b8 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 principal evaluation succeeds for identity 0 +[8b9 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e670 gate 1602702069198677900 evaluation succeeds +[8ba 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8bb 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8bc 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8bd 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8be 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[8bf 10-14 19:01:09.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +[8c0 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[8c1 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8c2 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8c3 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8c4 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[8c5 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8c6 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8c7 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8c8 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[8c9 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16860402723125902142, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[8ca 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8cb 10-14 19:01:09.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:|\330\321M]\002 C\306Y\206J\254\014\346\317\036\261\354S:Bb\342\"\033 _b'\246\210\234\224\020\275\234\311c" > alive: alive: alive: +[8cc 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:01:11.275Z grpc.peer_address=172.18.0.6:48732 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=232.6µs +[8cd 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8ce 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[8cf 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[8d0 10-14 19:01:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:48732 +[8d1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48732 +[8d2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8d3 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8d4 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8d5 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8d6 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8d7 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8d8 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8d9 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8da 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8db 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8dc 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8dd 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 gate 1602702069282129800 evaluation starts +[8de 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 signed by 0 principal evaluation starts (used [false]) +[8df 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 processing identity 0 with bytes of 115a6c0 +[8e0 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 principal matched by identity 0 +[8e1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[8e2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 27 44 96 5a 02 d1 c6 28 5d 2f 15 |0D. h'D.Z...(]/.| +00000010 52 c4 b2 fc 04 ab 17 0f 18 da 74 d1 d7 7e 39 51 |R.........t..~9Q| +00000020 64 c2 15 6e 02 20 2c db fa 47 28 d7 d4 56 8e 02 |d..n. ,..G(..V..| +00000030 51 9c ce d7 93 a1 7c 72 66 5e d4 92 1d b7 16 02 |Q.....|rf^......| +00000040 3f 5c 41 57 67 fe |?\AWg.| +[8e3 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 principal evaluation succeeds for identity 0 +[8e4 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039bd10 gate 1602702069282129800 evaluation succeeds +[8e5 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8e6 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8e7 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8e8 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8e9 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48732 +[8ea 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48732 +[8eb 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8ec 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48728 disconnected +[8ed 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:48728 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=118.63ms +[8ee 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8ef 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48732 disconnected +[8f0 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:01:19.277Z grpc.peer_address=172.18.0.6:48732 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.0404ms +[8f1 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8f2 10-14 19:01:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8f3 10-14 19:01:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8f4 10-14 19:01:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8f6 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8f7 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408F4C78CDD8AA1FC9E16...096D8DADEA4206176416CB532A020803 +[8f8 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C82496F45A90496EAFCA14D5E5300DF1C7C866571E1A4C36D27C66C6072695F7 +[8f5 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8f9 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8fa 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[8fb 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[8fc 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[8fd 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[8fe 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8ff 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[900 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[901 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[902 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[903 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[904 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[905 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002582580, CONNECTING +[906 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[907 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[908 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[909 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[90a 10-14 19:01:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002593990, CONNECTING +[90b 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +[90c 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e eb 00 60 7b 61 bf 9d 2e c2 aa da fa 0e 93 da |~..`{a..........| +00000010 b0 30 3b fc 99 e3 41 6f d4 5d d4 1c b4 10 49 4c |.0;...Ao.]....IL| +[90d 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 71 99 ff 2d ee 6f 53 f1 da d9 |0E.!..q..-.oS...| +00000010 ec 22 1d 59 52 3c 1e 54 94 65 58 d9 9d 86 96 f6 |.".YR<.T.eX.....| +00000020 c9 8a fa 05 ad 02 20 54 d4 dd 22 b8 7c b0 c3 ab |...... T..".|...| +00000030 2d 2b fd ce 46 67 d1 45 e5 2f 56 ee fe be 24 ef |-+..Fg.E./V...$.| +00000040 32 c5 ec 17 f3 4b b1 |2....K.| +[90e 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 80 ca 59 d4 b5 d2 e5 3b c0 3e 27 5b 03 8f 2e |...Y....;.>'[...| +00000010 83 d3 46 35 1f 41 d5 ac af d9 82 b5 71 f3 7f ad |..F5.A......q...| +[90f 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 88 fa c9 e0 98 ff a3 58 ee 9a 97 |0D. S.......X...| +00000010 42 98 d7 a6 72 98 32 cb 13 ca 0a d3 56 11 df 23 |B...r.2.....V..#| +00000020 d7 84 8a 68 02 20 67 17 0d fc d7 d7 2d 85 88 a7 |...h. g.....-...| +00000030 19 04 d4 f2 0e 12 31 ae ca 1d ce 1c bc e6 67 2d |......1.......g-| +00000040 05 90 52 6c a0 f6 |..Rl..| +[910 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[911 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[913 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002582580, READY +[914 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[915 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[912 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[916 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[917 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[919 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[91a 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[91b 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +[918 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[91c 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +[91d 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[91e 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[91f 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[920 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[921 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[922 10-14 19:01:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[923 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002593990, READY +[924 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +[925 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[926 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[927 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[928 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[929 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[92a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[92b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[92c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[92d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[92e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[92f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[930 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 gate 1602702069978584200 evaluation starts +[931 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 signed by 0 principal evaluation starts (used [false]) +[932 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 processing identity 0 with bytes of 115a6c0 +[933 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 principal matched by identity 0 +[934 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[935 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 32 b2 55 53 03 d9 51 08 83 c2 |0E.!..2.US..Q...| +00000010 5f a6 4c e2 8e c3 55 04 51 e0 c7 0e b0 44 3d db |_.L...U.Q....D=.| +00000020 54 f7 9e 53 63 02 20 0e a3 e7 e1 f2 ca 7c fa 4f |T..Sc. ......|.O| +00000030 5d 91 b2 91 65 af 53 ce 47 48 2c 34 05 88 1a 12 |]...e.S.GH,4....| +00000040 ec a4 cd 97 68 82 9a |....h..| +[936 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 principal evaluation succeeds for identity 0 +[937 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262a010 gate 1602702069978584200 evaluation succeeds +[938 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[939 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[93a 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[93b 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[93c 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[93d 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[93e 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[93f 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[940 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[941 10-14 19:01:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[942 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[943 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[944 10-14 19:01:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +[945 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[946 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[947 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[948 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[949 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[94a 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[94b 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[94c 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[94d 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[94e 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[94f 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[950 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 gate 1602702069999008800 evaluation starts +[951 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 signed by 0 principal evaluation starts (used [false]) +[952 10-14 19:01:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 processing identity 0 with bytes of 115a6c0 +[953 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 principal matched by identity 0 +[954 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +[955 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +00000040 ab fd b5 44 0b 7b |...D.{| +[956 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 principal evaluation succeeds for identity 0 +[957 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642690 gate 1602702069999008800 evaluation succeeds +[958 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[959 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[95a 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[95b 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[95c 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[95d 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[95e 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[95f 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[960 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[961 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[962 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 gate 1602702070003891200 evaluation starts +[963 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 signed by 0 principal evaluation starts (used [false]) +[964 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 processing identity 0 with bytes of 115a6c0 +[965 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 principal matched by identity 0 +[966 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 9e 15 8b 23 19 91 7f 7c 07 cb 9d 7f 28 ed 47 |....#...|....(.G| +00000010 e4 c4 32 f0 98 94 9b b5 e0 6d 4d b2 7c ee c0 bd |..2......mM.|...| +[967 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 93 4b 1a 2b 85 1e 84 82 11 9e ec |0D. q.K.+.......| +00000010 84 27 ad d2 68 cb c1 34 87 67 a3 f2 34 3d 6a 6e |.'..h..4.g..4=jn| +00000020 7b 90 77 15 02 20 01 4f a3 6c 13 37 fb 90 84 e0 |{.w.. .O.l.7....| +00000030 0e 57 66 82 ea a6 86 65 9f 2e 4c 14 39 24 4d a1 |.Wf....e..L.9$M.| +00000040 ab fd b5 44 0b 7b |...D.{| +[968 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 principal evaluation succeeds for identity 0 +[969 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026431e0 gate 1602702070003891200 evaluation succeeds +[96a 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[96b 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[96c 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[96d 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[96e 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[96f 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +[970 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[971 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[972 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[973 10-14 19:01:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[974 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[975 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[976 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[977 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[978 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[979 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[97a 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[97b 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[97c 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[97d 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[97e 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 gate 1602702070014582300 evaluation starts +[97f 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 signed by 0 principal evaluation starts (used [false]) +[980 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 processing identity 0 with bytes of 115a6c0 +[981 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 principal matched by identity 0 +[982 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[983 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 94 48 32 74 ac dd 59 98 54 3f 38 |0D. x.H2t..Y.T?8| +00000010 a4 7a 80 e1 a0 49 ce 92 8c de 30 28 b3 6b a0 19 |.z...I....0(.k..| +00000020 24 f5 cc 77 02 20 1f e8 16 2c 89 7e 13 cb de 26 |$..w. ...,.~...&| +00000030 aa 24 70 ce 9c 2c e9 dd bf 4f f4 4a 01 ca d6 36 |.$p..,...O.J...6| +00000040 bd d9 ef b6 e7 71 |.....q| +[984 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 principal evaluation succeeds for identity 0 +[985 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265b1e0 gate 1602702070014582300 evaluation succeeds +[986 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[987 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[988 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[989 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[98a 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[98b 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98c 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[98d 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98e 10-14 19:01:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[98f 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[990 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[991 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[992 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[993 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[994 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[995 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[996 10-14 19:01:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[997 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[998 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[999 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[99a 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 gate 1602702070030108100 evaluation starts +[99b 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 signed by 0 principal evaluation starts (used [false]) +[99c 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 processing identity 0 with bytes of 115a6c0 +[99d 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 principal matched by identity 0 +[99e 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +[99f 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +00000040 59 fb f1 7d 0b 22 |Y..}."| +[9a0 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 principal evaluation succeeds for identity 0 +[9a1 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00262bba0 gate 1602702070030108100 evaluation succeeds +[9a2 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9a3 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9a4 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9a5 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9a6 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9a7 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9a8 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9a9 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9aa 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9ab 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9ac 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 gate 1602702070033898700 evaluation starts +[9ad 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 signed by 0 principal evaluation starts (used [false]) +[9ae 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 processing identity 0 with bytes of 115a6c0 +[9af 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 principal matched by identity 0 +[9b0 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 dc b0 19 4d a9 ea c1 44 4b 79 7c 67 a8 3a 20 |....M...DKy|g.: | +00000010 e9 33 f8 07 b5 68 4a 1f 55 fb 61 f0 92 11 26 00 |.3...hJ.U.a...&.| +[9b1 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 93 21 f8 42 35 48 7c e7 96 00 0f |0D. C.!.B5H|....| +00000010 13 e9 79 6e 11 b8 28 bd d3 1c 80 5b 03 6f 9c 90 |..yn..(....[.o..| +00000020 d5 38 16 25 02 20 58 33 52 ee 52 b2 11 c5 eb 22 |.8.%. X3R.R...."| +00000030 8f ce 81 24 81 45 0e c6 14 15 b0 2a 8a 36 89 c1 |...$.E.....*.6..| +00000040 59 fb f1 7d 0b 22 |Y..}."| +[9b2 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 principal evaluation succeeds for identity 0 +[9b3 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002672730 gate 1602702070033898700 evaluation succeeds +[9b4 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9b5 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9b6 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9b7 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9b8 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[9b9 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[9ba 10-14 19:01:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9bb 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9bc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9bd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9be 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[9bf 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9c0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9c1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9c2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9c3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9c4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9c5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9c6 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 gate 1602702070205201800 evaluation starts +[9c7 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 signed by 0 principal evaluation starts (used [false]) +[9c8 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 processing identity 0 with bytes of 115a6c0 +[9c9 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 principal matched by identity 0 +[9ca 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 c9 b3 da 44 38 4e b4 ee af 71 ff 4c 4c b8 d8 |....D8N...q.LL..| +00000010 37 a7 e8 68 5f e1 72 84 93 c8 04 de ad a2 db 58 |7..h_.r........X| +[9cb 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 ae 83 c0 d8 ed f5 66 84 c6 23 |0E.!........f..#| +00000010 70 7c 5d 2c d0 ad 92 9e 5b 99 84 92 19 d3 81 9f |p|],....[.......| +00000020 c6 66 cc 6b ea 02 20 1c f1 d8 bc 34 6f 12 b9 a2 |.f.k.. ....4o...| +00000030 38 2c 86 ef b4 53 86 93 b2 a1 aa 9a 4f b7 11 e7 |8,...S......O...| +00000040 16 5b 19 fb bf 5d 8e |.[...].| +[9cc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 principal evaluation succeeds for identity 0 +[9cd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026734c0 gate 1602702070205201800 evaluation succeeds +[9ce 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9cf 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9d0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9d1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9d2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9d3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[9d4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[9d5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[9d6 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[9d7 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d8 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d9 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9da 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9db 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9dc 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9dd 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9de 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9df 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e0 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e1 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[9e2 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e3 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9e5 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[9e6 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9e7 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e4 10-14 19:01:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9e8 10-14 19:01:10.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9e9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[9ea 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9eb 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9ec 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ed 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[9ee 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[9ef 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[9f0 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9f1 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[9f2 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[9f3 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[9f4 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9f5 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9f6 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9f7 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9f8 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9f9 10-14 19:01:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9fa 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[9fb 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 gate 1602702070330241600 evaluation starts +[9fc 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 signed by 0 principal evaluation starts (used [false]) +[9fd 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 processing identity 0 with bytes of 115a6c0 +[9fe 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[9ff 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 principal evaluation fails +[a00 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f6510 gate 1602702070330241600 evaluation fails +[a01 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[a02 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a03 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[a04 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 gate 1602702070330518100 evaluation starts +[a05 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 signed by 0 principal evaluation starts (used [false]) +[a06 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 processing identity 0 with bytes of 115a6c0 +[a07 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[a08 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[a09 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[a0a 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 principal matched by identity 0 +[a0b 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[a0c 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[a0d 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 principal evaluation succeeds for identity 0 +[a0e 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f7480 gate 1602702070330518100 evaluation succeeds +[a0f 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[a10 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[a11 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a12 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a13 10-14 19:01:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a14 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a15 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a16 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +[a17 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a18 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a19 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a1a 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[a1b 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a1c 10-14 19:01:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a1d 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[a1e 10-14 19:01:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[a1f 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[a20 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a21 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a22 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a23 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a24 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[a25 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 44 0e 34 11 6f 14 63 2d 67 64 de 92 bc 80 65 |zD.4.o.c-gd....e| +00000010 1f d9 5c bd ba 5f 8c d0 cf fb 54 8a f9 0c 86 92 |..\.._....T.....| +[a26 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 7c 3f ea 11 50 eb 95 8e 07 be 2c |0D. m|?..P.....,| +00000010 3b 16 87 3f 7d 7b e7 27 bf 17 74 e3 1c 94 18 99 |;..?}{.'..t.....| +00000020 57 b9 ad 44 02 20 70 10 eb 21 10 0d a9 c8 70 6e |W..D. p..!....pn| +00000030 05 ed 72 5c 66 67 ad db 7e 9a 67 3d 94 61 0d 2a |..r\fg..~.g=.a.*| +00000040 aa 06 97 eb a4 28 |.....(| +[a27 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a28 10-14 19:01:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[a29 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a2a 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a2b 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[a2c 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a2d 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a2e 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a2f 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a30 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a31 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a32 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[a33 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a34 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[a35 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a36 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a37 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a38 10-14 19:01:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a39 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[a3a 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a3b 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[a3c 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[a3d 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +[a3e 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +00000040 b4 ba 0c 92 c2 8d |......| +[a3f 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[a40 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 40 ea ea 40 58 18 b9 9b 4f ea |0E.!..@..@X...O.| +00000010 35 5d 0b 30 55 58 48 51 6c d3 66 da 42 33 24 f5 |5].0UXHQl.f.B3$.| +00000020 bc 27 29 7f 60 02 20 73 70 6b 7d b0 2d d9 a2 85 |.').`. spk}.-...| +00000030 08 f6 18 ee 1b 6f 2c c0 ca cf eb 6f be 53 e5 1c |.....o,....o.S..| +00000040 2c a5 8d f9 4e 4d 99 |,...NM.| +[a41 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[a42 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[a43 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a44 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a45 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[a46 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a47 10-14 19:01:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a48 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a49 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[a4a 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4b 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4c 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +[a4d 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[a4e 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +[a4f 10-14 19:01:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a50 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[a51 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[a52 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[a53 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[a54 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a55 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[a56 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[a59 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[a57 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[a5a 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a58 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[a5b 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[a5c 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a5d 10-14 19:01:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[a5e 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a5f 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a60 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a61 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[a62 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a63 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a64 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a65 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[a66 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a67 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a68 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161011 +[a69 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F66084DCFBD811BFF8C121EB363FCBD574F7ECF792E829916CE16CB5FFF2916C +[a6a 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a6b 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[a6c 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[a6d 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[a6e 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a6f 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[a70 10-14 19:01:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a71 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[a72 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a73 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[a74 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +[a75 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a76 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\033\353`\002 Z8\r8\334\241^DU\001\364\3518\220\366\0027\370\350\352\222\030\356\231\301\366\271I\366J\241\211" > > , Envelope: 165 bytes, Signature: 0 bytes +[a77 10-14 19:01:10.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a78 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[a79 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[a7a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a7b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[a7d 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[a7e 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +[a7f 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +00000040 b9 49 f6 4a a1 89 |.I.J..| +[a80 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a7c 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a82 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161012 +[a81 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a84 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a85 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[a83 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E45B43B398C32B833E573D0F4AA5A92A9E2F3DA1982DF93F494A6987CF3FC8B2 +[a86 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a87 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[a88 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[a8a 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[a8b 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[a89 10-14 19:01:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a8c 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a8d 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a8e 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a8f 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a91 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a92 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 gate 1602702070621449000 evaluation starts +[a93 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 signed by 0 principal evaluation starts (used [false]) +[a90 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[a94 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 processing identity 0 with bytes of 115a6c0 +[a95 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 principal matched by identity 0 +[a96 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[a97 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 97 90 39 ff 62 20 6e e9 99 1b 26 dc e0 99 a7 |;..9.b n...&....| +00000010 80 94 8c 81 c6 91 e0 f2 a0 4f ad c1 4e 92 57 df |.........O..N.W.| +[a98 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 cd 8f a0 a1 0b 26 2b 6d a5 45 |0E.!.......&+m.E| +00000010 f0 76 84 90 50 0b 25 66 b3 c2 71 85 c0 07 6c db |.v..P.%f..q...l.| +00000020 43 ad 33 e4 41 02 20 50 83 58 0d a0 77 a9 4f ac |C.3.A. P.X..w.O.| +00000030 89 9d fd a4 f7 9b 66 35 71 4c 46 ef e0 12 5b 19 |......f5qLF...[.| +00000040 ee a6 1d c6 e9 dd 5b |......[| +[a99 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a9a 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 principal evaluation succeeds for identity 0 +[a9b 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272b900 gate 1602702070621449000 evaluation succeeds +[a9d 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a9e 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a9f 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[aa0 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a9c 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa1 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[aa3 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[aa4 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[aa5 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[aa6 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[aa2 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa7 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa9 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa8 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[aab 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aac 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[aad 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[aae 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ab1 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aaf 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ab2 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ab0 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ab3 10-14 19:01:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aaa 10-14 19:01:10.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ab4 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ab5 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[ab6 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[ab7 10-14 19:01:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[ab8 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 7b 2a 4d 8e 17 ad 45 a4 0d c6 30 e2 43 14 50 |.{*M...E...0.C.P| +00000010 89 23 e6 1c 53 42 5c ed 8f 2d fb ca ee 92 8c 75 |.#..SB\..-.....u| +[ab9 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 e1 2a 15 45 67 9a 2c 8b 6c 33 d3 |0D. f.*.Eg.,.l3.| +00000010 cf d7 52 5f 00 7a e3 85 87 22 e4 1e db 7c 86 ac |..R_.z..."...|..| +00000020 c8 dc b7 78 02 20 50 07 ff e5 70 b7 6d aa e8 87 |...x. P...p.m...| +00000030 d8 03 d2 ff d2 17 30 bd 28 90 06 38 48 40 3b 33 |......0.(..8H@;3| +00000040 b4 ba 0c 92 c2 8d |......| +[aba 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[abb 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[abc 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[abd 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +[abe 10-14 19:01:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +00000040 b9 49 f6 4a a1 89 |.I.J..| +[abf 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ac0 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ac1 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ac2 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[ac3 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ac4 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ac5 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ac6 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ac7 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ac8 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ac9 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[aca 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 gate 1602702070667242400 evaluation starts +[acb 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 signed by 0 principal evaluation starts (used [false]) +[acc 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 processing identity 0 with bytes of 115a6c0 +[acd 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 principal matched by identity 0 +[ace 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 2e f0 13 02 92 f7 68 8b 22 4e db 86 d3 44 12 |\......h."N...D.| +00000010 13 a0 ae 1c 4c d7 a3 0d 44 3a f8 2f b6 48 a1 3b |....L...D:./.H.;| +[acf 10-14 19:01:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 4f 27 bd 80 22 e5 cb 79 e7 16 e8 |0D. .O'.."..y...| +00000010 40 c1 41 b8 51 76 cc 89 71 1d 73 76 16 aa 20 d3 |@.A.Qv..q.sv.. .| +00000020 eb cf f5 3b 02 20 79 37 9f 10 b8 2e 6b 81 0a 22 |...;. y7....k.."| +00000030 4d b7 6a ca b3 52 f4 6e e2 41 d5 bf a7 0a e0 30 |M.j..R.n.A.....0| +00000040 c5 b5 6c 81 17 72 |..l..r| +[ad0 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 principal evaluation succeeds for identity 0 +[ad1 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a94480 gate 1602702070667242400 evaluation succeeds +[ad2 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ad3 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ad4 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ad5 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ad6 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ad7 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[ad8 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[ad9 10-14 19:01:10.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[ada 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[adb 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[adc 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[add 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ade 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[adf 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[ae0 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 60 84 dc fb d8 11 bf f8 c1 21 eb 36 3f cb d5 |.`........!.6?..| +00000010 74 f7 ec f7 92 e8 29 91 6c e1 6c b5 ff f2 91 6c |t.....).l.l....l| +[ae1 10-14 19:01:10.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 01 f5 45 d9 63 2a ec 1b 1e 94 8c |0D. )..E.c*.....| +00000010 7f c1 8b da be 19 06 24 0e bb 54 42 67 fb 47 c3 |.......$..TBg.G.| +00000020 3e 1b eb 60 02 20 5a 38 0d 38 dc a1 5e 44 55 01 |>..`. Z8.8..^DU.| +00000030 f4 e9 38 90 f6 02 37 f8 e8 ea 92 18 ee 99 c1 f6 |..8...7.........| +00000040 b9 49 f6 4a a1 89 |.I.J..| +[ae2 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae3 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[ae5 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 60 12 6d 02 83 f4 14 aa 47 6a |0E.!..`.m.....Gj| +00000010 54 17 f2 5b 8d 85 54 6b 63 36 e4 fc a4 de 30 2e |T..[..Tkc6....0.| +00000020 d0 f0 ce 38 37 02 20 60 50 14 aa 85 5e 03 c3 58 |...87. `P...^..X| +00000030 75 a2 17 04 18 f0 be 19 9f 00 a0 3f 84 ea 75 4b |u..........?..uK| +00000040 e2 2d 83 aa 38 cc ad |.-..8..| +[ae6 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[ae4 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ae8 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ae7 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[ae9 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aea 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aeb 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[aec 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aed 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[aee 10-14 19:01:10.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aef 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[af0 10-14 19:01:10.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[af1 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[af2 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[af3 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[af4 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[af5 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[af6 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 5b 43 b3 98 c3 2b 83 3e 57 3d 0f 4a a5 a9 2a |.[C...+.>W=.J..*| +00000010 9e 2f 3d a1 98 2d f9 3f 49 4a 69 87 cf 3f c8 b2 |./=..-.?IJi..?..| +[af7 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[af8 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 9b 46 40 42 a6 42 c5 8c 46 dc |0E.!...F@B.B..F.| +00000010 e6 9f 86 17 2f 23 b5 78 25 7b 8b fd f8 e7 05 0e |..../#.x%{......| +00000020 d2 1c 09 3d 58 02 20 5e 61 79 5f 39 e7 89 6e 7c |...=X. ^ay_9..n|| +00000030 75 c6 a9 be a9 c6 d4 52 d6 e9 46 2b 37 f8 65 08 |u......R..F+7.e.| +00000040 73 20 96 5d 58 33 30 |s .]X30| +[af9 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[afa 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[afb 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[afc 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[afd 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[aff 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b00 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[afe 10-14 19:01:10.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b01 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b02 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 gate 1602702070729155000 evaluation starts +[b03 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 signed by 0 principal evaluation starts (used [false]) +[b04 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 processing identity 0 with bytes of 115a6c0 +[b05 10-14 19:01:10.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 principal matched by identity 0 +[b06 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[b07 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[b08 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 principal evaluation succeeds for identity 0 +[b09 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35330 gate 1602702070729155000 evaluation succeeds +[b0a 10-14 19:01:10.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b0b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b0c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b0d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b0e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b0f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b10 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b11 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b12 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b13 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b14 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b15 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 gate 1602702070745658200 evaluation starts +[b16 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 signed by 0 principal evaluation starts (used [false]) +[b17 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 processing identity 0 with bytes of 115a6c0 +[b18 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 principal matched by identity 0 +[b19 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[b1a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[b1b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 principal evaluation succeeds for identity 0 +[b1c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a35f40 gate 1602702070745658200 evaluation succeeds +[b1d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b1e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b1f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b20 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b21 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b22 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b23 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b24 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b25 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b26 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b27 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b28 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b29 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b2a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 gate 1602702070746826600 evaluation starts +[b2b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 signed by 0 principal evaluation starts (used [false]) +[b2c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 processing identity 0 with bytes of 115a6c0 +[b2d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 principal matched by identity 0 +[b2e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[b2f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[b30 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 principal evaluation succeeds for identity 0 +[b31 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3d360 gate 1602702070746826600 evaluation succeeds +[b32 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b33 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b34 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b35 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b36 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b37 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b38 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b39 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b3a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b3b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b3c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b3d 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b3e 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b3f 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b40 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 gate 1602702070747968700 evaluation starts +[b41 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 signed by 0 principal evaluation starts (used [false]) +[b42 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 processing identity 0 with bytes of 115a6c0 +[b43 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 principal matched by identity 0 +[b44 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[b45 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[b46 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 principal evaluation succeeds for identity 0 +[b47 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcc6d0 gate 1602702070747968700 evaluation succeeds +[b48 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b49 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b4a 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b4b 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b4c 10-14 19:01:10.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b4d 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b4e 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b4f 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +[b50 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b51 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b52 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b53 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b54 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b55 10-14 19:01:10.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b56 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b57 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b58 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b59 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5a 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5b 10-14 19:01:10.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b5c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b5d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b5e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b60 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b61 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b62 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b63 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b64 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b65 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 gate 1602702070994992300 evaluation starts +[b66 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 signed by 0 principal evaluation starts (used [false]) +[b67 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 processing identity 0 with bytes of 115a6c0 +[b68 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 principal matched by identity 0 +[b69 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[b6a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[b6b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 principal evaluation succeeds for identity 0 +[b6c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcdfb0 gate 1602702070994992300 evaluation succeeds +[b6d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b6e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b6f 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b70 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b71 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b72 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b73 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b74 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b75 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b76 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b77 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b78 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 gate 1602702070995638000 evaluation starts +[b79 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 signed by 0 principal evaluation starts (used [false]) +[b7a 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 processing identity 0 with bytes of 115a6c0 +[b7b 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 principal matched by identity 0 +[b7c 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[b7d 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[b7e 10-14 19:01:10.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 principal evaluation succeeds for identity 0 +[b7f 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5acf0 gate 1602702070995638000 evaluation succeeds +[b80 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b81 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b82 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b83 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b84 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b85 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b86 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b87 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +[b88 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b8b 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b89 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b8c 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b8a 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b8d 10-14 19:01:11.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b8e 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b8f 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b90 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b91 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b92 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b93 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b94 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b95 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b96 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b97 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 gate 1602702071023132100 evaluation starts +[b98 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 signed by 0 principal evaluation starts (used [false]) +[b99 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 processing identity 0 with bytes of 115a6c0 +[b9a 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 principal matched by identity 0 +[b9b 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[b9c 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[b9d 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 principal evaluation succeeds for identity 0 +[b9e 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c8a640 gate 1602702071023132100 evaluation succeeds +[b9f 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ba0 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ba1 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ba2 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ba3 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ba4 10-14 19:01:11.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ba5 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +[ba6 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[ba7 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +[ba8 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +[baa 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[bab 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ba9 10-14 19:01:11.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[bac 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bad 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +[bae 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +[baf 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +[bb0 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb1 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bb2 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bb3 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bb4 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bb5 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bb6 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bb7 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 gate 1602702071597897300 evaluation starts +[bb8 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 signed by 0 principal evaluation starts (used [false]) +[bb9 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 processing identity 0 with bytes of 115a6c0 +[bba 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 principal matched by identity 0 +[bbb 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +[bbc 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 84 74 89 0e 0c 32 c5 7e 7d 29 |0E.!...t...2.~})| +00000010 77 8d 28 4c 1e 80 db 91 b4 09 ea 5e 2d 8e c1 c8 |w.(L.......^-...| +00000020 48 75 9b 2b cd 02 20 15 59 9b c3 be 2f 33 f6 13 |Hu.+.. .Y.../3..| +00000030 ca 6f 46 a2 09 b7 8f 10 2b 8c 1a 16 84 2d 5c 3a |.oF.....+....-\:| +00000040 55 ef 26 08 6d aa fb |U.&.m..| +[bbd 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 principal evaluation succeeds for identity 0 +[bbe 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e910 gate 1602702071597897300 evaluation succeeds +[bbf 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bc0 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bc1 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[bc2 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[bc3 10-14 19:01:11.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bc5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 15888295418598673982, Envelope: 958 bytes, Signature: 0 bytes +[bc6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bc8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bca 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[bcb 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +[bcc 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bcd 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +[bce 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bcf 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bd0 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bd1 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bd2 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bd3 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bd4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bd5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 gate 1602702071603061500 evaluation starts +[bd6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 signed by 0 principal evaluation starts (used [false]) +[bd7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 processing identity 0 with bytes of 115a6c0 +[bd8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 principal matched by identity 0 +[bd9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +[bda 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f3 fb 62 7f 87 11 4b 34 63 d3 |0E.!....b...K4c.| +00000010 01 62 92 3f c2 b1 6a 9e d0 4f f1 b0 1a 5d 14 4e |.b.?..j..O...].N| +00000020 a8 c9 af 1f 14 02 20 65 85 bd 39 de 1a e7 83 71 |...... e..9....q| +00000030 d2 6a 00 2f 3f f8 77 35 68 a3 6d de c2 70 81 18 |.j./?.w5h.m..p..| +00000040 37 2e ac 89 e0 37 6b |7....7k| +[bdb 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 principal evaluation succeeds for identity 0 +[bdc 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db300 gate 1602702071603061500 evaluation succeeds +[bdd 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bde 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bdf 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[be0 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[be1 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be2 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[be3 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8398125403299676716, Envelope: 961 bytes, Signature: 0 bytes +[be4 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be5 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[be6 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be7 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[be8 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[be9 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +[bea 10-14 19:01:11.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[beb 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41738 +[bec 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002a7b270 +[bed 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[bee 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[bef 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[bf0 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[bf1 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 74 3e 6b 00 3e 1b db 4d 4e 63 2a da 75 1f e4 |.t>k.>..MNc*.u..| +00000010 74 fe 1d d5 d4 71 25 5a a9 11 5c 83 2d 00 73 ec |t....q%Z..\.-.s.| +[bf2 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 fe d7 25 17 ef 1e 70 0d c8 09 9e |0D. ...%...p....| +00000010 50 f7 79 9a 2f ec 57 5d b5 ec f6 d7 69 e6 2f b0 |P.y./.W]....i./.| +00000020 61 a6 db 13 02 20 31 23 06 fe 19 b8 81 38 fc ea |a.... 1#.....8..| +00000030 70 51 9f 06 99 2a 44 b5 d2 a3 bd 75 5c fb 80 16 |pQ...*D....u\...| +00000040 eb c0 ae ae 32 51 |....2Q| +[bf3 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[bf4 10-14 19:01:11.72 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00019c460, header 0xc002a7b680 +[bf5 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[bf6 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] processing txid: f66d801620d4932880fd17e7b603a0cc2fa4c20c1a0f661eff5c9df924e926aa +[bf7 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] Entry chaincode: name:"lscc" +[bf8 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [][f66d8016] Entry chaincode: name:"lscc" +[bf9 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[bfa 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 74 3e 6b 00 3e 1b db 4d 4e 63 2a da 75 1f e4 |.t>k.>..MNc*.u..| +00000010 74 fe 1d d5 d4 71 25 5a a9 11 5c 83 2d 00 73 ec |t....q%Z..\.-.s.| +[bfb 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 07 fe d7 25 17 ef 1e 70 0d c8 09 9e |0D. ...%...p....| +00000010 50 f7 79 9a 2f ec 57 5d b5 ec f6 d7 69 e6 2f b0 |P.y./.W]....i./.| +00000020 61 a6 db 13 02 20 31 23 06 fe 19 b8 81 38 fc ea |a.... 1#.....8..| +00000030 70 51 9f 06 99 2a 44 b5 d2 a3 bd 75 5c fb 80 16 |pQ...*D....u\...| +00000040 eb c0 ae ae 32 51 |....2Q| +[bfc 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[bfd 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +[bfe 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +[bff 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a6b56eb8-967d-460f-befe-2e1c2716655b] +[c00 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[c01 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a6b56eb8-967d-460f-befe-2e1c2716655b] +[c02 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +[c03 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +[c04 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f66d8016] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[c05 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [f66d8016] notifying Txid:f66d801620d4932880fd17e7b603a0cc2fa4c20c1a0f661eff5c9df924e926aa, channelID: +[c06 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[c07 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [][f66d8016] Exit chaincode: name:"lscc" (3ms) +[c08 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU [][f66d8016] Exit +[c09 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41738 +[c0a 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41738 grpc.code=OK grpc.call_duration=7.6039ms +[c0b 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[c0c 10-14 19:01:11.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[c0d 10-14 19:01:11.95 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]] +[c0e 10-14 19:01:13.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[c0f 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b2 5e b7 d5 ad 4a 84 33 d2 33 fa 83 58 98 37 fe |.^...J.3.3..X.7.| +00000010 fe fa 6d 26 b7 3b ae c8 77 f9 ac 62 53 97 22 7a |..m&.;..w..bS."z| +[c10 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 0d f8 79 f4 04 3c 1e 63 e9 6a |0E.!....y..<.c.j| +00000010 a5 b9 13 cd 3a 40 f9 c6 ad 46 20 7f 9c 92 ae c1 |....:@...F .....| +00000020 ed 48 99 ec e9 02 20 01 27 27 21 51 44 ac ed b5 |.H.... .''!QD...| +00000030 e6 a6 5f 27 53 aa ae de 16 22 a6 79 4d 17 49 11 |.._'S....".yM.I.| +00000040 9d 22 ed 2b e4 1d 92 |.".+...| +[c11 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c12 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c13 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c14 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[c15 10-14 19:01:13.38 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[c16 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41754 +[c17 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002baec30 +[c18 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[c19 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[c1a 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c1b 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c1d 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[c1c 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c1e 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c1f 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[c20 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c21 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c22 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c23 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c24 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[c25 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c26 10-14 19:01:13.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[c27 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[c28 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c29 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[c2a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[c2b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c2c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c2d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c2e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c2f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c30 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c31 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c32 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c33 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 gate 1602702073963976200 evaluation starts +[c34 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 signed by 0 principal evaluation starts (used [false]) +[c35 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 processing identity 0 with bytes of 115a6c0 +[c36 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 principal matched by identity 0 +[c37 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[c38 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[c39 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 principal evaluation succeeds for identity 0 +[c3a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031bd1b0 gate 1602702073963976200 evaluation succeeds +[c3b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c3c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c3d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c3e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c3f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c40 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c41 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[c43 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c45 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c47 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[c46 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[c44 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c49 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c4a 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[c42 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c48 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 64 4e 6c a0 25 06 15 5d 50 09 ad 23 ea 3f 59 |.dNl.%..]P..#.?Y| +00000010 d6 61 3f 5d 37 d9 5c 22 cb 23 26 0e 7c c2 27 1f |.a?]7.\".#&.|.'.| +[c4b 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c4e 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c4f 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes to 1 peers +[c4c 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c50 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +[c51 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c52 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c53 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c54 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c55 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c56 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 gate 1602702073968395700 evaluation starts +[c57 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 signed by 0 principal evaluation starts (used [false]) +[c58 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 processing identity 0 with bytes of 115a6c0 +[c59 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 principal matched by identity 0 +[c5a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[c5b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[c5c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 principal evaluation succeeds for identity 0 +[c5d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2530 gate 1602702073968395700 evaluation succeeds +[c5e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c5f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c60 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c61 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c62 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c63 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[c64 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[c65 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[c66 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[c67 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[c4d 10-14 19:01:13.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 85 da 50 4c 5d 24 ee 3e f1 e0 1e |0D. ...PL]$.>...| +00000010 15 86 8f c9 00 03 4d 82 1e e3 6e d9 78 2c bc b3 |......M...n.x,..| +00000020 e4 2e f5 a1 02 20 2e 26 dc 6c 47 3c 5e 2c 87 05 |..... .&.lG<^,..| +00000030 ba a6 a7 bd da 69 58 13 9e fc 0f a6 16 73 87 51 |.....iX......s.Q| +00000040 1a fb 5e 5e 52 7a |..^^Rz| +[c68 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c69 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c6a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[c6b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e0a10, header 0xc002baf130 +[c6c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[c6d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c6e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c6f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] processing txid: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 +[c70 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +[c71 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c72 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c73 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[c74 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c75 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +[c77 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +[c76 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c78 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +[c79 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 gate 1602702073972923100 evaluation starts +[c7a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[c7b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 signed by 0 principal evaluation starts (used [false]) +[c7c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 processing identity 0 with bytes of 115a6c0 +[c7d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[c7e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling GET_STATE from chaincode +[c7f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 principal matched by identity 0 +[c80 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[c81 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] getting state for chaincode lscc, key exp02, channel businesschannel +[c82 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[c83 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[c84 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] No state associated with key: exp02. Sending RESPONSE with an empty payload +[c85 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 principal evaluation succeeds for identity 0 +[c86 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed GET_STATE. Sending RESPONSE +[c87 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214700 gate 1602702073972923100 evaluation succeeds +[c88 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c89 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c8a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c8b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c8c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c8d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c8e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 gate 1602702073973721800 evaluation starts +[c8f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[c90 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 signed by 0 principal evaluation starts (used [false]) +[c91 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c92 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 processing identity 0 with bytes of 115a6c0 +[c93 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[c94 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[c95 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c96 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c97 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[c98 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[c99 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[c9a 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c9b 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal matched by identity 0 +[c9d 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 64 4e 6c a0 25 06 15 5d 50 09 ad 23 ea 3f 59 |.dNl.%..]P..#.?Y| +00000010 d6 61 3f 5d 37 d9 5c 22 cb 23 26 0e 7c c2 27 1f |.a?]7.\".#&.|.'.| +[c9e 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 85 da 50 4c 5d 24 ee 3e f1 e0 1e |0D. ...PL]$.>...| +00000010 15 86 8f c9 00 03 4d 82 1e e3 6e d9 78 2c bc b3 |......M...n.x,..| +00000020 e4 2e f5 a1 02 20 2e 26 dc 6c 47 3c 5e 2c 87 05 |..... .&.lG<^,..| +00000030 ba a6 a7 bd da 69 58 13 9e fc 0f a6 16 73 87 51 |.....iX......s.Q| +00000040 1a fb 5e 5e 52 7a |..^^Rz| +[c9c 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[c9f 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[ca0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ca1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ca2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ca3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ca4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ca5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ca6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ca7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ca8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 gate 1602702073976857400 evaluation starts +[ca9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 signed by 0 principal evaluation starts (used [false]) +[caa 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 processing identity 0 with bytes of 115a6c0 +[cab 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 principal matched by identity 0 +[cac 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[cad 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[cae 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 principal evaluation succeeds for identity 0 +[caf 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0970 gate 1602702073976857400 evaluation succeeds +[cb0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cb1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cb2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cb3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cb4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cb6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cb7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cb8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cb9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[cba 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[cbb 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cbc 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 gate 1602702073977594200 evaluation starts +[cbd 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 signed by 0 principal evaluation starts (used [false]) +[cbe 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 processing identity 0 with bytes of 115a6c0 +[cbf 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 principal matched by identity 0 +[cc0 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[cc1 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[cc2 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 principal evaluation succeeds for identity 0 +[cc3 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1b80 gate 1602702073977594200 evaluation succeeds +[cc4 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cc5 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cc6 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cc7 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cc8 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cc9 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +[cca 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +[ccb 10-14 19:01:13.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ccc 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal evaluation succeeds for identity 0 +[ccd 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 signed by 1 principal evaluation starts (used [true]) +[cce 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 skipping identity 0 because it has already been used +[ccf 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 principal evaluation fails +[cd0 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a47b0 gate 1602702073973721800 evaluation succeeds +[cd1 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[cd2 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +[cd3 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +[cd4 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +[cd5 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[cd6 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] notifying Txid:7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, channelID:businesschannel +[cd7 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[cd8 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[cd9 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +[cda 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[cdb 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[cdc 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[cdd 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[cde 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +[cdf 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ce0 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +[ce1 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ce2 10-14 19:01:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +[ce3 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[ce4 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[ce5 10-14 19:01:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[ce6 10-14 19:01:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU +FROM hyperledger/fabric-baseos:amd64-0.4.21 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.9" \ + org.hyperledger.fabric.base.version="0.4.21" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.9 +[ce7 10-14 19:01:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[ce8 10-14 19:01:14.01 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[ce9 10-14 19:01:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:1.4 +[cea 10-14 19:01:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[ceb 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[cec 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[ced 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[cee 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cef 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf0 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf1 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf2 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf3 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf4 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[cf5 10-14 19:01:14.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf6 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cf7 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cf8 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf9 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[cfa 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[cfb 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cfc 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cfd 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cfe 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cff 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d00 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d01 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d02 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 gate 1602702074164126700 evaluation starts +[d03 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 signed by 0 principal evaluation starts (used [false]) +[d04 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 processing identity 0 with bytes of 115a6c0 +[d05 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 principal matched by identity 0 +[d06 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +[d07 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +00000040 92 68 95 c5 36 a8 69 |.h..6.i| +[d08 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 principal evaluation succeeds for identity 0 +[d09 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374ef50 gate 1602702074164126700 evaluation succeeds +[d0a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d0b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d0c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d0d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d0e 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d0f 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[d10 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[d11 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[d12 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[d13 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d14 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d15 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d16 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[d17 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d18 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d19 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d1a 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[d1b 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[d1c 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[d1d 10-14 19:01:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d1e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[d1f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[d20 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[d21 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d22 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d23 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d24 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d25 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d26 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d27 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[d28 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d29 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +[d2a 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +[d2b 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d2c 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:5\350\245< \276\301r\334" > > , Envelope: 166 bytes, Signature: 0 bytes +[d2d 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[d2e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d2f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d30 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d31 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d32 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d33 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d34 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d35 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 gate 1602702074287536200 evaluation starts +[d36 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 signed by 0 principal evaluation starts (used [false]) +[d37 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 processing identity 0 with bytes of 115a6c0 +[d38 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 principal matched by identity 0 +[d39 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +[d3a 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +00000040 a5 3c 20 be c1 72 dc |.< ..r.| +[d3b 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 principal evaluation succeeds for identity 0 +[d3c 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003765550 gate 1602702074287536200 evaluation succeeds +[d3d 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d3e 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d3f 10-14 19:01:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d40 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d41 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d42 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[d43 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[d44 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[d45 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[d46 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d47 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d48 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d49 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[d4a 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d4b 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d4c 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d4d 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[d4e 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:5\350\245< \276\301r\334" > alive: +[d4f 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[d50 10-14 19:01:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d51 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[d52 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d53 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d54 10-14 19:01:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d55 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[d56 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[d57 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[d58 10-14 19:01:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d59 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d5a 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d5b 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[d5c 10-14 19:01:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d5d 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[d5e 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d5f 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[d60 10-14 19:01:14.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[d61 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +[d62 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +00000040 a9 45 ea e8 63 24 |.E..c$| +[d63 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[d64 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 22 35 72 4f fe 0a 9e 19 ef 33 53 |0D. T"5rO.....3S| +00000010 44 f3 f6 7a 71 4c 82 31 ce 1e 97 1a 17 1f 2a 6e |D..zqL.1......*n| +00000020 a4 b1 43 bf 02 20 18 14 9c 2b 99 34 f1 f8 40 00 |..C.. ...+.4..@.| +00000030 4f e4 be 28 06 50 ed d5 97 d8 6e 56 f4 31 5b 8b |O..(.P....nV.1[.| +00000040 ea 78 40 f1 bf 4b |.x@..K| +[d65 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[d66 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[d67 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[d68 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[d69 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[d6a 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d6b 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d6c 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d6d 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[d6e 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d6f 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d70 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[d71 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[d72 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[d73 10-14 19:01:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d74 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[d75 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[d76 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[d77 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[d78 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[d79 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[d7a 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[d7b 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d7c 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[d7d 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d7e 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[d7f 10-14 19:01:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d80 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[d82 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[d83 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[d84 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d81 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d85 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d86 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[d87 10-14 19:01:14.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d88 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[d89 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161013 +[d8a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 60D636B51EF43016D027BE3249580B44A7074DB1464612F02862B9C2E7F9A8E8 +[d8b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[d8c 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[d8d 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[d8e 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d8f 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[d90 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[d91 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d92 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[d93 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +[d94 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d95 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" secret_envelope:\346\220\361\037m\036i\233\260\316_\314\223\030\240\334\222\0262\275J\002 \032\007O)\265O\210\323U\236\2512\344\201\255\2655\313\271\301\331B\n\326\337\202O\361C\373\306\361" > > > , Envelope: 272 bytes, Signature: 0 bytes +[d96 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d97 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:]=\243\\Mt\247\220d\007" > > , Envelope: 166 bytes, Signature: 0 bytes +[d98 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d99 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[d9a 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[d9b 10-14 19:01:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d9c 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[d9d 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[d9e 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d9f 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[da0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[da1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[da2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[da3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[da4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[da5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 gate 1602702074610726300 evaluation starts +[da6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 signed by 0 principal evaluation starts (used [false]) +[da7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 processing identity 0 with bytes of 115a6c0 +[da8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 principal matched by identity 0 +[da9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a 24 41 f3 d4 e8 fd 58 33 e7 65 f0 06 bd 5e 19 |*$A....X3.e...^.| +00000010 cd 64 3a 4f 94 67 96 6f 0d 35 91 2b be 9e 80 2d |.d:O.g.o.5.+...-| +[daa 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 87 ff 67 58 c1 2d 0f 2b 02 df |0E.!....gX.-.+..| +00000010 76 9a 2b f7 5a 79 94 f1 89 cc 1d 95 45 e1 49 f2 |v.+.Zy......E.I.| +00000020 40 1b 20 cd 9e 02 20 60 85 8e b1 50 0c c4 b5 c6 |@. ... `...P....| +00000030 c7 a7 cc ff 6e c2 40 cf 37 04 64 93 c9 f3 6f 53 |....n.@.7.d...oS| +00000040 92 68 95 c5 36 a8 69 |.h..6.i| +[dab 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 principal evaluation succeeds for identity 0 +[dac 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858e00 gate 1602702074610726300 evaluation succeeds +[dad 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[dae 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[daf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[db0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[db1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[db2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[db4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +[db5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +[db6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[db7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[db8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[db9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[dba 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dbb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[dbc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[dbd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[dbe 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[dbf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[dc0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[dc1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 gate 1602702074617202400 evaluation starts +[dc2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 signed by 0 principal evaluation starts (used [false]) +[dc3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 processing identity 0 with bytes of 115a6c0 +[dc4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 principal matched by identity 0 +[dc5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 97 90 39 ff 62 20 6e e9 99 1b 26 dc e0 99 a7 |;..9.b n...&....| +00000010 80 94 8c 81 c6 91 e0 f2 a0 4f ad c1 4e 92 57 df |.........O..N.W.| +[dc6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 cd 8f a0 a1 0b 26 2b 6d a5 45 |0E.!.......&+m.E| +00000010 f0 76 84 90 50 0b 25 66 b3 c2 71 85 c0 07 6c db |.v..P.%f..q...l.| +00000020 43 ad 33 e4 41 02 20 50 83 58 0d a0 77 a9 4f ac |C.3.A. P.X..w.O.| +00000030 89 9d fd a4 f7 9b 66 35 71 4c 46 ef e0 12 5b 19 |......f5qLF...[.| +00000040 ee a6 1d c6 e9 dd 5b |......[| +[dc7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 principal evaluation succeeds for identity 0 +[dc8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888d00 gate 1602702074617202400 evaluation succeeds +[dc9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[dca 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[dcb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[dcc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[dcd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dce 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1602702050267080900, 16 but got ts: inc_num:1602702050267080900 seq_num:14 +[dcf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[dd2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[dd3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dd4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[dd5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[dd6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[dd8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[dd9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[dda 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ddb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ddc 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ddd 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 gate 1602702074618560600 evaluation starts +[dde 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 signed by 0 principal evaluation starts (used [false]) +[ddf 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 processing identity 0 with bytes of 115a6c0 +[de0 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 principal matched by identity 0 +[de1 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 df e1 4e 12 72 6c 67 ba 82 72 cf 85 87 34 f7 |...N.rlg..r...4.| +00000010 a8 5a 88 e1 0d 8b d8 bf 27 ee e6 7d 25 3e e8 5b |.Z......'..}%>.[| +[de2 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 0b 21 e7 05 48 d3 f5 da dc 20 |0E.!...!..H.... | +00000010 75 6f 7a d1 59 83 be b8 39 7d 57 cc 47 8f b9 c9 |uoz.Y...9}W.G...| +00000020 af 15 20 e9 c5 02 20 08 ca ad 2b dd 7b f7 ab ad |.. ... ...+.{...| +00000030 32 70 2c 76 e2 ba c0 a4 bd 52 f0 fa dc 3e 35 e8 |2p,v.....R...>5.| +00000040 a5 3c 20 be c1 72 dc |.< ..r.| +[de3 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 principal evaluation succeeds for identity 0 +[de4 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003996600 gate 1602702074618560600 evaluation succeeds +[de5 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[de6 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[de7 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[de8 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[de9 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dea 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[deb 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[dec 10-14 19:01:14.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 3f 93 02 b1 0a 35 f5 5d 44 a7 14 9c 2e 36 c6 |Z?....5.]D....6.| +00000010 a2 3a 9f 5c 46 ba 58 b8 39 d8 cf 11 1b 24 bd 35 |.:.\F.X.9....$.5| +[ded 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 dc 6b e3 b3 97 8b bb dc 00 bb 09 |0D. ..k.........| +00000010 99 62 fa 8d 6b 33 c1 19 3c 0f f6 d4 b2 c0 2a e7 |.b..k3..<.....*.| +00000020 21 26 8a 5b 02 20 7c 0a 04 c5 aa e7 ad 66 66 73 |!&.[. |......ffs| +00000030 d7 9c 89 16 a6 f2 10 81 82 ea 1a 2e b0 dd 0b 43 |...............C| +00000040 a9 45 ea e8 63 24 |.E..c$| +[dee 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[def 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df0 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[df1 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +[df2 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +[df3 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df4 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df5 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df6 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df7 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +[df8 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +[df9 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dfa 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[dfb 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dfc 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[dfd 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[dfe 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 d6 36 b5 1e f4 30 16 d0 27 be 32 49 58 0b 44 |`.6...0..'.2IX.D| +00000010 a7 07 4d b1 46 46 12 f0 28 62 b9 c2 e7 f9 a8 e8 |..M.FF..(b......| +[dff 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa b4 c6 24 bf a4 07 dc d5 ca 90 |0E.!....$.......| +00000010 0e 6a 6d ba 7e f1 35 8a 94 7d f6 ca bc 4a 1b 52 |.jm.~.5..}...J.R| +00000020 ed 25 fe 40 fb 02 20 2b d6 6a f8 06 e7 b9 23 dc |.%.@.. +.j....#.| +00000030 af cf 04 8c 57 9f 03 af eb 80 43 5a 3e 5d 3d a3 |....W.....CZ>]=.| +00000040 5c 4d 74 a7 90 64 07 |\Mt..d.| +[e00 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[e01 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a2 4e 44 2e 0e 53 df e8 21 3f 3e |0E.!..ND..S..!?>| +00000010 e6 90 f1 1f 6d 1e 69 9b b0 ce 5f cc 93 18 a0 dc |....m.i..._.....| +00000020 92 16 32 bd 4a 02 20 1a 07 4f 29 b5 4f 88 d3 55 |..2.J. ..O).O..U| +00000030 9e a9 32 e4 81 ad b5 35 cb b9 c1 d9 42 0a d6 df |..2....5....B...| +00000040 82 4f f1 43 fb c6 f1 |.O.C...| +[e02 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[e03 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[e04 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e05 10-14 19:01:14.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e06 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e07 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e08 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e09 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0a 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0b 10-14 19:01:14.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0c 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e0d 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e0e 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0f 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e10 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e11 10-14 19:01:14.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e12 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e13 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e14 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e15 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e16 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[e17 10-14 19:01:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e18 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e19 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e1a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e1b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e1c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e1d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e1e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 gate 1602702075174406600 evaluation starts +[e1f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 signed by 0 principal evaluation starts (used [false]) +[e20 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 processing identity 0 with bytes of 115a6c0 +[e21 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 principal matched by identity 0 +[e22 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 09 0f b2 6b f0 90 6e 95 04 c2 3d 31 ed 64 80 |t...k..n...=1.d.| +00000010 15 be ae ba 14 0d d5 db f2 de 32 4d 1f 87 4f c1 |..........2M..O.| +[e23 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d fc 9e e0 54 0d 5d 78 c5 f5 12 d4 |0D. M...T.]x....| +00000010 e0 46 8b 24 2f 4f 32 03 06 53 ee 39 7e 39 8a 25 |.F.$/O2..S.9~9.%| +00000020 8a 65 89 45 02 20 28 a4 fe 61 55 7c 72 e6 2a 76 |.e.E. (..aU|r.*v| +00000030 94 43 04 53 64 b5 75 68 f1 96 d4 d0 f9 6d ee cc |.C.Sd.uh.....m..| +00000040 25 f5 a8 78 7c 24 |%..x|$| +[e24 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 principal evaluation succeeds for identity 0 +[e25 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003803920 gate 1602702075174406600 evaluation succeeds +[e26 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e27 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e28 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e29 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e2a 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e2b 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[e2c 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e2d 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e2e 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e2f 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e30 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e31 10-14 19:01:15.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e32 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e33 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e34 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e35 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e36 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e37 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e38 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e39 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3a 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3b 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3c 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3d 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3e 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e3f 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e40 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e41 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e42 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e43 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e44 10-14 19:01:15.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e45 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e46 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e47 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e48 10-14 19:01:15.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e49 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[e4a 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[e4b 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[e4c 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4d 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e4e 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[e4f 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e50 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e51 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e52 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e53 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[e54 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e55 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e56 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e57 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e58 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e59 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e5a 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e5b 10-14 19:01:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 gate 1602702075289837300 evaluation starts +[e5c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 signed by 0 principal evaluation starts (used [false]) +[e5d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 processing identity 0 with bytes of 115a6c0 +[e5e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 principal matched by identity 0 +[e5f 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 c5 71 33 78 22 52 e5 c4 d9 dc bd 25 69 5d d6 |..q3x"R.....%i].| +00000010 22 71 df 0f 19 d7 14 4d 8f 83 16 2d fe 7e 57 fc |"q.....M...-.~W.| +[e60 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 cc 1d 62 d3 47 ee 80 4c 95 71 33 |0D. ...b.G..L.q3| +00000010 23 53 74 b1 81 38 82 34 da cb 71 c1 bc 95 0e e8 |#St..8.4..q.....| +00000020 42 47 c4 0f 02 20 77 b4 1d 60 1a ae 6d c1 b9 26 |BG... w..`..m..&| +00000030 5b 5c a8 f9 1f 17 f3 c5 a6 5f d1 17 58 37 01 55 |[\......._..X7.U| +00000040 f8 fe db b4 43 1d |....C.| +[e61 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 principal evaluation succeeds for identity 0 +[e62 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a9c690 gate 1602702075289837300 evaluation succeeds +[e63 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e64 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e65 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e66 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e67 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e68 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[e69 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e6a 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e6b 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e6c 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e6d 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e6e 10-14 19:01:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e6f 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e70 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e71 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e72 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e73 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e74 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e75 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e76 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e77 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e78 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e79 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e7a 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e7b 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e7c 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e7d 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[e7e 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e7f 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e80 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e81 10-14 19:01:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e82 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[e83 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[e84 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e85 10-14 19:01:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[e86 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e87 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e88 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e89 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[e8a 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 f3 3a 52 71 b5 a6 4d 6e 16 6d 9e 16 73 0d 0c |r.:Rq..Mn.m..s..| +00000010 31 37 fb e9 eb ac 19 8f 85 91 3e 92 e0 d4 64 ee |17........>...d.| +[e8b 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 ce b6 43 3e a5 6e 4f 1a fc 74 |0E.!....C>.nO..t| +00000010 f3 b6 48 1e bf 1a 81 05 a3 78 ca 7e 58 ef 08 e8 |..H......x.~X...| +00000020 9e 64 d2 a7 e6 02 20 60 ce bf ae 18 d3 eb 4c 0c |.d.... `......L.| +00000030 40 97 d1 22 d0 34 2f f6 e9 af a1 16 db 58 19 6c |@..".4/......X.l| +00000040 e7 90 32 59 77 c3 15 |..2Yw..| +[e8c 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e8d 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[e8e 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e8f 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e90 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[e91 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e92 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e93 10-14 19:01:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e94 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e95 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e96 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e97 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e98 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e99 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e9a 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e9b 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e9c 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e9d 10-14 19:01:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e9e 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e9f 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ea0 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ea1 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ea2 10-14 19:01:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ea3 10-14 19:01:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[ea4 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ea5 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161014 +[ea6 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CBED99ADF2F02FF5393FE8F15C3B0195AD918AAA509F61E03CD79EB8E9F35E20 +[ea7 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ea8 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[ea9 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[eaa 10-14 19:01:15.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[eab 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eac 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ead 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[eae 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eaf 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[eb0 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[eb2 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eb3 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[eb4 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[eb5 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eb6 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[eb7 10-14 19:01:15.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eb1 10-14 19:01:15.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eb8 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eb9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eba 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[ebb 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ebc 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ebd 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ebe 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ebf 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ec0 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ec1 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[ec2 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[ec3 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ec4 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[ec5 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[ec6 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[ec7 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ec8 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ec9 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[eca 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ecb 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ecc 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ecd 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ece 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ecf 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 gate 1602702077966302800 evaluation starts +[ed0 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 signed by 0 principal evaluation starts (used [false]) +[ed1 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 processing identity 0 with bytes of 115a6c0 +[ed2 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 principal matched by identity 0 +[ed3 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[ed4 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[ed5 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 principal evaluation succeeds for identity 0 +[ed6 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b731c0 gate 1602702077966302800 evaluation succeeds +[ed7 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ed8 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ed9 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[edb 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[edc 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[edd 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ede 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eda 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[edf 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[ee1 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[ee2 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee0 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ee3 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ee4 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ee5 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[ee6 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[ee7 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ee8 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ee9 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[eea 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[eeb 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 gate 1602702077976163300 evaluation starts +[eec 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 signed by 0 principal evaluation starts (used [false]) +[eed 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 processing identity 0 with bytes of 115a6c0 +[eee 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 principal matched by identity 0 +[eef 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[ef0 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[ef1 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 principal evaluation succeeds for identity 0 +[ef2 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e410 gate 1602702077976163300 evaluation succeeds +[ef3 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ef4 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ef5 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ef6 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ef7 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ef8 10-14 19:01:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[ef9 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[efa 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[efb 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[efc 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[efd 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[efe 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eff 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f00 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f01 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f02 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f03 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f04 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f05 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 gate 1602702077957476100 evaluation starts +[f06 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 signed by 0 principal evaluation starts (used [false]) +[f07 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 processing identity 0 with bytes of 115a6c0 +[f08 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 principal matched by identity 0 +[f09 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[f0a 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[f0b 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 principal evaluation succeeds for identity 0 +[f0c 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c868c0 gate 1602702077957476100 evaluation succeeds +[f0d 10-14 19:01:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f0e 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f0f 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f10 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f11 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f12 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[f13 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f14 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[f15 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[f16 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[f17 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[f18 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f19 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f1a 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f1b 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f1c 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f1d 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f1e 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f1f 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f20 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 gate 1602702077966492700 evaluation starts +[f21 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 signed by 0 principal evaluation starts (used [false]) +[f22 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 processing identity 0 with bytes of 115a6c0 +[f23 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 principal matched by identity 0 +[f24 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[f25 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[f26 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 principal evaluation succeeds for identity 0 +[f27 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d6af0 gate 1602702077966492700 evaluation succeeds +[f28 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f29 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f2a 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f2b 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f2c 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f2d 10-14 19:01:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f2e 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f2f 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f30 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f31 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f32 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f33 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f34 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 gate 1602702077973506700 evaluation starts +[f35 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 signed by 0 principal evaluation starts (used [false]) +[f36 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 processing identity 0 with bytes of 115a6c0 +[f37 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 principal matched by identity 0 +[f38 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[f39 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[f3a 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 principal evaluation succeeds for identity 0 +[f3b 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d7cf0 gate 1602702077973506700 evaluation succeeds +[f3c 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f3d 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f3e 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f3f 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f40 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f41 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[f42 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[f43 10-14 19:01:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f44 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f45 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f46 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f47 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f48 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f49 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4a 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4b 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4c 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f4d 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[f4e 10-14 19:01:18.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f4f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f50 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f51 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f52 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[f53 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[f54 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f55 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f56 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f57 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f58 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f59 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f5a 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f5b 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 gate 1602702078124319800 evaluation starts +[f5c 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 signed by 0 principal evaluation starts (used [false]) +[f5d 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 processing identity 0 with bytes of 115a6c0 +[f5e 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 principal matched by identity 0 +[f5f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +[f60 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +00000040 b4 10 00 6f 5b da |...o[.| +[f61 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 principal evaluation succeeds for identity 0 +[f62 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030f3cc0 gate 1602702078124319800 evaluation succeeds +[f63 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f64 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f65 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f66 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f67 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f68 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[f69 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[f6a 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[f6b 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[f6c 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f6d 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f6e 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f6f 10-14 19:01:18.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[f70 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f71 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f72 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f73 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[f74 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[f75 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f76 10-14 19:01:18.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > alive: +[f77 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f78 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f79 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[f7a 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7b 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7c 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7d 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7e 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7f 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f80 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[f81 10-14 19:01:18.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f82 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[f83 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[f84 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f85 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[f86 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[f87 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f88 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f89 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f8a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f8b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f8c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f8d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f8e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 gate 1602702078266409900 evaluation starts +[f8f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 signed by 0 principal evaluation starts (used [false]) +[f90 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 processing identity 0 with bytes of 115a6c0 +[f91 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 principal matched by identity 0 +[f92 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +[f93 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +00000040 70 f3 1b d2 74 b0 de |p...t..| +[f94 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 principal evaluation succeeds for identity 0 +[f95 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003115ad0 gate 1602702078266409900 evaluation succeeds +[f96 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f97 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f98 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f99 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f9a 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[f9b 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[f9c 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[f9d 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[f9e 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[f9f 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa0 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa1 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa2 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[fa3 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fa4 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fa5 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fa6 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[fa7 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\245nO\032\374t\363\266H\036\277\032\201\005\243x\312~X\357\010\350\236d\322\247\346\002 `\316\277\256\030\323\353L\014@\227\321\"\3204/\366\351\257\241\026\333X\031l\347\2202Yw\303\025" > alive: +[fa8 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[fa9 10-14 19:01:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[faa 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[fab 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fac 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fad 10-14 19:01:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fae 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[faf 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[fb0 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[fb1 10-14 19:01:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fb2 10-14 19:01:18.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[fb3 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d1 db 0d 9a 09 c4 59 85 a2 59 36 e6 a5 d7 49 9d |......Y..Y6...I.| +00000010 b8 ea 73 20 41 d9 ff d9 c7 0b 81 63 23 02 3c 6b |..s A......c#. DEBU Verify: sig = 00000000 30 44 02 20 0a e9 0e a3 83 63 3d 76 94 03 65 98 |0D. .....c=v..e.| +00000010 1c 8d da 82 89 10 c7 73 19 fc f7 9b 0b 33 83 83 |.......s.....3..| +00000020 cb 6c 51 84 02 20 44 8b fb 3a c4 f4 20 e1 41 f1 |.lQ.. D..:.. .A.| +00000030 32 53 ee a2 55 8c 41 7b 57 5b 53 1e 27 a8 25 e5 |2S..U.A{W[S.'.%.| +00000040 a4 1d fe 75 c8 6b |...u.k| +[fb5 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fb6 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb7 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb8 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[fb9 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[fba 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[fbb 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[fbc 10-14 19:01:18.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[fbd 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[fbe 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[fbf 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[fc0 10-14 19:01:18.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fc1 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[fc2 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fc3 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[fc4 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[fc5 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +[fc6 10-14 19:01:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +00000040 43 3c f3 0d 1f 72 35 |C<...r5| +[fc7 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[fc8 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 74 dc 00 fd a7 40 4e 8c 83 0e 8d |0D. .t....@N....| +00000010 64 51 be 70 fa a4 67 10 12 c3 7a f4 1d ac b7 23 |dQ.p..g...z....#| +00000020 d2 f9 30 7d 02 20 52 bd ad c0 40 23 5c a1 81 26 |..0}. R...@#\..&| +00000030 ae 5b 30 46 fa 3b fb 92 04 92 63 72 a8 30 40 2c |.[0F.;....cr.0@,| +00000040 3b 1c 10 e5 08 52 |;....R| +[fc9 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[fca 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[fcb 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[fcc 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[fcd 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[fce 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fcf 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fd0 10-14 19:01:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fd1 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[fd2 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fd3 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fd4 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[fd5 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[fd6 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[fd7 10-14 19:01:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fd8 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[fd9 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[fda 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[fdb 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[fdc 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[fdd 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[fde 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[fdf 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe0 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[fe1 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe2 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[fe3 10-14 19:01:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe4 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fe5 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fe6 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fe7 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe8 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fe9 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fea 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[feb 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fec 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fed 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[fee 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fef 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ff0 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161015 +[ff1 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F2934FC81566491FE927BF7AD451800499957FE373D91EF4FBABECD071C9ABB9 +[ff2 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ff3 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[ff4 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[ff5 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[ff6 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff7 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[ff8 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff9 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[ffa 10-14 19:01:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[ffb 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffc 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[ffd 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffe 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[fff 10-14 19:01:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1000 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1001 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1002 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1003 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1004 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1005 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1006 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +[1007 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +00000040 8e b1 e6 4e e7 a9 |...N..| +[1008 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1009 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f ca 80 f8 3d 1c 35 0e 05 c7 c0 ed |0D. ....=.5.....| +00000010 1c 03 56 ad 3a af 73 91 8f 83 ea aa 20 2c 38 27 |..V.:.s..... ,8'| +00000020 9f 68 8f 71 02 20 58 4c d8 b0 2f 33 8d ba 47 0a |.h.q. XL../3..G.| +00000030 be 83 97 2a 0c b0 cb 74 b6 be ed 17 1f ae b5 4a |...*...t.......J| +00000040 84 c9 72 56 62 1f |..rVb.| +[100a 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[100b 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[100c 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[100d 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[100e 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[100f 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1010 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1011 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1012 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1013 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1014 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1015 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1016 10-14 19:01:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1017 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1018 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 gate 1602702078590495800 evaluation starts +[1019 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[101a 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[101b 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 signed by 0 principal evaluation starts (used [false]) +[101c 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 processing identity 0 with bytes of 115a6c0 +[101d 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 principal matched by identity 0 +[101e 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 43 a2 e3 d5 4b 33 5a fb 2b 0a 73 8a b2 a5 07 |.C...K3Z.+.s....| +00000010 89 f3 2a f2 94 47 c2 b1 5d 09 49 d3 55 33 c4 9e |..*..G..].I.U3..| +[101f 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 4a 9f 3c 7b aa 47 c1 a1 9c 1f |0E.!..J.<{.G....| +00000010 21 5f c2 28 6d bd 2a c5 e3 b8 e3 e1 e7 31 6d 32 |!_.(m.*......1m2| +00000020 ea 16 49 16 ab 02 20 69 f3 ff 89 ac fe b6 ba 5d |..I... i.......]| +00000030 df 99 1d c7 43 ac 70 ea 29 8f 80 17 17 90 95 50 |....C.p.)......P| +00000040 70 f3 1b d2 74 b0 de |p...t..| +[1020 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 principal evaluation succeeds for identity 0 +[1021 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003207fa0 gate 1602702078590495800 evaluation succeeds +[1022 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1023 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1024 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1025 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1026 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1027 10-14 19:01:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1028 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1029 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +[102a 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +00000040 43 3c f3 0d 1f 72 35 |C<...r5| +[102b 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[102c 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102d 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[102e 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +[102f 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +00000040 8e b1 e6 4e e7 a9 |...N..| +[1030 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1031 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1032 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1033 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1034 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1036 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1035 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1037 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 93 4f c8 15 66 49 1f e9 27 bf 7a d4 51 80 04 |..O..fI..'.z.Q..| +00000010 99 95 7f e3 73 d9 1e f4 fb ab ec d0 71 c9 ab b9 |....s.......q...| +[1038 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 88 db e4 5f d5 2c 6e a2 60 f9 1f |0D. z..._.,n.`..| +00000010 90 71 38 b8 66 50 6b 69 9a 9a 47 b6 e0 27 ee e1 |.q8.fPki..G..'..| +00000020 ab 7c c7 79 02 20 5f 9d f6 94 11 7d 28 c0 5d 4c |.|.y. _....}(.]L| +00000030 46 ac fb 5a 1e bb 60 f6 2e 18 ee 58 d3 58 4c 92 |F..Z..`....X.XL.| +00000040 8e b1 e6 4e e7 a9 |...N..| +[1039 10-14 19:01:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[103a 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[103b 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[103c 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[103d 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 fc 8b 3f c8 84 96 df 99 97 40 0e 6a 9b 26 d5 |E..?......@.j.&.| +00000010 2f 7c 31 e1 d2 cb 68 61 d5 b9 e6 4e 13 60 2d 50 |/|1...ha...N.`-P| +[103e 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 c7 77 9a 8a 7d 63 c4 44 1a b4 |0E.!...w..}c.D..| +00000010 c3 d7 4e be c8 68 bc 14 85 07 3f 7a 50 cd 69 74 |..N..h....?zP.it| +00000020 80 fa 75 ee 4a 02 20 71 ab 63 63 c7 3f d3 68 64 |..u.J. q.cc.?.hd| +00000030 2f 84 40 31 10 b9 73 70 81 2e be d0 b5 a7 78 2a |/.@1..sp......x*| +00000040 43 3c f3 0d 1f 72 35 |C<...r5| +[103f 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1040 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1041 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1042 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1043 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1044 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1045 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1046 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1047 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1048 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1049 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 gate 1602702078614964400 evaluation starts +[104a 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 signed by 0 principal evaluation starts (used [false]) +[104b 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 processing identity 0 with bytes of 115a6c0 +[104c 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 principal matched by identity 0 +[104d 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 99 7b b8 02 da cb e4 3f 3b 83 db bc 4f 59 3d |a.{.....?;...OY=| +00000010 7c fe 35 91 91 5d a9 d1 7e 84 88 b5 c7 ac b1 03 ||.5..]..~.......| +[104e 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 b8 f6 52 6b 9d a1 ca d1 7e be 35 |0D. f..Rk....~.5| +00000010 cc 64 89 8d ed ee a1 9c 07 ea 7c 6a ff 31 3b dd |.d........|j.1;.| +00000020 05 b5 db 10 02 20 65 dc dd ac 49 ba 1f 7d 9b 33 |..... e...I..}.3| +00000030 20 06 16 30 b8 c6 ec ce e8 26 19 6f 39 db 62 7f | ..0.....&.o9.b.| +00000040 b4 10 00 6f 5b da |...o[.| +[104f 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 principal evaluation succeeds for identity 0 +[1050 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243900 gate 1602702078614964400 evaluation succeeds +[1051 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1052 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1053 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1054 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1055 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1056 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1057 10-14 19:01:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1058 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1059 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[105a 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[105b 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[105c 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[105d 10-14 19:01:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105e 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[105f 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1060 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1061 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1062 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1063 10-14 19:01:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1064 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1065 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1066 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1067 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1068 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1069 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[106a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[106b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[106c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[106d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[106e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[106f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1070 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 gate 1602702080141166300 evaluation starts +[1071 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 signed by 0 principal evaluation starts (used [false]) +[1072 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 processing identity 0 with bytes of 115a6c0 +[1073 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 principal matched by identity 0 +[1074 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 78 53 2d a9 c1 62 a6 da ce ff 81 4b 77 5c 1d 2a |xS-..b.....Kw\.*| +00000010 9e 67 1e da bf 59 6b b6 b6 5f 0f f7 84 ff 8b 61 |.g...Yk.._.....a| +[1075 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 3c a8 cb af 76 21 f8 70 ca bd 13 |0D. ><...v!.p...| +00000010 7e 29 48 45 2c 07 10 0b a5 d0 69 22 42 4d 18 4e |~)HE,.....i"BM.N| +00000020 eb f8 f1 8a 02 20 35 e1 2e 6e 0f b3 ba 21 26 93 |..... 5..n...!&.| +00000030 66 9e 95 9c ce f5 d5 4e 91 70 55 a8 53 60 ab b3 |f......N.pU.S`..| +00000040 51 36 82 bf 95 43 |Q6...C| +[1076 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 principal evaluation succeeds for identity 0 +[1077 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00326d420 gate 1602702080141166300 evaluation succeeds +[1078 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1079 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[107a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[107b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[107c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[107d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[107e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[107f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1080 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1081 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1082 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1083 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1084 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1085 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1086 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1087 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1088 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1089 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108a 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108b 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[108c 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108d 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[108e 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[108f 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1090 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1091 10-14 19:01:20.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1092 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1093 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1094 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1095 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1096 10-14 19:01:20.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1097 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1098 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1099 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[109a 10-14 19:01:20.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[109b 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[109c 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[109d 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[109e 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[109f 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[10a0 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a1 10-14 19:01:20.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10a2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10a3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10a4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10a5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10a6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10a7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 gate 1602702080260461200 evaluation starts +[10a8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 signed by 0 principal evaluation starts (used [false]) +[10a9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 processing identity 0 with bytes of 115a6c0 +[10aa 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 principal matched by identity 0 +[10ab 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c fe 91 fe 25 81 61 1b 0d 27 ca d9 26 40 dd c0 |\...%.a..'..&@..| +00000010 b6 8e 07 d7 12 1c a3 60 d3 99 89 d0 a1 3f a8 1e |.......`.....?..| +[10ac 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 f1 a2 60 87 53 92 03 5e 85 01 |0E.!....`.S..^..| +00000010 4a 00 5b 6a bb c8 28 67 11 ca 2b 7c e8 89 5b 43 |J.[j..(g..+|..[C| +00000020 39 2e 4f 75 98 02 20 22 78 44 ea 40 06 52 73 8d |9.Ou.. "xD.@.Rs.| +00000030 cb 65 a9 80 06 03 94 0f 2c 87 6b 8a 95 46 ec c8 |.e......,.k..F..| +00000040 ce 56 20 8f b7 fa 0d |.V ....| +[10ad 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 principal evaluation succeeds for identity 0 +[10ae 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82f0 gate 1602702080260461200 evaluation succeeds +[10af 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[10b0 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[10b1 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[10b2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[10b3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10b4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[10b5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10b6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10b7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[10b8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10b9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ba 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10bb 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10bc 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10bd 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10be 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10bf 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10c0 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c1 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10c2 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10c3 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c4 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10c5 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c6 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c7 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10c8 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c9 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10ca 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10cb 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10cc 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10cd 10-14 19:01:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ce 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10cf 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d0 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d1 10-14 19:01:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d2 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d3 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d4 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d5 10-14 19:01:20.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[10d6 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 98 6a 73 ad 11 1f 61 55 7b a4 8d 05 12 40 98 |&.js...aU{....@.| +00000010 a1 1b 7b f7 97 22 e0 a8 26 ed 5c e3 ee 97 06 a1 |..{.."..&.\.....| +[10d7 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 ae 61 d1 8e 26 59 34 d1 33 53 |0E.!...a..&Y4.3S| +00000010 ef de 72 88 57 64 62 c9 1d 36 2f 0d a3 cc a1 c4 |..r.Wdb..6/.....| +00000020 fa 5c 7a 27 ce 02 20 0d 41 38 b4 35 b4 ce 7c ec |.\z'.. .A8.5..|.| +00000030 0e 6b e9 ff c0 31 53 18 6d bd 2c 51 ed 6d 35 f5 |.k...1S.m.,Q.m5.| +00000040 2a d3 02 53 28 96 e7 |*..S(..| +[10d8 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d9 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[10da 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10db 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10dc 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[10dd 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10de 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10df 10-14 19:01:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e0 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10e1 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10e2 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10e3 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10e4 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10e5 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10e6 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10e7 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e8 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10e9 10-14 19:01:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ea 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10eb 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10ec 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ed 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10ee 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ef 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f0 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f1 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f2 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10f3 10-14 19:01:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f4 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[10f5 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161016 +[10f6 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5105DB905A92B59846F3E2935C4E1382A4264B878B6354CBF2EB0C3328AD050D +[10f7 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[10f8 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[10f9 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[10fa 10-14 19:01:20.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[10fb 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fc 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fd 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10fe 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10ff 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1100 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1101 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1102 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1103 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1104 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1106 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1105 10-14 19:01:20.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1107 10-14 19:01:20.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1108 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1109 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[110a 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[110b 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[110c 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[110e 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[110d 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[110f 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1110 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1111 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1112 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1113 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1115 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1116 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1114 10-14 19:01:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1117 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1119 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1118 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[111a 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[111b 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[111c 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[111d 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[111e 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[111f 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1120 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1121 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 gate 1602702081935321000 evaluation starts +[1122 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 signed by 0 principal evaluation starts (used [false]) +[1123 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 processing identity 0 with bytes of 115a6c0 +[1124 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 principal matched by identity 0 +[1125 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1126 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1127 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1128 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1129 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112a 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112b 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[112c 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[112d 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 principal evaluation succeeds for identity 0 +[112e 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003365250 gate 1602702081935321000 evaluation succeeds +[1130 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[112f 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1132 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1131 10-14 19:01:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1133 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1134 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1135 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1136 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1137 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1138 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1139 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[113a 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[113b 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[113c 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[113d 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 gate 1602702081945052300 evaluation starts +[113e 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 signed by 0 principal evaluation starts (used [false]) +[113f 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 processing identity 0 with bytes of 115a6c0 +[1140 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 principal matched by identity 0 +[1141 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1142 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1143 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 principal evaluation succeeds for identity 0 +[1144 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a2450 gate 1602702081945052300 evaluation succeeds +[1145 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1146 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1147 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1148 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1149 10-14 19:01:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[114b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[114c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[114d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[114e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[114f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1150 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1151 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1152 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1153 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1154 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1155 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1156 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1157 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 gate 1602702081951306600 evaluation starts +[1158 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 signed by 0 principal evaluation starts (used [false]) +[1159 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 processing identity 0 with bytes of 115a6c0 +[115a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 principal matched by identity 0 +[115b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[115c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[115d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 principal evaluation succeeds for identity 0 +[115e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c65d0 gate 1602702081951306600 evaluation succeeds +[115f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1160 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1161 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1162 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1163 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1164 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1165 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1166 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1167 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1168 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1169 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[116a 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[116b 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 gate 1602702081958336400 evaluation starts +[116c 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 signed by 0 principal evaluation starts (used [false]) +[116d 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 processing identity 0 with bytes of 115a6c0 +[116e 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 principal matched by identity 0 +[116f 10-14 19:01:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1170 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1171 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 principal evaluation succeeds for identity 0 +[1172 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c77d0 gate 1602702081958336400 evaluation succeeds +[1173 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1174 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1175 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1176 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1177 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1178 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1179 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[117a 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[117b 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[117c 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[117d 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[117e 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[117f 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1180 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1181 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1182 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1183 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1184 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 gate 1602702081966951000 evaluation starts +[1185 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 signed by 0 principal evaluation starts (used [false]) +[1186 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 processing identity 0 with bytes of 115a6c0 +[1187 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 principal matched by identity 0 +[1188 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1189 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[118a 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 principal evaluation succeeds for identity 0 +[118b 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033e9310 gate 1602702081966951000 evaluation succeeds +[118c 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[118d 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[118e 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[118f 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1190 10-14 19:01:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1191 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1192 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1193 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1194 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1195 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1196 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1197 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1198 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 gate 1602702081973299400 evaluation starts +[1199 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 signed by 0 principal evaluation starts (used [false]) +[119a 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 processing identity 0 with bytes of 115a6c0 +[119b 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 principal matched by identity 0 +[119c 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[119d 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[119e 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 principal evaluation succeeds for identity 0 +[119f 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003404510 gate 1602702081973299400 evaluation succeeds +[11a0 10-14 19:01:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11a1 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11a2 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11a3 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11a4 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[11a5 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[11a6 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11a7 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[11a8 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[11a9 10-14 19:01:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11aa 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11ab 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11ac 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11ad 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ae 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11af 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b0 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b1 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b2 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b3 10-14 19:01:22.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[11b4 10-14 19:01:22.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b5 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +[11b6 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +[11b7 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b8 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > > , Envelope: 165 bytes, Signature: 0 bytes +[11b9 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[11ba 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11bb 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11bc 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11bd 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11be 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11bf 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11c0 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11c1 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 gate 1602702082133565200 evaluation starts +[11c2 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 signed by 0 principal evaluation starts (used [false]) +[11c3 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 processing identity 0 with bytes of 115a6c0 +[11c4 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 principal matched by identity 0 +[11c5 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +[11c6 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +00000040 7b e6 4c 9c 71 72 |{.L.qr| +[11c7 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 principal evaluation succeeds for identity 0 +[11c8 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00342c3b0 gate 1602702082133565200 evaluation succeeds +[11c9 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11ca 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11cb 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11cc 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11cd 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[11ce 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[11cf 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[11d0 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[11d1 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[11d2 10-14 19:01:22.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d3 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d4 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11d5 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[11d6 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d7 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d8 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d9 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[11da 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +[11db 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[11dc 10-14 19:01:22.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11dd 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11de 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11df 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[11e0 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e1 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e2 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e3 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e4 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e5 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11e6 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[11e7 10-14 19:01:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11e8 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[11e9 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[11ea 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11eb 10-14 19:01:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[11ec 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[11ed 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ee 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11ef 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11f0 10-14 19:01:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11f1 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11f2 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11f3 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11f4 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 gate 1602702082280911400 evaluation starts +[11f5 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 signed by 0 principal evaluation starts (used [false]) +[11f6 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 processing identity 0 with bytes of 115a6c0 +[11f7 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 principal matched by identity 0 +[11f8 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +[11f9 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +[11fa 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 principal evaluation succeeds for identity 0 +[11fb 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034700b0 gate 1602702082280911400 evaluation succeeds +[11fc 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11fd 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11fe 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11ff 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1200 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1201 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1202 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1203 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1204 10-14 19:01:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1206 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1205 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1207 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1208 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1209 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[120a 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[120b 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[120c 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[120d 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[120e 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[120f 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1210 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:v\246\3556b\237 \223K\340\361M\r\007H\\\013?#2>\323\372{\346L\234qr" > alive: alive: +[1211 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1212 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1213 10-14 19:01:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1214 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1215 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1216 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1217 10-14 19:01:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1218 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1219 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[121a 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[121b 10-14 19:01:22.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121c 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[121d 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[121e 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[121f 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1220 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +[1221 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +00000040 20 26 08 6d 7c a6 ff | &.m|..| +[1222 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1223 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 04 d7 83 aa 8c 9c 06 42 a2 a1 |0E.!.........B..| +00000010 0e 5c b0 65 e3 ad 26 e5 5f b3 47 d5 f7 6c aa 66 |.\.e..&._.G..l.f| +00000020 7f b7 94 08 1d 02 20 2b d8 c6 2f 5d 02 d5 a3 07 |...... +../]....| +00000030 ca 07 2b 2b a1 b0 ed 1f 3a 39 e7 4d 21 e0 1c c2 |..++....:9.M!...| +00000040 d2 65 73 40 b9 b2 90 |.es@...| +[1224 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1225 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1226 10-14 19:01:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1227 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1228 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1229 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[122a 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[122b 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[122c 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[122d 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[122e 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[122f 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1230 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1231 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1232 10-14 19:01:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1233 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1234 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1235 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1236 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1237 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1238 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1239 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[123a 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[123b 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[123c 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[123d 10-14 19:01:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[123e 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[123f 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1240 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1241 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1242 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1243 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1244 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1245 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1246 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1247 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1248 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1249 10-14 19:01:22.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124a 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[124b 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161017 +[124c 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C3906CA9BB28D98FAE0C7D0C8BC7128C75C3685D3FD5747C81908296EEC08995 +[124d 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[124e 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[124f 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1250 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1251 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1252 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[1254 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1253 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1255 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +[1256 10-14 19:01:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1257 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1258 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1259 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:?6j\017wz\256\037\026=\330\365\212\214\002 [/\254M\226\221be\222\231Kqq\326\322\225}\r\354\324\231\231>\207\371\272\211\364\273G\211\032" > > , Envelope: 166 bytes, Signature: 0 bytes +[125a 10-14 19:01:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[125b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[125c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[125d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[125e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[125f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1260 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +[1261 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +00000040 ba 89 f4 bb 47 89 1a |....G..| +[1262 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1263 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1264 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1265 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1266 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1267 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1268 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1269 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[126a 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[126b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[126c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[126d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[126e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[126f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 gate 1602702082597794900 evaluation starts +[1270 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 signed by 0 principal evaluation starts (used [false]) +[1271 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 processing identity 0 with bytes of 115a6c0 +[1272 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 principal matched by identity 0 +[1273 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 5d b3 61 81 12 ef 78 e9 11 e6 7e 60 9a a7 38 |.].a...x...~`..8| +00000010 3e 3d 8e 91 46 5d 8b 29 02 58 41 2a 8d f5 fb d9 |>=..F].).XA*....| +[1274 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff bb ce 89 d4 65 80 a0 37 e9 f8 |0E.!......e..7..| +00000010 14 fa 95 3c 8a 24 15 12 09 cf 54 89 a5 66 0f 54 |...<.$....T..f.T| +00000020 2f 35 d1 0f 84 02 20 11 2c 32 b7 6c 4b 28 29 48 |/5.... .,2.lK()H| +00000030 05 f0 1a 9a 86 77 d2 5c 60 91 b8 1c 72 5b a7 37 |.....w.\`...r[.7| +00000040 09 2f 2a e3 5a a3 81 |./*.Z..| +[1275 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 principal evaluation succeeds for identity 0 +[1276 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00350a860 gate 1602702082597794900 evaluation succeeds +[1277 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1278 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1279 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[127a 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[127b 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[127c 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[127d 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[127e 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +[127f 10-14 19:01:22.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +00000040 20 26 08 6d 7c a6 ff | &.m|..| +[1280 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1281 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1282 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1283 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1284 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1285 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1286 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1287 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1288 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1289 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[128a 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[128b 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[128c 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 gate 1602702082601608100 evaluation starts +[128d 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 signed by 0 principal evaluation starts (used [false]) +[128e 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 processing identity 0 with bytes of 115a6c0 +[128f 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 principal matched by identity 0 +[1290 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 29 42 53 3c c5 9e 14 96 51 3d bb 12 e5 98 08 e9 |)BS<....Q=......| +00000010 ba 38 c8 28 1d 6d 4c 51 55 4a 22 35 ab 84 67 b9 |.8.(.mLQUJ"5..g.| +[1291 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 b3 ed 95 b9 85 0e d1 5b 8a 6a 90 |0D. @.......[.j.| +00000010 6b 8f 1e ee 9e 97 b4 2e b0 4e da 7a bd cb 1d 07 |k........N.z....| +00000020 a9 dc 20 fd 02 20 6a aa 3e 76 a6 ed 36 62 9f 20 |.. .. j.>v..6b. | +00000030 93 4b e0 f1 4d 0d 07 48 5c 0b 3f 23 32 3e d3 fa |.K..M..H\.?#2>..| +00000040 7b e6 4c 9c 71 72 |{.L.qr| +[1292 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 principal evaluation succeeds for identity 0 +[1293 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035405f0 gate 1602702082601608100 evaluation succeeds +[1294 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1295 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1296 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1297 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1298 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1299 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[129a 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[129b 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +[129c 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +00000040 ba 89 f4 bb 47 89 1a |....G..| +[129d 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[129e 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[129f 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a0 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[12a1 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 f7 30 92 6c 8b 97 19 86 3d b3 2b 70 13 f1 e1 |V.0.l....=.+p...| +00000010 e3 37 57 1f b7 c8 ba 11 28 24 ec d6 cb 93 7b 5f |.7W.....($....{_| +[12a2 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 74 02 6a dd 54 a0 31 ad 0e 09 |0E.!..t.j.T.1...| +00000010 33 ca 18 91 c8 6b b9 1d 98 3d 36 84 6d dc 7d 17 |3....k...=6.m.}.| +00000020 a4 d2 8b 38 ab 02 20 50 6a 59 1f f3 4f 1e 55 f3 |...8.. PjY..O.U.| +00000030 bb a4 00 ed 1e 0a 15 a9 24 6a c8 ff 70 32 c9 62 |........$j..p2.b| +00000040 20 26 08 6d 7c a6 ff | &.m|..| +[12a4 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12a3 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a5 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a6 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[12a7 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a8 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[12a9 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[12aa 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 90 6c a9 bb 28 d9 8f ae 0c 7d 0c 8b c7 12 8c |..l..(....}.....| +00000010 75 c3 68 5d 3f d5 74 7c 81 90 82 96 ee c0 89 95 |u.h]?.t|........| +[12ab 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 d3 34 72 c9 2d a9 85 51 e5 66 |0E.!...4r.-..Q.f| +00000010 69 fa 75 c4 25 0e 3e 3f 36 6a 0f 77 7a ae 1f 16 |i.u.%.>?6j.wz...| +00000020 3d d8 f5 8a 8c 02 20 5b 2f ac 4d 96 91 62 65 92 |=..... [/.M..be.| +00000030 99 4b 71 71 d6 d2 95 7d 0d ec d4 99 99 3e 87 f9 |.Kqq...}.....>..| +00000040 ba 89 f4 bb 47 89 1a |....G..| +[12ac 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ad 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[12ae 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 1d d9 ab 2a 05 00 cf fc b5 ff |0E.!.....*......| +00000010 f0 b8 3b 53 9c db 85 06 34 6b 9c af 7d d9 49 0d |..;S....4k..}.I.| +00000020 fe ed b0 31 26 02 20 33 fd a0 4c e6 1c 19 21 b7 |...1&. 3..L...!.| +00000030 f0 b7 7a 2a 1c d9 e6 52 75 54 91 8c 81 3a 6f 64 |..z*...RuT...:od| +00000040 08 10 5c fd 1d f2 1a |..\....| +[12af 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[12b0 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[12b1 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b2 10-14 19:01:22.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b3 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b4 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12b5 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b6 10-14 19:01:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b7 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12b8 10-14 19:01:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b9 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12ba 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[12bb 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bc 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bd 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12be 10-14 19:01:22.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12bf 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[12c0 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 f6 3f 51 52 2c 49 9d 7d 9a 11 9d 72 2c b1 5b |6.?QR,I.}...r,.[| +00000010 77 86 5e 54 83 97 b6 ac 53 07 9c 8a 0c 87 12 0a |w.^T....S.......| +[12c1 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed d2 1a 20 ef 75 c9 cc 82 00 af |0E.!.... .u.....| +00000010 27 e4 49 45 8d 62 da e9 61 1f de 76 fb e5 e4 25 |'.IE.b..a..v...%| +00000020 15 6f a6 c3 e3 02 20 1a 89 dd 03 07 1c ea ee e7 |.o.... .........| +00000030 16 e6 32 7e 48 af 94 d7 f3 ad 0a 07 18 44 99 bf |..2~H........D..| +00000040 63 be dd 67 6b 09 26 |c..gk.&| +[12c2 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12c3 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c4 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c5 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[12c6 10-14 19:01:23.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[12c7 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12c8 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12c9 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ca 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12cb 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[12cc 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12cd 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12ce 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12cf 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12d0 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12d1 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12d2 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12d3 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 gate 1602702085143275800 evaluation starts +[12d4 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 signed by 0 principal evaluation starts (used [false]) +[12d5 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 processing identity 0 with bytes of 115a6c0 +[12d6 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 principal matched by identity 0 +[12d7 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff 8b df ea 54 a6 bb 22 09 a9 13 89 fd e0 61 06 |....T.."......a.| +00000010 c4 c2 e7 26 61 00 c4 f8 48 8d 3c 11 6d d7 d2 18 |...&a...H.<.m...| +[12d8 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 45 05 fc ae 4f cc a6 43 49 71 |0E.!..E...O..CIq| +00000010 9e f8 de 5c 99 b4 5f c7 df de cd 44 6c 34 c2 16 |...\.._....Dl4..| +00000020 2b 26 c7 76 40 02 20 7e f2 87 1a 5a ae ae f3 77 |+&.v@. ~...Z...w| +00000030 34 37 75 02 a4 97 1a 64 6a d3 6e 98 28 a6 63 9e |47u....dj.n.(.c.| +00000040 04 62 ab 88 93 cf 2f |.b..../| +[12d9 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 principal evaluation succeeds for identity 0 +[12da 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003589080 gate 1602702085143275800 evaluation succeeds +[12db 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12dc 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[12dd 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12de 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[12df 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e0 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[12e1 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[12e2 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[12e3 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[12e4 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12e5 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12e6 10-14 19:01:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12e7 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e8 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e9 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ea 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12eb 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ec 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ed 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ee 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12ef 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f0 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f1 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f2 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f3 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12f4 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f5 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12f6 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12f7 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12f9 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f8 10-14 19:01:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12fa 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12fb 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12fc 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12fd 10-14 19:01:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12fe 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12ff 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1300 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1301 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1302 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1303 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1304 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1305 10-14 19:01:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1306 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1307 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1308 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1309 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[130a 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 gate 1602702085271569900 evaluation starts +[130b 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 signed by 0 principal evaluation starts (used [false]) +[130c 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 processing identity 0 with bytes of 115a6c0 +[130d 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 principal matched by identity 0 +[130e 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 f1 d8 72 21 84 36 61 f6 c6 dc fa 5a 79 2c 28 |...r!.6a....Zy,(| +00000010 d8 99 9f 1a b8 00 43 dc 38 0b b6 02 7e 29 9f 22 |......C.8...~)."| +[1310 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 a2 31 32 4f 87 91 77 69 93 b4 98 |0D. $.12O..wi...| +00000010 f8 74 c2 94 cc 93 7c de 04 76 e8 7e 06 df 3a 8a |.t....|..v.~..:.| +00000020 28 d1 e0 16 02 20 50 bf 9c 48 7b e9 34 cb 5a e7 |(.... P..H{.4.Z.| +00000030 19 f8 8f 6e 47 81 cc b6 1a be 3d 2b a4 c1 1d ef |...nG.....=+....| +00000040 50 a8 79 c5 bd 1d |P.y...| +[130f 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1311 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1312 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 principal evaluation succeeds for identity 0 +[1313 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2f50 gate 1602702085271569900 evaluation succeeds +[1314 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1315 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1316 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1317 10-14 19:01:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1318 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1319 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[131a 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[131b 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[131c 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[131d 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131e 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131f 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1320 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1321 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1322 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1323 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1325 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1326 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1327 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1324 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1328 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1329 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132a 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132b 10-14 19:01:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132c 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132d 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132e 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[132f 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1330 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1331 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1332 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1333 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1334 10-14 19:01:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1335 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1336 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1337 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1338 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1339 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 93 01 12 a9 a0 f9 b7 66 2d 1a c5 72 5c 81 c5 |........f-..r\..| +00000010 89 a3 8e af 23 6d 2c 59 97 c6 dd ab d3 ca 57 ee |....#m,Y......W.| +[133a 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a ea eb f7 65 a5 be a5 71 d5 09 c1 |0D. ....e...q...| +00000010 b7 10 6f 3b ce 9b f4 76 1f fc d1 6b 72 c7 c3 3c |..o;...v...kr..<| +00000020 c8 e7 a0 82 02 20 19 15 c0 19 84 79 47 95 42 e2 |..... .....yG.B.| +00000030 bb ee 7a 25 ff 21 c5 ab 0a a4 bb 32 64 56 91 64 |..z%.!.....2dV.d| +00000040 a6 d6 72 5d 60 28 |..r]`(| +[133b 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[133c 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[133d 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[133e 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[133f 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1340 10-14 19:01:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1341 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1342 10-14 19:01:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1343 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1344 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1345 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1346 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1347 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1348 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1349 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[134a 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[134b 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[134c 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[134d 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[134e 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[134f 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1350 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1351 10-14 19:01:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1352 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1353 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1354 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1355 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1356 10-14 19:01:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1357 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1358 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161018 +[1359 10-14 19:01:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 670312738DA0EC50839E84E9F9B9F50FEBE3684C5971F04D3F19A087839F6076 +[135a 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[135b 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[135c 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[135d 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[135e 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[135f 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1360 10-14 19:01:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1361 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1362 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1363 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1364 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1365 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1366 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1367 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1368 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1369 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[136a 10-14 19:01:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[136b 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136c 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136d 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[136e 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[136f 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1370 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1371 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1372 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1373 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1374 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1375 10-14 19:01:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1376 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1377 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1378 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1379 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[137a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[137b 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[137c 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[137d 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[137e 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[137f 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1380 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1381 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1382 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1383 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 gate 1602702085933995000 evaluation starts +[1384 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 signed by 0 principal evaluation starts (used [false]) +[1385 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 processing identity 0 with bytes of 115a6c0 +[1386 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 principal matched by identity 0 +[1387 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1388 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1389 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 principal evaluation succeeds for identity 0 +[138a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003659580 gate 1602702085933995000 evaluation succeeds +[138b 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[138c 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[138d 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[138e 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[138f 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1390 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1391 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1392 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1393 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1394 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1395 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1396 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1397 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 gate 1602702085938375900 evaluation starts +[1398 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 signed by 0 principal evaluation starts (used [false]) +[139a 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[139b 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1399 10-14 19:01:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 processing identity 0 with bytes of 115a6c0 +[139c 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[139e 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[139f 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13a0 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[139d 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 principal matched by identity 0 +[13a2 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[13a1 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[13a3 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a4 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[13a5 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 principal evaluation succeeds for identity 0 +[13a6 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003682780 gate 1602702085938375900 evaluation succeeds +[13a7 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13a8 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13a9 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13aa 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13ab 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13ac 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[13ad 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ae 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[13af 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[13b0 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13b1 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13b2 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13b3 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13b4 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13b5 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13b6 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13b7 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13b8 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 gate 1602702085949070300 evaluation starts +[13b9 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 signed by 0 principal evaluation starts (used [false]) +[13ba 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 processing identity 0 with bytes of 115a6c0 +[13bb 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 principal matched by identity 0 +[13bc 10-14 19:01:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[13bd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[13be 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 principal evaluation succeeds for identity 0 +[13bf 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c82c0 gate 1602702085949070300 evaluation succeeds +[13c0 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13c1 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13c2 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13c3 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13c4 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c5 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13c6 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13c7 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13c8 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13c9 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13ca 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13cb 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13cc 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 gate 1602702085955234100 evaluation starts +[13cd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 signed by 0 principal evaluation starts (used [false]) +[13ce 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 processing identity 0 with bytes of 115a6c0 +[13cf 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 principal matched by identity 0 +[13d0 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[13d1 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[13d2 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 principal evaluation succeeds for identity 0 +[13d3 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c94c0 gate 1602702085955234100 evaluation succeeds +[13d4 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13d5 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13d6 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13d7 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13d8 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[13d9 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[13da 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13db 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[13dc 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13dd 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[13de 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[13df 10-14 19:01:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[13e0 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[13e1 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e2 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13e3 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13e4 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13e5 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13e6 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13e7 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13e8 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13e9 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 gate 1602702085962695200 evaluation starts +[13ea 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 signed by 0 principal evaluation starts (used [false]) +[13eb 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 processing identity 0 with bytes of 115a6c0 +[13ec 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 principal matched by identity 0 +[13ed 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[13ee 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[13ef 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 principal evaluation succeeds for identity 0 +[13f0 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f5de0 gate 1602702085962695200 evaluation succeeds +[13f1 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13f2 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13f3 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13f4 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13f5 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13f6 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13f7 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13f8 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13f9 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13fa 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13fb 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13fc 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13fd 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 gate 1602702085968519000 evaluation starts +[13fe 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 signed by 0 principal evaluation starts (used [false]) +[13ff 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 processing identity 0 with bytes of 115a6c0 +[1400 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 principal matched by identity 0 +[1401 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1402 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1403 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 principal evaluation succeeds for identity 0 +[1404 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003744fe0 gate 1602702085968519000 evaluation succeeds +[1405 10-14 19:01:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1406 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1407 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1408 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1409 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[140a 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[140b 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[140c 10-14 19:01:25.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[140d 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[140e 10-14 19:01:26.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[140f 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1410 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1411 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1412 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1413 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1414 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1415 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1416 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1417 10-14 19:01:26.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1418 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1419 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[141a 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[141b 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[141c 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[141d 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[141e 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[141f 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1420 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1421 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1422 10-14 19:01:26.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1423 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1424 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 gate 1602702086140391200 evaluation starts +[1425 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 signed by 0 principal evaluation starts (used [false]) +[1426 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 processing identity 0 with bytes of 115a6c0 +[1427 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 principal matched by identity 0 +[1428 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +[1429 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +00000040 2f 39 53 01 52 be 16 |/9S.R..| +[142a 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 principal evaluation succeeds for identity 0 +[142b 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c07a0 gate 1602702086140391200 evaluation succeeds +[142c 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[142d 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[142e 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[142f 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1430 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1431 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1432 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1433 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1434 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1435 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1436 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1437 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1438 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1439 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[143a 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[143b 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[143c 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[143d 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[143e 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[143f 10-14 19:01:26.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1440 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1441 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1442 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1443 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1444 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1445 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1446 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1447 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1448 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1449 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[144a 10-14 19:01:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[144b 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[144c 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[144d 10-14 19:01:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[144e 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[144f 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1450 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1451 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1452 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1453 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1454 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1455 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1456 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1457 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 gate 1602702086279160500 evaluation starts +[1458 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 signed by 0 principal evaluation starts (used [false]) +[1459 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 processing identity 0 with bytes of 115a6c0 +[145a 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 principal matched by identity 0 +[145b 10-14 19:01:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +[145c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +00000040 85 3c 63 67 76 9c |. DEBU 0xc003691a70 principal evaluation succeeds for identity 0 +[145e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003691a70 gate 1602702086279160500 evaluation succeeds +[145f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1460 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1461 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1462 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1463 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1464 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1465 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1466 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1467 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1468 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1469 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[146a 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[146b 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[146c 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146d 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146e 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146f 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1470 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1471 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1472 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1473 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1474 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1475 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1476 10-14 19:01:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1477 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1478 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1479 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[147a 10-14 19:01:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[147b 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[147c 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[147d 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[147e 10-14 19:01:26.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[147f 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1480 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1481 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1482 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1483 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +[1484 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +00000040 c1 b5 90 3d 01 a1 a6 |...=...| +[1485 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1486 10-14 19:01:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 07 a2 17 c8 fc 95 ba 0a 05 8b |0E.!............| +00000010 8d 7c 70 c7 50 52 b8 36 42 45 33 0c 0c c4 e2 aa |.|p.PR.6BE3.....| +00000020 fe 3a 0c f0 2c 02 20 09 67 51 d3 dd 24 6c bb c2 |.:..,. .gQ..$l..| +00000030 12 fb 00 b4 06 cc 9f 12 a9 ec 89 e0 69 07 b7 52 |............i..R| +00000040 e2 62 ea 11 8e 79 ab |.b...y.| +[1487 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1488 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1489 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[148a 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[148b 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[148c 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148d 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148e 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148f 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1490 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1491 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1492 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1493 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1494 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1495 10-14 19:01:26.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1496 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1497 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1498 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1499 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[149a 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[149b 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[149c 10-14 19:01:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[149e 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[149d 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[149f 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a0 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[14a1 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a2 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[14a3 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[14a4 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a5 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14a6 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14a7 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14a8 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14a9 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14aa 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14ab 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[14ac 10-14 19:01:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ad 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14ae 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161019 +[14af 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84BDE041940AF8188368C6714508539F297B9D13AA211D89078599417FFBAA17 +[14b0 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14b1 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[14b2 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[14b3 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[14b4 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b5 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[14b6 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[14b7 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14b8 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b9 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[14ba 10-14 19:01:26.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +[14bb 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14bc 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\005\353gx\327W\243\370\336\310]\302Q\375\002 \"\341\336J\273\367F2\005\203\002\020\024\300g\254\347\216X\216/V\033QR\232\340\313\225nPE" > > , Envelope: 165 bytes, Signature: 0 bytes +[14bd 10-14 19:01:26.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14be 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14bf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14c0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14c1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[14c2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14c3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[14c4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14c5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14c6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14c7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14c8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14c9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14ca 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14cb 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 gate 1602702086608021700 evaluation starts +[14cc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 signed by 0 principal evaluation starts (used [false]) +[14cd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 processing identity 0 with bytes of 115a6c0 +[14ce 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 principal matched by identity 0 +[14cf 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 35 07 e0 49 fc 5e 10 a2 4e a4 28 c2 f1 f3 cc |.5..I.^..N.(....| +00000010 27 6c d6 51 f0 a1 0d 2c 64 a4 c0 f2 4e 2d 43 4d |'l.Q...,d...N-CM| +[14d0 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 52 e3 5d 25 f4 0a cc e7 8d b3 |0E.!..R.]%......| +00000010 8f 43 eb 68 d8 41 7a b7 70 82 6a 52 31 b4 4c fd |.C.h.Az.p.jR1.L.| +00000020 b4 1d 7f cc 10 02 20 36 ad c6 fb 8e 38 76 14 6b |...... 6....8v.k| +00000030 35 6b 5c 7c c7 17 ff f9 9f e7 e8 4f cc 92 bd 73 |5k\|.......O...s| +00000040 2f 39 53 01 52 be 16 |/9S.R..| +[14d1 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 principal evaluation succeeds for identity 0 +[14d2 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c0850 gate 1602702086608021700 evaluation succeeds +[14d3 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[14d4 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[14d5 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[14d6 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[14d7 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14d8 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d9 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[14da 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +[14db 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +00000040 e0 cb 95 6e 50 45 |...nPE| +[14dc 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[14dd 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[14de 10-14 19:01:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14df 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[14e0 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +[14e1 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +00000040 c1 b5 90 3d 01 a1 a6 |...=...| +[14e2 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[14e3 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e4 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e5 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14e6 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[14e7 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e8 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[14ea 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +[14eb 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +00000040 e0 cb 95 6e 50 45 |...nPE| +[14ec 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[14ed 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 44 4c 76 c0 ac b5 36 0b ad 4b |0E.!..DLv...6..K| +00000010 dc 59 ce cb 01 ae c0 77 77 44 39 48 96 15 7b 54 |.Y.....wwD9H..{T| +00000020 4f 0d d3 58 7a 02 20 0b ea 60 8d 14 0c bb 5b fe |O..Xz. ..`....[.| +00000030 7f f4 6e 7f 39 67 c5 6b f2 1f 18 2a eb cf 3a a2 |..n.9g.k...*..:.| +00000040 40 39 9c 7e 17 2d 7b |@9.~.-{| +[14ee 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[14ef 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[14f0 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f1 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e9 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14f2 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14f3 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[14f4 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[14f5 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f6 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14f7 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14f8 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14f9 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14fa 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14fb 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14fc 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 gate 1602702086616933200 evaluation starts +[14fd 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 signed by 0 principal evaluation starts (used [false]) +[14fe 10-14 19:01:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 processing identity 0 with bytes of 115a6c0 +[14ff 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 principal matched by identity 0 +[1500 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 48 b1 01 58 b3 e7 85 5f a6 0a 3c db c1 6f 9b |.H..X..._..<..o.| +00000010 f4 27 d1 09 b2 4d a4 0f b2 cf 43 62 30 c4 dd 9c |.'...M....Cb0...| +[1501 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d e7 fc d1 e4 e5 ce 6e 8b 16 d2 09 |0D. =......n....| +00000010 d1 ac 43 89 c8 77 a9 1b e6 bd 9a 2e bf b4 a7 0c |..C..w..........| +00000020 1a 57 3f f0 02 20 78 6d d0 f4 d2 b3 86 ab 39 27 |.W?.. xm......9'| +00000030 e8 a8 6a 74 0b 99 7e 5e b0 eb 86 3f 78 46 04 13 |..jt..~^...?xF..| +00000040 85 3c 63 67 76 9c |. DEBU 0xc003908240 principal evaluation succeeds for identity 0 +[1503 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003908240 gate 1602702086616933200 evaluation succeeds +[1504 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1505 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1506 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1507 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1508 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1509 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150a 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[150b 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4a 13 f6 ef ba 1a 85 b8 cb 42 e2 d8 1d 8c cf |.J........B.....| +00000010 e9 ab a7 24 e0 e1 c8 f4 a7 ed 5d a4 4b a0 52 16 |...$......].K.R.| +[150c 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 63 d8 b1 d8 a1 5d 07 e4 d5 9d |0E.!..c....]....| +00000010 e9 67 b3 a5 f9 29 78 42 17 d5 bd a6 bd 34 1f 3c |.g...)xB.....4.<| +00000020 51 4a 59 60 81 02 20 1b e0 e3 7b 4b 22 49 40 4e |QJY`.. ...{K"I@N| +00000030 5c 53 60 ee 24 21 e0 98 90 db 6d ff 0a c0 10 e3 |\S`.$!....m.....| +00000040 c1 b5 90 3d 01 a1 a6 |...=...| +[150d 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[150e 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150f 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1510 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 bd e0 41 94 0a f8 18 83 68 c6 71 45 08 53 9f |...A.....h.qE.S.| +00000010 29 7b 9d 13 aa 21 1d 89 07 85 99 41 7f fb aa 17 |){...!.....A....| +[1511 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 0e 49 a2 a7 bc b2 c5 0a f2 45 17 |0D. ..I.......E.| +00000010 b1 15 2e 48 24 3e 05 eb 67 78 d7 57 a3 f8 de c8 |...H$>..gx.W....| +00000020 5d c2 51 fd 02 20 22 e1 de 4a bb f7 46 32 05 83 |].Q.. "..J..F2..| +00000030 02 10 14 c0 67 ac e7 8e 58 8e 2f 56 1b 51 52 9a |....g...X./V.QR.| +00000040 e0 cb 95 6e 50 45 |...nPE| +[1512 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1513 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1514 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1515 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1516 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1517 10-14 19:01:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1518 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1519 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[151a 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[151b 10-14 19:01:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[151c 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[151d 10-14 19:01:26.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[151e 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[151f 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1520 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1521 10-14 19:01:26.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1522 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[1523 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e b2 a9 18 cf 33 ef fb 40 3f 07 3a cc 21 cb 0a |n....3..@?.:.!..| +00000010 37 cf c8 16 37 ef 14 0c 3a 90 e0 a6 8b a0 8c 40 |7...7...:......@| +[1524 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 04 10 41 77 86 6c d0 af 88 53 |0E.!....Aw.l...S| +00000010 15 b0 9d d6 0d ff f3 7d ab 12 15 59 36 45 5b 00 |.......}...Y6E[.| +00000020 ce 0b 76 9c 9b 02 20 38 68 d6 95 f1 af fb 49 b7 |..v... 8h.....I.| +00000030 db 77 62 57 54 89 4b 0d ec d2 22 d1 6d 0b a3 2c |.wbWT.K...".m..,| +00000040 3b 5d 60 e2 4a 30 cb |;]`.J0.| +[1525 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1526 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1527 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1528 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[1529 10-14 19:01:28.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[152a 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[152b 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[152c 10-14 19:01:28.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[152d 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[152e 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[152f 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1530 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1531 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1533 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1532 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1534 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1535 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1536 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1537 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1538 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1539 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[153a 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[153b 10-14 19:01:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[153c 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[153d 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[153e 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[153f 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1540 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1541 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1542 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1543 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1544 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1545 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1546 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 gate 1602702089933585000 evaluation starts +[1547 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 signed by 0 principal evaluation starts (used [false]) +[1548 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 processing identity 0 with bytes of 115a6c0 +[1549 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 principal matched by identity 0 +[154a 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[154b 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[154c 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 principal evaluation succeeds for identity 0 +[154d 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003941f40 gate 1602702089933585000 evaluation succeeds +[154e 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[154f 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1550 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1551 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1552 10-14 19:01:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1553 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1554 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1555 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1556 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1557 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1558 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1559 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[155a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 gate 1602702089941081500 evaluation starts +[155b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 signed by 0 principal evaluation starts (used [false]) +[155c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[155d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 processing identity 0 with bytes of 115a6c0 +[155e 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[155f 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 principal matched by identity 0 +[1560 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1561 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1563 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1562 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1564 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1565 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1566 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 principal evaluation succeeds for identity 0 +[1567 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003975140 gate 1602702089941081500 evaluation succeeds +[1569 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[156a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[156b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[156c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[156d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1568 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[156e 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[156f 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1570 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1571 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1572 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1573 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1574 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1575 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1576 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1577 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1578 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1579 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[157a 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[157b 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 gate 1602702089949694100 evaluation starts +[157c 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 signed by 0 principal evaluation starts (used [false]) +[157d 10-14 19:01:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 processing identity 0 with bytes of 115a6c0 +[157e 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 principal matched by identity 0 +[157f 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1580 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1581 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 principal evaluation succeeds for identity 0 +[1582 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039acb00 gate 1602702089949694100 evaluation succeeds +[1583 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1584 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1585 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1586 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1587 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1588 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1589 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[158a 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[158b 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[158c 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[158d 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[158e 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[158f 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 gate 1602702089956005000 evaluation starts +[1590 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 signed by 0 principal evaluation starts (used [false]) +[1591 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 processing identity 0 with bytes of 115a6c0 +[1592 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 principal matched by identity 0 +[1593 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1594 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1595 10-14 19:01:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 principal evaluation succeeds for identity 0 +[1596 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039add00 gate 1602702089956005000 evaluation succeeds +[1597 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1598 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1599 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[159a 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[159b 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[159c 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[159d 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[159e 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[159f 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[15a0 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[15a1 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[15a2 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[15a3 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15a4 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15a5 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[15a6 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[15a7 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[15a8 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[15a9 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[15aa 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[15ab 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 gate 1602702089968539300 evaluation starts +[15ac 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 signed by 0 principal evaluation starts (used [false]) +[15ad 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 processing identity 0 with bytes of 115a6c0 +[15ae 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 principal matched by identity 0 +[15af 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[15b0 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[15b1 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 principal evaluation succeeds for identity 0 +[15b2 10-14 19:01:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fe570 gate 1602702089968539300 evaluation succeeds +[15b3 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15b4 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15b5 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15b6 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15b7 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b8 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b9 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[15ba 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[15bb 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[15bc 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[15bd 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[15be 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[15bf 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 gate 1602702089972232500 evaluation starts +[15c0 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 signed by 0 principal evaluation starts (used [false]) +[15c1 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 processing identity 0 with bytes of 115a6c0 +[15c2 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 principal matched by identity 0 +[15c3 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[15c4 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[15c5 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 principal evaluation succeeds for identity 0 +[15c6 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ff770 gate 1602702089972232500 evaluation succeeds +[15c7 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15c8 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15c9 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15ca 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15cb 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15cc 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[15cd 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[15ce 10-14 19:01:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15cf 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[15d0 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[15d1 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[15d2 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d3 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d4 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d5 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d6 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d7 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15d8 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[15d9 10-14 19:01:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15da 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15db 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15dc 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15dd 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15de 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[15df 10-14 19:01:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e0 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[15e1 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[15e2 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[15e3 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[15e4 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[15e5 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[15e6 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 gate 1602702090143690800 evaluation starts +[15e7 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 signed by 0 principal evaluation starts (used [false]) +[15e8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 processing identity 0 with bytes of 115a6c0 +[15e9 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 principal matched by identity 0 +[15ea 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd f5 a5 94 0a 89 9c 64 ac 36 0b 2d 1b e8 35 0e |.......d.6.-..5.| +00000010 82 40 32 94 8f 80 0d 72 36 a2 d6 0f f5 3a b9 a7 |.@2....r6....:..| +[15eb 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 0e b9 2c e6 e4 90 4e 8b 28 30 |0E.!....,...N.(0| +00000010 60 2a 7f 6e 30 93 84 66 5c bb 56 92 6e 11 fc 2c |`*.n0..f\.V.n..,| +00000020 99 18 84 ce 13 02 20 35 c5 b8 71 99 80 08 6b 88 |...... 5..q...k.| +00000030 21 2f 86 88 6a e0 55 51 ff 5a cc 9e 62 f8 45 67 |!/..j.UQ.Z..b.Eg| +00000040 b5 1e 82 8f 61 62 8f |....ab.| +[15ec 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 principal evaluation succeeds for identity 0 +[15ed 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20f30 gate 1602702090143690800 evaluation succeeds +[15ee 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15ef 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15f0 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15f1 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15f2 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15f3 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[15f4 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15f5 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15f6 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[15f7 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f8 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f9 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15fa 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15fb 10-14 19:01:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15fc 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15fd 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15fe 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ff 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1600 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1601 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1602 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1603 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1604 10-14 19:01:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1605 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1606 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1607 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1608 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1609 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[160a 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160b 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[160c 10-14 19:01:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[160d 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[160e 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[160f 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1610 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1611 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1612 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1613 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 gate 1602702090174061900 evaluation starts +[1614 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 signed by 0 principal evaluation starts (used [false]) +[1615 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 processing identity 0 with bytes of 115a6c0 +[1616 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 principal matched by identity 0 +[1617 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +[1618 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +00000040 26 28 d0 1f 02 fb 98 |&(.....| +[1619 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 principal evaluation succeeds for identity 0 +[161a 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a31330 gate 1602702090174061900 evaluation succeeds +[161b 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[161c 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[161d 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[161e 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[161f 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1620 10-14 19:01:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1621 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1622 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1623 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1624 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1625 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1626 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1627 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1628 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1629 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[162a 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[162b 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162c 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162d 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162e 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[162f 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1630 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1631 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1632 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1633 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1634 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1635 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1636 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1637 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1638 10-14 19:01:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1639 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[163a 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[163b 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[163c 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163d 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163e 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163f 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1640 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1641 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1642 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1643 10-14 19:01:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1644 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1645 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1646 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1647 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1648 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1649 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[164a 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[164b 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[164c 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[164d 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[164e 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[164f 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1650 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 gate 1602702090278347900 evaluation starts +[1651 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 signed by 0 principal evaluation starts (used [false]) +[1652 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 processing identity 0 with bytes of 115a6c0 +[1653 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 principal matched by identity 0 +[1654 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 9a 36 2e 85 5c f6 d9 61 33 24 52 4c f0 32 d7 |..6..\..a3$RL.2.| +00000010 1a 60 a6 aa f7 14 f7 00 ce eb f7 c0 43 c0 98 70 |.`..........C..p| +[1655 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 b0 e2 a1 e5 d1 03 49 a5 a3 cb 1e |0D. &......I....| +00000010 4b e0 e8 86 89 e7 b6 ed 6d 1a 3c 70 a3 20 c7 f1 |K.......m. DEBU 0xc003a8d6f0 principal evaluation succeeds for identity 0 +[1657 10-14 19:01:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8d6f0 gate 1602702090278347900 evaluation succeeds +[1658 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1659 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[165b 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[165c 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[165a 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[165e 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[165f 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[165d 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1660 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1661 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1662 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1663 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1664 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1665 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1666 10-14 19:01:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1667 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1668 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1669 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[166a 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166b 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166c 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[166d 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[166e 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[166f 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1671 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1672 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1673 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1674 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1675 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1670 10-14 19:01:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1676 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1678 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1679 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1677 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[167a 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[167b 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[167c 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[167d 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[167e 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[167f 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1680 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1681 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1682 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1683 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1684 10-14 19:01:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1685 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1686 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1687 10-14 19:01:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 gate 1602702090318277900 evaluation starts +[1688 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 signed by 0 principal evaluation starts (used [false]) +[1689 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 processing identity 0 with bytes of 115a6c0 +[168a 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 principal matched by identity 0 +[168b 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +[168c 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +00000040 69 89 86 06 4d ff |i...M.| +[168d 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 principal evaluation succeeds for identity 0 +[168e 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b3d110 gate 1602702090318277900 evaluation succeeds +[168f 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1690 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1691 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1692 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1693 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1694 10-14 19:01:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1695 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1696 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1697 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1698 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1699 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[169a 10-14 19:01:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[169b 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[169c 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[169d 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[169e 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[169f 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[16a0 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[16a1 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a2 10-14 19:01:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16a3 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a4 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a5 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16a6 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16a7 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[16a8 10-14 19:01:30.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a9 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16aa 10-14 19:01:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ab 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16ac 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16ad 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[16ae 10-14 19:01:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16af 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16b0 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16b1 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16b2 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[16b3 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 ef 8b 78 10 4b 6b 46 c8 0b 7e 24 6b c4 92 4f |...x.KkF..~$k..O| +00000010 ce 4f 94 3d c1 3c f8 97 d5 f7 a2 d7 cf f2 26 dc |.O.=.<........&.| +[16b4 10-14 19:01:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 1f 75 77 45 e6 a6 05 a0 00 5d 94 |0D. #.uwE.....].| +00000010 a3 56 5a ea 78 70 43 d3 f4 dd 04 ef ea 80 87 45 |.VZ.xpC........E| +00000020 b6 d4 61 e6 02 20 1b f9 e7 95 77 c8 15 bd 43 52 |..a.. ....w...CR| +00000030 03 4e d1 97 3c 32 b9 a4 3d 88 b1 a7 74 d2 d3 fe |.N..<2..=...t...| +00000040 a7 06 57 28 51 0c |..W(Q.| +[16b5 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16b6 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[16b7 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[16b8 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[16b9 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[16ba 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16bb 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16bc 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16bd 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[16be 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[16bf 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[16c0 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +[16c1 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +00000040 d6 85 60 02 c6 cb 97 |..`....| +[16c2 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[16c3 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 e9 24 ec 95 ee 6a 72 f5 a6 c6 |0E.!...$...jr...| +00000010 02 64 cb 61 65 1d 93 d0 1b df ff 11 d5 9e 52 00 |.d.ae.........R.| +00000020 2f bf c3 25 cf 02 20 22 ab 4d c7 3f 6a 60 56 9c |/..%.. ".M.?j`V.| +00000030 90 c8 52 ec 05 cf 94 6a af f6 9e 24 fc 75 29 e1 |..R....j...$.u).| +00000040 b4 ca 6a 6f fb 21 2a |..jo.!*| +[16c4 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[16c5 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[16c6 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[16c7 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[16c8 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[16c9 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ca 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16cb 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16cc 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[16cd 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ce 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16cf 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[16d0 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[16d1 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[16d2 10-14 19:01:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16d3 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d4 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d5 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d6 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[16d7 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d8 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[16d9 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16da 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16db 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16dc 10-14 19:01:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16dd 10-14 19:01:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16de 10-14 19:01:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16df 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16e0 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16e1 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e2 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e3 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16e4 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16e5 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e6 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[16e7 10-14 19:01:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16e8 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[16e9 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[16ea 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[16eb 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[16ec 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[16ed 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[16ee 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[16ef 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f0 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16f1 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f2 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[16f3 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f4 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[16f5 10-14 19:01:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[16f6 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f7 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[16f8 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[16f9 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[16fa 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16fb 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[16fc 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[16fd 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[16fe 10-14 19:01:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16ff 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1700 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101A +[1701 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B108B4C839D3C53F0EC923ADE42BCC48BD2CE843826ED19BC71E48B18A96E02A +[1702 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1703 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1704 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1705 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1706 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1707 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101B +[1708 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FAD4DD0C43D359566A73985AD3AA0C5E46E734CC958E6E0420679248075370AF +[1709 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[170a 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[170b 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[170c 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[170d 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[170e 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[170f 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1710 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1711 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[1712 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1713 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1715 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1716 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +[1718 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1717 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1719 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[171a 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[171b 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[171c 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[171d 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[171e 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1714 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\2710t\367e\365xu\215R;\rP\232\312<\355\204)\206\324\005\215\3420r\275G\375" > > , Envelope: 166 bytes, Signature: 0 bytes +[171f 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1720 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1721 10-14 19:01:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1722 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1723 10-14 19:01:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1724 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1725 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1726 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1727 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1728 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +[1729 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[172a 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[172b 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +00000040 8d e2 30 72 bd 47 fd |..0r.G.| +[172c 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[172d 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 28 97 f0 36 6e 0e a8 34 07 1a |0E.!..(..6n..4..| +00000010 a7 a2 f0 1d 8a 51 ed 86 f0 f6 87 84 21 0e 99 05 |.....Q......!...| +00000020 7b e9 9e 1e 05 02 20 18 16 95 b2 41 ca 6d a2 6b |{..... ....A.m.k| +00000030 2e e6 65 f9 c3 42 f0 0e ac b9 15 5e 4b db 30 a8 |..e..B.....^K.0.| +00000040 2e 2e d9 20 2d 88 7f |... -..| +[172e 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[172f 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1730 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1731 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1732 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1733 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1734 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1735 10-14 19:01:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +[1736 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +00000040 8d e2 30 72 bd 47 fd |..0r.G.| +[1737 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1738 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1739 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[173b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[173c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[173d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[173e 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[173f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1740 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1741 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1742 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 gate 1602702090626140500 evaluation starts +[1743 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 signed by 0 principal evaluation starts (used [false]) +[1744 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 processing identity 0 with bytes of 115a6c0 +[1745 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 principal matched by identity 0 +[1746 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 08 a3 a3 1c 1f 46 d3 cb 5e 92 d3 c4 af 46 22 |......F..^....F"| +00000010 32 0a d7 97 81 89 dc 02 6c 48 86 a5 dd d5 3e 06 |2.......lH....>.| +[1747 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e cb a3 e3 77 6b d8 ff ab 28 a1 03 |0D. ~...wk...(..| +00000010 4b a0 66 90 8c fa 22 bc 71 47 23 8c 81 a2 0f 41 |K.f...".qG#....A| +00000020 c6 f2 42 81 02 20 5d 4e c8 7f ce e0 e5 66 58 2c |..B.. ]N.....fX,| +00000030 f4 46 84 c2 6a 49 c1 b5 ca 44 2a 5e 17 51 e6 07 |.F..jI...D*^.Q..| +00000040 69 89 86 06 4d ff |i...M.| +[1748 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1749 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[174a 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 principal evaluation succeeds for identity 0 +[174b 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce7990 gate 1602702090626140500 evaluation succeeds +[174c 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[174d 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[174e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[174f 10-14 19:01:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1750 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1751 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1752 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1753 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1754 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +[1755 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +00000040 d6 85 60 02 c6 cb 97 |..`....| +[1756 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1757 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1758 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1759 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[175a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[175c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[175d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6d cb 82 48 fb b7 50 4e 71 39 71 c1 24 ae 4d 0e |m..H..PNq9q.$.M.| +00000010 14 54 14 d7 2a 2e b3 af 26 d0 99 84 96 be 03 cc |.T..*...&.......| +[175f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da 78 27 96 be c3 e2 71 11 d9 99 |0E.!..x'....q...| +00000010 ef 35 d1 27 97 cf 60 5e 35 99 da 25 23 b0 1f 9a |.5.'..`^5..%#...| +00000020 7f 00 c9 e6 f2 02 20 01 29 23 b9 0c c5 fa e4 e4 |...... .)#......| +00000030 55 20 20 ef e9 d5 88 de 42 3a ec 57 fb a9 52 07 |U .....B:.W..R.| +00000040 d6 85 60 02 c6 cb 97 |..`....| +[1760 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1761 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1762 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1763 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1764 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1765 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1766 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1767 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1768 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1769 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[176a 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[176b 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[176c 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[176d 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 gate 1602702090638488700 evaluation starts +[176e 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 signed by 0 principal evaluation starts (used [false]) +[176f 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 processing identity 0 with bytes of 115a6c0 +[1770 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 principal matched by identity 0 +[1771 10-14 19:01:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c9 4b 84 9e 5e 6f c8 a9 60 2e b8 0a e9 74 ff |X.K..^o..`....t.| +00000010 ee 84 db f5 ab df 7e d6 34 14 50 f3 01 d8 95 91 |......~.4.P.....| +[1772 10-14 19:01:30.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 26 c4 cd 41 09 24 7d 6a 8c d1 |0E.!..&..A.$}j..| +00000010 e9 0a 1e 00 dd 29 94 93 6e 74 c9 92 b4 ca 68 b9 |.....)..nt....h.| +00000020 54 e8 75 d4 ab 02 20 4f 55 36 1e b2 e1 90 34 5a |T.u... OU6....4Z| +00000030 4d 30 24 a8 6f d9 e1 ea fd 46 5f a2 18 d6 bd 9c |M0$.o....F_.....| +00000040 26 28 d0 1f 02 fb 98 |&(.....| +[1773 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 principal evaluation succeeds for identity 0 +[1774 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d07ff0 gate 1602702090638488700 evaluation succeeds +[1775 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1776 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1777 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1778 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1779 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[177a 10-14 19:01:30.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[177b 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[177c 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa d4 dd 0c 43 d3 59 56 6a 73 98 5a d3 aa 0c 5e |....C.YVjs.Z...^| +00000010 46 e7 34 cc 95 8e 6e 04 20 67 92 48 07 53 70 af |F.4...n. g.H.Sp.| +[177d 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f8 b4 c4 6a 22 a3 8f 61 58 2f 7b |0E.!....j"..aX/{| +00000010 0b f5 6c 77 f2 d6 82 8d 62 78 b9 5d f4 38 2c 69 |..lw....bx.].8,i| +00000020 fc 15 03 3f de 02 20 4d 3e 35 b9 30 74 f7 65 f5 |...?.. M>5.0t.e.| +00000030 78 75 8d 52 3b 0d 50 9a ca 3c ed 84 29 86 d4 05 |xu.R;.P..<..)...| +00000040 8d e2 30 72 bd 47 fd |..0r.G.| +[177e 10-14 19:01:30.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[177f 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1780 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1781 10-14 19:01:30.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1782 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1783 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1784 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1785 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1786 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1787 10-14 19:01:30.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1788 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1789 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 c2 4e 93 61 87 9b 8d f7 89 8f 1e 38 65 f3 24 |..N.a.......8e.$| +00000010 3d bb 3f fd fe b6 4f 2a be 2b fe 06 28 da c0 85 |=.?...O*.+..(...| +[178a 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 d1 1f b1 8b d5 1d 00 83 55 92 31 |0D. P........U.1| +00000010 06 c3 14 37 e3 e4 37 a8 0f 26 28 af 4d 97 b5 fb |...7..7..&(.M...| +00000020 d7 ff 6e 87 02 20 47 0c 33 3c 5d 6e 2d 53 a6 81 |..n.. G.3<]n-S..| +00000030 af 3a 5c 7a 68 ad 21 51 a9 b4 c4 91 79 5d 45 13 |.:\zh.!Q....y]E.| +00000040 06 5b 56 b9 8c b5 |.[V...| +[178b 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[178c 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178d 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178e 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[178f 10-14 19:01:33.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[1790 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1791 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1792 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1793 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1794 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1795 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1796 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1797 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1798 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1799 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[179a 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[179c 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[179d 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[179e 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[179b 10-14 19:01:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[179f 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[17a0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[17a1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17a2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17a3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17a4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17a5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17a6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17a7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17a8 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17a9 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 gate 1602702093933031400 evaluation starts +[17aa 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 signed by 0 principal evaluation starts (used [false]) +[17ab 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 processing identity 0 with bytes of 115a6c0 +[17ac 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 principal matched by identity 0 +[17ad 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[17ae 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[17af 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 principal evaluation succeeds for identity 0 +[17b0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d66760 gate 1602702093933031400 evaluation succeeds +[17b1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17b2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17b3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17b4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17b5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17b6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17b7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17b8 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17b9 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17ba 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17bb 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17bc 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17bd 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 gate 1602702093938388900 evaluation starts +[17be 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 signed by 0 principal evaluation starts (used [false]) +[17bf 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 processing identity 0 with bytes of 115a6c0 +[17c0 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 principal matched by identity 0 +[17c1 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[17c2 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[17c3 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 principal evaluation succeeds for identity 0 +[17c4 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d67960 gate 1602702093938388900 evaluation succeeds +[17c5 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17c6 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17c7 10-14 19:01:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17c8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17c9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17ca 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[17cb 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17cc 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[17cd 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[17ce 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17cf 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d0 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17d2 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17d3 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17d4 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17d5 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17d1 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d6 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17d7 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 gate 1602702093947397300 evaluation starts +[17d9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 signed by 0 principal evaluation starts (used [false]) +[17da 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 processing identity 0 with bytes of 115a6c0 +[17db 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 principal matched by identity 0 +[17dc 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[17de 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17df 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17e0 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[17e1 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[17e2 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17dd 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[17e3 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[17e4 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 principal evaluation succeeds for identity 0 +[17e5 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d486d0 gate 1602702093947397300 evaluation succeeds +[17e6 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17e7 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17e8 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17e9 10-14 19:01:33.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17ea 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17eb 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17ec 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17ed 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17ee 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17ef 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17f0 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17f1 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17f2 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 gate 1602702093954590100 evaluation starts +[17f3 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 signed by 0 principal evaluation starts (used [false]) +[17f4 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 processing identity 0 with bytes of 115a6c0 +[17f5 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 principal matched by identity 0 +[17f6 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[17f7 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[17f8 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 principal evaluation succeeds for identity 0 +[17f9 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da09a0 gate 1602702093954590100 evaluation succeeds +[17fa 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17fb 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17fc 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17fd 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17fe 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[17ff 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1800 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1801 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1802 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1803 10-14 19:01:33.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1804 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1805 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1806 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1807 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1808 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1809 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[180a 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[180b 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[180c 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[180d 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[180e 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 gate 1602702093967345300 evaluation starts +[180f 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 signed by 0 principal evaluation starts (used [false]) +[1810 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 processing identity 0 with bytes of 115a6c0 +[1811 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 principal matched by identity 0 +[1812 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1813 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1814 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 principal evaluation succeeds for identity 0 +[1815 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbf210 gate 1602702093967345300 evaluation succeeds +[1816 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1817 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1818 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1819 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[181a 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181b 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181c 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[181d 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[181e 10-14 19:01:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[181f 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1820 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1821 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1822 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 gate 1602702093970568300 evaluation starts +[1823 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 signed by 0 principal evaluation starts (used [false]) +[1824 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 processing identity 0 with bytes of 115a6c0 +[1825 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 principal matched by identity 0 +[1826 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1827 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1828 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 principal evaluation succeeds for identity 0 +[1829 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddc410 gate 1602702093970568300 evaluation succeeds +[182a 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[182b 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[182c 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[182d 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[182e 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[182f 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1830 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1831 10-14 19:01:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1832 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1833 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1834 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1835 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1836 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1837 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1838 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1839 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[183a 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[183b 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[183c 10-14 19:01:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[183d 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[183e 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[183f 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1840 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1841 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1842 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1843 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1844 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1845 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1846 10-14 19:01:34.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1847 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1848 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1849 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1602702094171750200 evaluation starts +[184a 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 signed by 0 principal evaluation starts (used [false]) +[184b 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 processing identity 0 with bytes of 115a6c0 +[184c 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal matched by identity 0 +[184d 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +[184e 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +00000040 9c 5d 85 81 45 d4 7f |.]..E..| +[184f 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal evaluation succeeds for identity 0 +[1850 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1602702094171750200 evaluation succeeds +[1851 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1852 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1853 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1854 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1855 10-14 19:01:34.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1856 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1857 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1858 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1859 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[185a 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185b 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185c 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[185d 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[185e 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[185f 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1860 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1861 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1862 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1863 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1864 10-14 19:01:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1865 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1866 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1867 10-14 19:01:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1868 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1869 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186a 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186b 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186c 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186d 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186e 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[186f 10-14 19:01:34.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1870 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1871 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1872 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1873 10-14 19:01:34.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1874 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1875 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1876 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1877 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1878 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1879 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[187a 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[187b 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[187c 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 gate 1602702094294460400 evaluation starts +[187d 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 signed by 0 principal evaluation starts (used [false]) +[187e 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 processing identity 0 with bytes of 115a6c0 +[187f 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 principal matched by identity 0 +[1880 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +[1881 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +00000040 47 7a 54 a2 92 46 |GzT..F| +[1882 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 principal evaluation succeeds for identity 0 +[1883 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e26940 gate 1602702094294460400 evaluation succeeds +[1884 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1885 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1886 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1887 10-14 19:01:34.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1888 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1889 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[188a 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[188b 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[188c 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[188d 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[188e 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[188f 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1890 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1891 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1892 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1893 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1894 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1895 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1896 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1897 10-14 19:01:34.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1898 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1899 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189a 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189b 10-14 19:01:34.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[189c 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[189d 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[189e 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[189f 10-14 19:01:34.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a0 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18a1 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18a2 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[18a3 10-14 19:01:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a4 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[18a5 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a6 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[18a7 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[18a8 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +[18a9 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +00000040 1e 36 a6 c0 a9 dc |.6....| +[18aa 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[18ab 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 6e 1b c7 30 05 a1 93 b2 ce bd |0E.!..n..0......| +00000010 e4 41 4c e3 40 fd 38 23 80 d5 4d 45 41 f1 27 98 |.AL.@.8#..MEA.'.| +00000020 dc 01 92 24 f3 02 20 19 37 b8 b1 ec 42 14 23 22 |...$.. .7...B.#"| +00000030 ab 06 bc ca 86 ee 98 05 8d bf 58 65 b2 13 e4 41 |..........Xe...A| +00000040 4f 8e 7c 2b 7a 63 73 |O.|+zcs| +[18ac 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[18ad 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[18ae 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[18af 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[18b0 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[18b1 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b2 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b3 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18b4 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[18b5 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18b6 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18b7 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[18b8 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[18b9 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ba 10-14 19:01:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:xT\306\304h\275\255\367\304F+w\307vW\333q<\016\365a\327\0366\246\300\251\334" secret_envelope: > alive: +[18bb 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[18bc 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[18bd 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[18be 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[18bf 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[18c0 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[18c1 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18c2 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c3 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18c4 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c5 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[18c6 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c7 10-14 19:01:34.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[18c8 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[18c9 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[18ca 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18cb 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[18cc 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[18cd 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ce 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[18cf 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[18d0 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[18d1 10-14 19:01:34.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d2 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[18d3 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101C +[18d4 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F781AB6DE5A451074A88C8967BEEE321030B51A9508D9799E1DF0584CD0E28FF +[18d5 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[18d6 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[18d7 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[18d8 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[18d9 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18da 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[18db 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18dc 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[18dd 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[18de 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18df 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[18e0 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e1 10-14 19:01:34.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[18e2 10-14 19:01:34.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e3 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[18e4 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18e5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[18e6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[18e7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +[18e8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +00000040 9b 2f 31 92 b6 1d 58 |./1...X| +[18e9 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[18ea 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 7d ff d6 13 c4 f9 e8 8a b8 a6 |0E.!..}.........| +00000010 31 1a de 06 ae 91 6a 5c a1 49 28 46 bb 76 4e 77 |1.....j\.I(F.vNw| +00000020 e8 a2 61 af ca 02 20 77 d6 16 b7 92 89 0d 10 2c |..a... w.......,| +00000030 4d f3 75 bb e3 cd be 87 9a 30 0c c3 b2 51 da 57 |M.u......0...Q.W| +00000040 55 74 d4 a7 68 0c d5 |Ut..h..| +[18eb 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[18ec 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[18ed 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ee 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18ef 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18f0 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18f1 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18f2 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[18f3 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[18f4 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18f5 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18f6 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18f7 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18f8 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18f9 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18fa 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18fb 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 gate 1602702094625274800 evaluation starts +[18fc 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 signed by 0 principal evaluation starts (used [false]) +[18fd 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 processing identity 0 with bytes of 115a6c0 +[18fe 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 principal matched by identity 0 +[18ff 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 86 fc 17 d3 13 ab fc c9 da 37 cf f7 3f bf 7a |n.........7..?.z| +00000010 af ac 23 1a 79 53 c9 52 b6 8d 0c cd 76 d7 67 d3 |..#.yS.R....v.g.| +[1900 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 32 c6 16 5e f3 cf e7 b2 bd 51 f0 3f |0D. 2..^.....Q.?| +00000010 5f 53 87 61 8c a5 0f 57 3d 6b 3d 6f 34 61 96 a8 |_S.a...W=k=o4a..| +00000020 82 79 b4 fc 02 20 5e be f4 63 60 3b dc 97 98 13 |.y... ^..c`;....| +00000030 e8 ae cd e8 84 9d 97 f3 26 a0 4e b1 4f 45 f1 3f |........&.N.OE.?| +00000040 47 7a 54 a2 92 46 |GzT..F| +[1901 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 principal evaluation succeeds for identity 0 +[1902 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4c50 gate 1602702094625274800 evaluation succeeds +[1903 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1904 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1905 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1906 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1907 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1908 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1909 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[190a 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +[190b 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +00000040 1e 36 a6 c0 a9 dc |.6....| +[190c 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[190d 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190e 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[190f 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +[1910 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +00000040 9b 2f 31 92 b6 1d 58 |./1...X| +[1911 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1912 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1913 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1914 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1915 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1916 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1917 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1918 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1919 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191a 10-14 19:01:34.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191b 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[191c 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[191d 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191e 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[191f 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1920 10-14 19:01:34.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1921 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1922 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1923 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1924 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1925 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1926 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1927 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 gate 1602702094640439300 evaluation starts +[1928 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 signed by 0 principal evaluation starts (used [false]) +[1929 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 processing identity 0 with bytes of 115a6c0 +[192a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 principal matched by identity 0 +[192b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 94 4c 09 19 d6 c5 b7 fa d6 38 78 0d 25 50 ee |1.L.......8x.%P.| +00000010 73 93 1e 82 af be 89 36 c1 91 2b a5 d5 d1 fb 70 |s......6..+....p| +[192c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 09 34 4c 94 d2 d8 13 ea 26 f0 |0E.!...4L.....&.| +00000010 7f 71 33 0c 0f 2b be 69 10 5d aa e5 90 a8 cf ad |.q3..+.i.]......| +00000020 56 83 20 98 5c 02 20 6c ae 18 dd fc b9 6e cf 5f |V. .\. l.....n._| +00000030 0b 6e 79 d0 44 1c 1e 6d de d3 87 e1 5d c4 8d c9 |.ny.D..m....]...| +00000040 9c 5d 85 81 45 d4 7f |.]..E..| +[192d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 principal evaluation succeeds for identity 0 +[192e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e812e0 gate 1602702094640439300 evaluation succeeds +[192f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1930 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1931 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1932 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1933 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1934 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1935 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1936 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 81 ab 6d e5 a4 51 07 4a 88 c8 96 7b ee e3 21 |...m..Q.J...{..!| +00000010 03 0b 51 a9 50 8d 97 99 e1 df 05 84 cd 0e 28 ff |..Q.P.........(.| +[1937 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 83 18 74 56 98 4a 3b 51 6f be |0E.!....tV.J;Qo.| +00000010 ac fa 2c 5b 80 d3 e1 cf 0f 09 65 be 76 6a 68 42 |..,[......e.vjhB| +00000020 11 26 1e b3 ac 02 20 71 5a b8 70 46 fb e2 09 e8 |.&.... qZ.pF....| +00000030 64 70 a3 2b 48 b5 88 3a 2d 1c d6 4a 97 37 f2 74 |dp.+H..:-..J.7.t| +00000040 9b 2f 31 92 b6 1d 58 |./1...X| +[1938 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1939 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[193a 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[193b 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[193c 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f e2 67 7d 11 ff 4d 68 91 bf 67 6b 35 ed e9 ae |/.g}..Mh..gk5...| +00000010 af 10 15 50 e5 72 0a 11 2a d6 76 cb cb a9 3f 60 |...P.r..*.v...?`| +[193d 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 71 73 dc a7 c9 06 98 02 0f f2 e2 |0D. Wqs.........| +00000010 83 e6 c0 24 24 77 e0 6b f9 26 17 81 d2 2d 7b e1 |...$$w.k.&...-{.| +00000020 42 e7 22 33 02 20 78 bc 4f 3e 78 54 c6 c4 68 bd |B."3. x.O>xT..h.| +00000030 ad f7 c4 46 2b 77 c7 76 57 db 71 3c 0e f5 61 d7 |...F+w.vW.q<..a.| +00000040 1e 36 a6 c0 a9 dc |.6....| +[193e 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193f 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1940 10-14 19:01:34.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1941 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1942 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1943 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1944 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1945 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1946 10-14 19:01:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1947 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1948 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1949 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[194a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[194b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[194c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[194d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[194e 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[194f 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1950 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1951 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1952 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1953 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 gate 1602702095145564600 evaluation starts +[1954 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 signed by 0 principal evaluation starts (used [false]) +[1955 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 processing identity 0 with bytes of 115a6c0 +[1956 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 principal matched by identity 0 +[1957 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 eb 39 46 16 ec 0d 8a e0 5a 98 4b 7b fd 95 0d 7a |.9F.....Z.K{...z| +00000010 fb 94 4b 7c 4e 2b 98 8b e6 fb d3 da 7e e8 de 7f |..K|N+......~...| +[1958 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 74 09 f5 f0 95 fc 3b cb 80 ad 08 |0D. wt.....;....| +00000010 8e 84 c0 39 8b b8 2d c2 22 23 33 d3 fa 79 75 5c |...9..-."#3..yu\| +00000020 dd de 49 b4 02 20 7a 38 23 54 94 56 bd 0c fa e1 |..I.. z8#T.V....| +00000030 e5 1d 95 da 26 1c 34 10 56 ae aa a1 56 57 9e 3a |....&.4.V...VW.:| +00000040 6f da 4c 86 37 50 |o.L.7P| +[1959 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 principal evaluation succeeds for identity 0 +[195a 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec39b0 gate 1602702095145564600 evaluation succeeds +[195b 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[195c 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[195d 10-14 19:01:35.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[195e 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[195f 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1960 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1961 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1962 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1963 10-14 19:01:35.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1964 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1965 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1966 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1967 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1968 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1969 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196a 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196b 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196c 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196d 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[196e 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196f 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1970 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1971 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1972 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1973 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1974 10-14 19:01:35.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1975 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1976 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1977 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1978 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[197a 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1979 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[197b 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[197c 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[197d 10-14 19:01:35.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[197e 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[197f 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1980 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1981 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1982 10-14 19:01:35.25 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1983 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1984 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1985 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1986 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1987 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1988 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1989 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[198a 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 gate 1602702095264912600 evaluation starts +[198b 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 signed by 0 principal evaluation starts (used [false]) +[198c 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 processing identity 0 with bytes of 115a6c0 +[198d 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 principal matched by identity 0 +[198e 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 32 8c 58 4d 14 67 6f 56 d6 0d ff d7 70 04 bc |.2.XM.goV....p..| +00000010 8c 7f 4a dd af 40 ea 57 e4 ff b1 a8 7e 21 d6 8b |..J..@.W....~!..| +[198f 10-14 19:01:35.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 6c 3d ce 16 ac ec 6f e9 99 bd |0E.!..l=....o...| +00000010 b2 94 03 50 cc e1 05 f6 79 80 b6 9e e9 3d 50 a6 |...P....y....=P.| +00000020 ac 1b fd a3 fb 02 20 05 72 5b e6 a9 5b e3 f2 76 |...... .r[..[..v| +00000030 44 69 86 85 78 9f 7e 86 b5 87 4c 45 ab d1 ed 7b |Di..x.~...LE...{| +00000040 02 95 47 78 22 af c2 |..Gx"..| +[1990 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1991 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1992 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 principal evaluation succeeds for identity 0 +[1993 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f07410 gate 1602702095264912600 evaluation succeeds +[1994 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1995 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1996 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1997 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1998 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1999 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[199a 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[199b 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[199c 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[199d 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199e 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[199f 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19a1 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a2 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a3 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19a4 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a5 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19a6 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19a7 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a8 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19a9 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19aa 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ab 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ac 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ad 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[19ae 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19af 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19b0 10-14 19:01:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[19b1 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19b2 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b3 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19b4 10-14 19:01:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b5 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19b6 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b7 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19b8 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[19b9 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 b7 e9 8a b8 63 51 26 bb e7 18 e1 36 37 09 f2 |.....cQ&....67..| +00000010 6d 1b cd f4 b8 20 37 02 09 3a 49 0d 04 45 f0 5d |m.... 7..:I..E.]| +[19ba 10-14 19:01:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 40 46 68 39 a7 a7 ec b0 cc 8c 6b |0D. 9@Fh9......k| +00000010 b7 58 8a d1 55 15 60 02 de 1d 57 1a d8 d2 16 c0 |.X..U.`...W.....| +00000020 6d 98 db 9f 02 20 78 06 7d 71 e1 ff 3f f7 bc 37 |m.... x.}q..?..7| +00000030 28 f1 00 40 48 78 85 2c 3d 2b 32 db 0c df c4 31 |(..@Hx.,=+2....1| +00000040 b0 eb 08 b3 ef cf |......| +[19bb 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19bc 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[19bd 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[19be 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[19bf 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[19c0 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c1 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c2 10-14 19:01:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c3 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c4 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c5 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c6 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19c7 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19c8 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19ca 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c9 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19cb 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19cc 10-14 19:01:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19cd 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19ce 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19cf 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d0 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19d1 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d2 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19d3 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19d4 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d5 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19d6 10-14 19:01:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d7 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[19d8 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101D +[19d9 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A99727C4B2C37D9212EF2652319C21F0B68F6F3F213E8C78C047991F521390F3 +[19da 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[19db 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[19dc 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[19dd 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[19de 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19df 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e0 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e1 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19e2 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19e3 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19e5 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e6 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19e7 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e4 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e8 10-14 19:01:35.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[19e9 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[19ea 10-14 19:01:35.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19eb 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ec 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ed 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[19ee 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19f0 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19f1 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19f2 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19ef 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[19f3 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19f4 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[19f5 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[19f6 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19f7 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[19f8 10-14 19:01:37.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[19f9 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19fa 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19fc 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19fd 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19fe 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19ff 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a00 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a01 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a02 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 gate 1602702097932577100 evaluation starts +[1a03 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 signed by 0 principal evaluation starts (used [false]) +[1a04 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 processing identity 0 with bytes of 115a6c0 +[1a05 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 principal matched by identity 0 +[1a06 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1a07 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1a08 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 principal evaluation succeeds for identity 0 +[1a09 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f96960 gate 1602702097932577100 evaluation succeeds +[1a0a 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a0b 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a0c 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a0d 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a0e 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a0f 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a10 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a11 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a12 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a13 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a14 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a15 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a16 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 gate 1602702097933975300 evaluation starts +[1a17 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 signed by 0 principal evaluation starts (used [false]) +[1a18 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 processing identity 0 with bytes of 115a6c0 +[19fb 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a19 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 principal matched by identity 0 +[1a1a 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1a1b 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1a1c 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 principal evaluation succeeds for identity 0 +[1a1d 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f97b60 gate 1602702097933975300 evaluation succeeds +[1a1e 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a1f 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a20 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a21 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a22 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1a23 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1a24 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a25 10-14 19:01:37.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a26 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1a27 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1a28 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1a29 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1a2a 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a2b 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a2c 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a2d 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a2e 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a2f 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a30 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a31 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a32 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 gate 1602702097948538000 evaluation starts +[1a33 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 signed by 0 principal evaluation starts (used [false]) +[1a34 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 processing identity 0 with bytes of 115a6c0 +[1a35 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 principal matched by identity 0 +[1a36 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1a37 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1a38 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 principal evaluation succeeds for identity 0 +[1a39 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fca3d0 gate 1602702097948538000 evaluation succeeds +[1a3a 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a3b 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a3c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a3d 10-14 19:01:37.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a3f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a40 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a3e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1a42 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a43 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a44 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1a45 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1a46 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a41 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a47 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a48 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a49 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a4a 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a4b 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a4c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a4d 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a4e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 gate 1602702097954802300 evaluation starts +[1a4f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 signed by 0 principal evaluation starts (used [false]) +[1a50 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 processing identity 0 with bytes of 115a6c0 +[1a51 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 principal matched by identity 0 +[1a52 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1a53 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1a54 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 principal evaluation succeeds for identity 0 +[1a55 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f6def0 gate 1602702097954802300 evaluation succeeds +[1a56 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a57 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a58 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a59 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a5a 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a5b 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a5c 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a5d 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1a5e 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1a5f 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1a60 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1a61 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a62 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a63 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a64 10-14 19:01:37.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a65 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a66 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a67 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a68 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a69 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 gate 1602702097960424900 evaluation starts +[1a6a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 signed by 0 principal evaluation starts (used [false]) +[1a6b 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 processing identity 0 with bytes of 115a6c0 +[1a6c 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 principal matched by identity 0 +[1a6d 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1a6e 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1a6f 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 principal evaluation succeeds for identity 0 +[1a70 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400a120 gate 1602702097960424900 evaluation succeeds +[1a71 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a72 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a73 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a74 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a75 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a76 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a77 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a78 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a79 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a7a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a7b 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a7c 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a7d 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 gate 1602702097966467300 evaluation starts +[1a7e 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 signed by 0 principal evaluation starts (used [false]) +[1a7f 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 processing identity 0 with bytes of 115a6c0 +[1a80 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 principal matched by identity 0 +[1a81 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1a82 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1a83 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 principal evaluation succeeds for identity 0 +[1a84 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400b320 gate 1602702097966467300 evaluation succeeds +[1a85 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a86 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a87 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a88 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a89 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8a 10-14 19:01:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1a8b 10-14 19:01:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1a8c 10-14 19:01:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8d 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a8e 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a8f 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a90 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a91 10-14 19:01:38.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a92 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a93 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a94 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a95 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a96 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1a97 10-14 19:01:38.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a98 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1a99 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1a9a 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a9b 10-14 19:01:38.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1a9c 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1a9d 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9e 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a9f 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1aa0 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1aa1 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1aa2 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1aa3 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1aa4 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 gate 1602702098171213500 evaluation starts +[1aa5 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 signed by 0 principal evaluation starts (used [false]) +[1aa6 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 processing identity 0 with bytes of 115a6c0 +[1aa7 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 principal matched by identity 0 +[1aa8 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +[1aa9 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +[1aaa 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 principal evaluation succeeds for identity 0 +[1aab 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00403e190 gate 1602702098171213500 evaluation succeeds +[1aac 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1aad 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1aae 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1aaf 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ab0 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ab1 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1ab2 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ab3 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ab4 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1ab5 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ab6 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ab7 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ab8 10-14 19:01:38.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1ab9 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1aba 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1abb 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1abc 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1abd 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1abe 10-14 19:01:38.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1abf 10-14 19:01:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1ac0 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ac1 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ac2 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ac3 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac4 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac5 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac6 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac7 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac8 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ac9 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1aca 10-14 19:01:38.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1acb 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1acc 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1acd 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ace 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1acf 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1ad0 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ad1 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ad2 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ad3 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ad4 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ad5 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ad6 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ad7 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 gate 1602702098296070300 evaluation starts +[1ad8 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 signed by 0 principal evaluation starts (used [false]) +[1ad9 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 processing identity 0 with bytes of 115a6c0 +[1ada 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 principal matched by identity 0 +[1adb 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +[1adc 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +00000040 a2 7d 93 18 07 62 |.}...b| +[1add 10-14 19:01:38.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 principal evaluation succeeds for identity 0 +[1ade 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004060c60 gate 1602702098296070300 evaluation succeeds +[1adf 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ae0 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ae1 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ae2 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ae3 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ae4 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ae5 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae7 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae8 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ae6 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1ae9 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1aea 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1aeb 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1aec 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aed 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aee 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aef 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1af0 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af1 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af2 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af3 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1af4 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1af5 10-14 19:01:38.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1af6 10-14 19:01:38.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1af7 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1af8 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1af9 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1afa 10-14 19:01:38.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1afb 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[1afc 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 cf 66 3f b5 6b 71 f8 a6 39 18 55 5d 53 d3 1f |P.f?.kq..9.U]S..| +00000010 8b 04 ad ff e5 ae 83 c5 d6 e8 ae 0f d3 81 0b 2b |...............+| +[1afd 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 9e e2 ad 36 7a 66 cf 1e 29 85 |0E.!.....6zf..).| +00000010 48 e0 c2 8f 71 21 36 31 b8 b2 6f be d7 10 26 0b |H...q!61..o...&.| +00000020 f6 d1 60 a7 f7 02 20 38 eb 95 75 ab 58 65 74 d7 |..`... 8..u.Xet.| +00000030 07 9b 45 4a 4d e5 f4 3f e3 f8 0f aa 22 ba c9 e4 |..EJM..?...."...| +00000040 53 28 8e bd cd 7e 44 |S(...~D| +[1afe 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1aff 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b00 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b01 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[1b02 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[1b03 10-14 19:01:38.36 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1b04 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[1b05 10-14 19:01:38.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1b06 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b07 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b08 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1b09 10-14 19:01:38.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b0a 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1b0b 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b0c 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1b0d 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b0e 10-14 19:01:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +[1b0f 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +[1b10 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b11 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 f4 02 83 1c 76 63 d2 92 2c 34 ee |0D. 7....vc..,4.| +00000010 1a 2f 03 8d 06 27 a6 c8 4a f3 7e cb a6 7e 7f d1 |./...'..J.~..~..| +00000020 b0 da b7 08 02 20 25 36 db 7b 4e 86 a2 98 a5 57 |..... %6.{N....W| +00000030 33 e9 06 eb a3 c5 64 6a 2d 29 92 21 bb 1c 05 5e |3.....dj-).!...^| +00000040 ea 58 13 87 2f 5b |.X../[| +[1b12 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1b13 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1b14 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1b15 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1b16 10-14 19:01:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1b17 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b18 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b19 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b1a 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1b1b 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b1c 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b1d 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[1b1e 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1b1f 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1b20 10-14 19:01:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b21 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b22 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b23 10-14 19:01:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:3804741105336187588 tag:EMPTY mem_req:\260\265h=\231g\210\377\211\254)l\2555}]k\265\002 ?2fob\\\277\023\336Hg{\275\357Lp\237\177\305'mJ\336yc k\313/\225C\372" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b24 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b25 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 52 c1 e7 b5 a1 dc ab 70 8c c6 e0 3d f9 e7 b1 |.R......p...=...| +00000010 e2 38 8c ef ea 9b 19 eb a1 0b 54 7d 5b 25 b0 d9 |.8........T}[%..| +[1b26 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 c2 cb 71 1d b0 f4 58 20 45 be |0E.!....q...X E.| +00000010 70 26 3e b0 b5 68 3d 99 67 88 ff 89 ac 29 6c ad |p&>..h=.g....)l.| +00000020 35 7d 5d 6b b5 02 20 3f 32 66 6f 62 5c bf 13 de |5}]k.. ?2fob\...| +00000030 48 67 7b bd ef 4c 70 9f 7f c5 27 6d 4a de 79 63 |Hg{..Lp...'mJ.yc| +00000040 20 6b cb 2f 95 43 fa | k./.C.| +[1b27 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b28 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 61 44 60 f1 ec fc 31 52 5b 50 |0E.!..aD`...1R[P| +00000010 62 62 ea 9a 2c 47 03 24 e0 e5 4b 28 ae 1f 8c 94 |bb..,G.$..K(....| +00000020 08 5a ff e7 21 02 20 0a a5 fc 90 71 2f 34 3d b2 |.Z..!. ....q/4=.| +00000030 1a 0a e8 10 22 6a cd d2 2f c3 56 91 23 86 a2 ef |...."j../.V.#...| +00000040 8b ba 5d c4 c6 2e 10 |..]....| +[1b29 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b2a 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1b2b 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b2c 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b2d 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers +[1b2e 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1b2f 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 3804741105336187588, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes +[1b30 10-14 19:01:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b31 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1b32 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1b33 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1b34 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1b35 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1b36 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1b37 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b38 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b39 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b3a 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3b 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1b3c 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3d 10-14 19:01:38.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b3e 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b3f 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b40 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b41 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b42 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b43 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b44 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b45 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b46 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1b47 10-14 19:01:38.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b48 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b49 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101E +[1b4a 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C4441523DE4024064A73FF405AD1CE35D5E8C43469AE8C64DA81398E24CA0E0 +[1b4b 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b4c 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1b4d 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1b4e 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1b4f 10-14 19:01:38.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b50 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1b51 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b52 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1b53 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b54 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1b55 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1b56 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1b58 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b57 10-14 19:01:38.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b59 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1b5a 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b5b 10-14 19:01:38.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1b5c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1b5d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +00000040 e1 08 58 bc 0d 86 2e |..X....| +[1b5f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1b60 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 37 e0 ea 4f 22 39 08 0d 11 9d |0E.!..7..O"9....| +00000010 a6 33 22 b5 26 d5 f6 d9 f1 2c df 27 be 88 41 5e |.3".&....,.'..A^| +00000020 f6 e0 35 c5 e4 02 20 6e 98 00 40 f4 5a 0c 2e a1 |..5... n..@.Z...| +00000030 50 7e a7 9c da e5 1c 53 a4 5a 08 72 b0 79 76 14 |P~.....S.Z.r.yv.| +00000040 18 ad 55 d9 bb ba f5 |..U....| +[1b61 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b62 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1b63 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b64 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b65 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1b66 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1b67 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b68 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1b69 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1b6a 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b6b 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b6c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b6d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b6e 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b6f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b70 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b71 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 gate 1602702098624680800 evaluation starts +[1b72 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 signed by 0 principal evaluation starts (used [false]) +[1b73 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 processing identity 0 with bytes of 115a6c0 +[1b74 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 principal matched by identity 0 +[1b75 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 e1 7a c8 cc 4a 65 e1 d1 43 71 74 39 4e 32 ea |%.z..Je..Cqt9N2.| +00000010 7f bb 76 c9 fb 7d 92 2a ca fb cf d6 50 12 e4 b7 |..v..}.*....P...| +[1b76 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1b78 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1b77 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e7 d2 7c ae e9 d3 b7 a2 cb 2c |0E.!....|......,| +00000010 a1 04 56 25 7d 97 35 7d 08 5c 69 05 e3 95 96 5d |..V%}.5}.\i....]| +00000020 c8 7d 98 ba bf 02 20 54 54 a8 94 dd 76 be d8 8b |.}.... TT...v...| +00000030 4a bf 51 7d 90 de e4 76 d3 c1 de c0 6d 28 79 02 |J.Q}...v....m(y.| +00000040 48 bb 77 e1 a6 77 c0 |H.w..w.| +[1b79 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 principal evaluation succeeds for identity 0 +[1b7a 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004107580 gate 1602702098624680800 evaluation succeeds +[1b7b 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b7c 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b7d 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b7e 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b7f 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b80 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b81 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1b82 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +00000040 e1 08 58 bc 0d 86 2e |..X....| +[1b84 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b85 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b86 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b87 10-14 19:01:38.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b88 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +[1b89 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +[1b8a 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1b8b 10-14 19:01:38.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b8d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b8e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1b90 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1b91 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b8c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b8f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b92 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b93 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b94 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b95 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b96 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b97 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b98 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b99 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b9a 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b9b 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b9c 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b9d 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 gate 1602702098645382100 evaluation starts +[1b9e 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 signed by 0 principal evaluation starts (used [false]) +[1b9f 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 processing identity 0 with bytes of 115a6c0 +[1ba0 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 principal matched by identity 0 +[1ba1 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c3 69 c4 81 52 bd 9a 62 15 a8 6b 40 85 36 16 d9 |.i..R..b..k@.6..| +00000010 1f 8f 07 bc e8 3a c2 5d af cb 88 16 6d 7f 07 89 |.....:.]....m...| +[1ba2 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 23 ed 1a 2d f1 36 b4 c1 a2 69 ba 6d |0D. #..-.6...i.m| +00000010 53 ea d2 42 a2 86 f4 de ce 19 04 1c bd 91 37 a9 |S..B..........7.| +00000020 bf de 83 ad 02 20 65 22 76 57 50 96 63 ea 0a ea |..... e"vWP.c...| +00000030 b3 d5 7f 48 ae 69 30 4c 09 03 a0 de 1c 35 86 3c |...H.i0L.....5.<| +00000040 a2 7d 93 18 07 62 |.}...b| +[1ba3 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 principal evaluation succeeds for identity 0 +[1ba4 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411d120 gate 1602702098645382100 evaluation succeeds +[1ba5 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ba6 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ba7 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ba8 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ba9 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1baa 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bab 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1bac 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 02 05 2b 10 24 af 3f 7f ee e1 a5 18 2e 89 b0 |...+.$.?........| +00000010 fc 4d 24 d7 6b 00 ec 76 67 95 92 94 5e f4 19 74 |.M$.k..vg...^..t| +[1bad 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 61 26 73 1c 43 db a2 bc e4 f6 |0E.!..a&s.C.....| +00000010 7d c5 86 ad 62 ce 9c 7e e1 a8 f9 e6 95 86 8e 71 |}...b..~.......q| +00000020 6b 28 83 97 d1 02 20 74 09 b0 e2 3f a2 9b b8 60 |k(.... t...?...`| +00000030 8d 45 6d dc e2 00 35 d7 ed c8 91 b4 ba 4b dd 1e |.Em...5......K..| +00000040 f6 ba 59 84 63 8e d5 |..Y.c..| +[1bae 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1baf 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb0 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1bb1 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 44 41 52 3d e4 02 40 64 a7 3f f4 05 ad 1c e3 | DEBU Verify: sig = 00000000 30 45 02 21 00 ec 72 04 18 f2 79 c9 3f a4 e2 94 |0E.!..r...y.?...| +00000010 6c 94 2a cd 64 26 25 5a dd bf a5 d2 67 b2 b0 ef |l.*.d&%Z....g...| +00000020 80 4d ea a1 e1 02 20 2f 5c 12 17 c5 75 e1 03 16 |.M.... /\...u...| +00000030 a5 5b 48 67 3f 7d 40 94 ed 7e 29 d9 ff eb cf 91 |.[Hg?}@..~).....| +00000040 e1 08 58 bc 0d 86 2e |..X....| +[1bb3 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bb4 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1bb5 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb6 10-14 19:01:38.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb7 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bb8 10-14 19:01:38.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bb9 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bba 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7047652339765241110 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[1bbb 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1bbc 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bbd 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1bbe 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bbf 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bc0 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bc1 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bc2 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bc3 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 gate 1602702098941738600 evaluation starts +[1bc4 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 signed by 0 principal evaluation starts (used [false]) +[1bc5 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 processing identity 0 with bytes of 115a6c0 +[1bc6 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 principal matched by identity 0 +[1bc7 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 df b8 a8 68 2c e0 15 94 32 63 fd e5 3a ac c3 |....h,...2c..:..| +00000010 48 3d ab dd 76 0b bd d7 7d f5 95 97 31 fe 71 e3 |H=..v...}...1.q.| +[1bc8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 ee 5b 5b e8 2b df 7b f9 ac 2c 00 |0D. ..[[.+.{..,.| +00000010 5f b1 19 91 7e 62 1b ea cf 25 32 5b ac 73 c9 9a |_...~b...%2[.s..| +00000020 8c 90 4d 53 02 20 5c 4e fa 00 39 83 32 91 19 71 |..MS. \N..9.2..q| +00000030 4a fa 02 38 69 e9 d6 91 7b 53 f4 73 43 71 98 cb |J..8i...{S.sCq..| +00000040 9c a9 db 22 08 a5 |..."..| +[1bc9 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 principal evaluation succeeds for identity 0 +[1bca 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004150b90 gate 1602702098941738600 evaluation succeeds +[1bcb 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1bcc 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1bcd 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1bce 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1bcf 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd0 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1bd1 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd2 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd3 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd4 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[1bd5 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7047652339765241110, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[1bd6 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd7 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1bd8 10-14 19:01:38.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1bd9 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1bda 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdb 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdc 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdd 10-14 19:01:38.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bde 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +[1bdf 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +[1be1 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:15248953346550337614 tag:EMPTY mem_req:_\335Z\024\327\016\214g\247\355X\335\r\270\345\3666\002 #\024 \031\031\333\274\370JQ\263\222\337\202;~\003v\024\027\224\276\032L3F\2029[\343\302Y" > > , Envelope: 177 bytes, Signature: 0 bytes +[1be2 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1be3 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be4 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1be5 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1be6 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1be7 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1be8 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1be9 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bea 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 gate 1602702099283801000 evaluation starts +[1beb 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 signed by 0 principal evaluation starts (used [false]) +[1bec 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 processing identity 0 with bytes of 115a6c0 +[1bed 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 principal matched by identity 0 +[1bee 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 0b 3f a8 ef b8 c8 24 a4 2a b1 b4 b3 66 b2 86 |..?....$.*...f..| +00000010 07 d4 66 76 2a fe 0e 3b 46 d8 27 87 dd ee 11 ac |..fv*..;F.'.....| +[1bef 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 19 e7 1c 38 89 65 19 7b 34 47 |0E.!.....8.e.{4G| +00000010 d8 e9 3d 3e 5f dd 5a 14 d7 0e 8c 67 a7 ed 58 dd |..=>_.Z....g..X.| +00000020 0d b8 e5 f6 36 02 20 23 14 20 19 19 db bc f8 4a |....6. #. .....J| +00000030 51 b3 92 df 82 3b 7e 03 76 14 17 94 be 1a 4c 33 |Q....;~.v.....L3| +00000040 46 82 39 5b e3 c2 59 |F.9[..Y| +[1bf0 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 principal evaluation succeeds for identity 0 +[1bf1 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004141eb0 gate 1602702099283801000 evaluation succeeds +[1bf2 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1bf3 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1bf4 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1bf5 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1bf6 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf7 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1bf8 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bf9 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bfa 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bfb 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[1bfc 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1bfd 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15248953346550337614, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[1bfe 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be0 10-14 19:01:39.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bff 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c00 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c01 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c02 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c03 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1c04 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c05 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c06 10-14 19:01:40.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c07 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c08 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c09 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c0a 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c0b 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 gate 1602702100153293000 evaluation starts +[1c0c 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 signed by 0 principal evaluation starts (used [false]) +[1c0d 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 processing identity 0 with bytes of 115a6c0 +[1c0e 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 principal matched by identity 0 +[1c0f 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 88 ec b1 c2 56 8b 69 5e e5 1d cb d0 4b af 9c 63 |....V.i^....K..c| +00000010 79 c8 11 86 3a 3a 96 32 f3 0a da 29 72 ca 43 94 |y...::.2...)r.C.| +[1c10 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4a b1 31 e1 7e 54 36 25 a8 f9 |0E.!..J.1.~T6%..| +00000010 27 87 e6 6d f8 cd e2 4b f1 d5 90 22 3a 30 40 01 |'..m...K...":0@.| +00000020 f9 ee 8c be 83 02 20 12 fb fc fc d9 66 02 14 c3 |...... .....f...| +00000030 a9 9e fc 13 5c 44 b8 49 b8 0b 46 25 32 c8 39 91 |....\D.I..F%2.9.| +00000040 65 c8 f9 92 d7 f3 97 |e......| +[1c11 10-14 19:01:40.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 principal evaluation succeeds for identity 0 +[1c12 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041817b0 gate 1602702100153293000 evaluation succeeds +[1c13 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c14 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c15 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c16 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c17 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c18 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1c19 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c1a 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c1b 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c1c 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1c1d 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1e 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1f 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c20 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c21 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c22 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c23 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c24 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c25 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c26 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c27 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c28 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c29 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c2a 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c2b 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c2c 10-14 19:01:40.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c2e 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c2f 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c30 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c2d 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c31 10-14 19:01:40.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c32 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c33 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c34 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c35 10-14 19:01:40.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c36 10-14 19:01:40.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c37 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c38 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c39 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c3a 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1c3b 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c3c 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c3d 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c3e 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c3f 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c40 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c41 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c42 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 gate 1602702100262536400 evaluation starts +[1c43 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 signed by 0 principal evaluation starts (used [false]) +[1c44 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 processing identity 0 with bytes of 115a6c0 +[1c45 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 principal matched by identity 0 +[1c46 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 82 9f 34 4b d7 09 67 da 2c ae 20 58 e4 67 41 |...4K..g.,. X.gA| +00000010 30 a8 8a e8 86 d6 88 f7 bc 2f 81 eb 25 99 3c 55 |0......../..%. DEBU Verify: sig = 00000000 30 45 02 21 00 ac 2e 2f db 6f e7 29 9d c2 60 ef |0E.!.../.o.)..`.| +00000010 fe 29 06 82 6f 61 a3 8e fb 1d 7c 7e 94 65 a5 1a |.)..oa....|~.e..| +00000020 c2 c0 cb 0d f0 02 20 13 d9 c1 7f c2 72 af 51 de |...... .....r.Q.| +00000030 f8 98 07 c9 a1 95 62 44 4a 8f ab 29 de 54 66 a5 |......bDJ..).Tf.| +00000040 9e ab 78 f5 f6 4a 64 |..x..Jd| +[1c48 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 principal evaluation succeeds for identity 0 +[1c49 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041a3300 gate 1602702100262536400 evaluation succeeds +[1c4a 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c4b 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c4c 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c4d 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c4e 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c4f 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1c50 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c51 10-14 19:01:40.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c52 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1c53 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c54 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c55 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c56 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c57 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c58 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c59 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c5a 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c5b 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5c 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5d 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5e 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5f 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c60 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c61 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c62 10-14 19:01:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c63 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c65 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c64 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c66 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c67 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c68 10-14 19:01:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c69 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c6a 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c6b 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c6c 10-14 19:01:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c6d 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c6e 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c6f 10-14 19:01:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c70 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1c71 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df d6 4f 0c b2 50 39 aa 05 28 45 bc a1 68 aa 85 |..O..P9..(E..h..| +00000010 c9 f9 71 7f bc 3f fa cc 12 41 3d 33 33 68 80 1c |..q..?...A=33h..| +[1c72 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 7f a1 91 fc 9d de ab 98 77 90 7c |0D. R........w.|| +00000010 61 86 91 c1 31 3e 25 f6 de ba 84 d7 88 fc ef 4f |a...1>%........O| +00000020 7d 5b 09 89 02 20 0f 16 f4 c5 e5 01 b4 62 5a b6 |}[... .......bZ.| +00000030 ab e9 dd 31 e4 d0 34 ed 6f 26 1f 81 ce 2c 71 22 |...1..4.o&...,q"| +00000040 ec 47 fc 80 57 36 |.G..W6| +[1c73 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c74 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1c75 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c76 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c77 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1c78 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c79 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7a 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7b 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c7c 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c7d 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c7e 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c7f 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c80 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c81 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c82 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c83 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c84 10-14 19:01:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c85 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c86 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c87 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c88 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c89 10-14 19:01:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8a 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c8b 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c8c 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8d 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c8e 10-14 19:01:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8f 10-14 19:01:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[1c90 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c91 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16101F +[1c92 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 683ABFE4ED515165FF350FDB60CF16DE87BB720B231A6706502832B897B666F4 +[1c93 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c94 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1c95 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1c96 10-14 19:01:40.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1c97 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c98 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c99 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c9a 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c9b 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c9c 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c9d 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c9e 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ca0 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ca1 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca2 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ca3 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9f 10-14 19:01:40.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca4 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca5 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca6 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1ca7 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ca8 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1ca9 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1caa 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cab 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1cac 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cad 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1cae 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1caf 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1cb0 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1cb1 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1cb2 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cb3 10-14 19:01:41.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cb4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cb5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cb6 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cb7 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cb8 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cb9 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cba 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1cbb 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 gate 1602702101931799300 evaluation starts +[1cbc 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 signed by 0 principal evaluation starts (used [false]) +[1cbd 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 processing identity 0 with bytes of 115a6c0 +[1cbe 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 principal matched by identity 0 +[1cbf 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1cc0 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1cc1 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1cc2 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 principal evaluation succeeds for identity 0 +[1cc3 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004250630 gate 1602702101931799300 evaluation succeeds +[1cc4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cc5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cc6 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cc7 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cc8 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cc9 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cca 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ccb 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ccc 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ccd 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cce 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ccf 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cd0 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 gate 1602702101938824500 evaluation starts +[1cd1 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 signed by 0 principal evaluation starts (used [false]) +[1cd2 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 processing identity 0 with bytes of 115a6c0 +[1cd3 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 principal matched by identity 0 +[1cd4 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1cd5 10-14 19:01:41.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1cd6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 principal evaluation succeeds for identity 0 +[1cd7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004251830 gate 1602702101938824500 evaluation succeeds +[1cd8 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cd9 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cda 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cdb 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cdc 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cdd 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1cde 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cdf 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1ce0 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1ce1 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1ce2 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1ce3 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ce4 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ce5 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ce6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ce7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ce8 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ce9 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cea 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ceb 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 gate 1602702101945086200 evaluation starts +[1cec 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 signed by 0 principal evaluation starts (used [false]) +[1ced 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 processing identity 0 with bytes of 115a6c0 +[1cee 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 principal matched by identity 0 +[1cef 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1cf0 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1cf1 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 principal evaluation succeeds for identity 0 +[1cf2 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426da60 gate 1602702101945086200 evaluation succeeds +[1cf3 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cf4 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cf5 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cf6 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cf7 10-14 19:01:41.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf8 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf9 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cfa 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cfb 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1cfc 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cfd 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cfe 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[1cff 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1d00 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d01 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d02 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d03 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d04 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d05 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d06 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d07 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 gate 1602702101957258400 evaluation starts +[1d08 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 signed by 0 principal evaluation starts (used [false]) +[1d09 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 processing identity 0 with bytes of 115a6c0 +[1d0a 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 principal matched by identity 0 +[1d0b 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1d0c 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1d0d 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 principal evaluation succeeds for identity 0 +[1d0e 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004238d30 gate 1602702101957258400 evaluation succeeds +[1d0f 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d10 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d11 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d12 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d13 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d14 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1d15 10-14 19:01:41.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d16 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1d17 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1d18 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d19 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d1a 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d1b 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d1c 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d1d 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d1e 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d1f 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d20 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 gate 1602702101964171900 evaluation starts +[1d21 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 signed by 0 principal evaluation starts (used [false]) +[1d22 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 processing identity 0 with bytes of 115a6c0 +[1d23 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 principal matched by identity 0 +[1d24 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1d25 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1d26 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 principal evaluation succeeds for identity 0 +[1d27 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aa870 gate 1602702101964171900 evaluation succeeds +[1d28 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d29 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d2a 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d2b 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d2c 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d2d 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d2e 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d2f 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d30 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d31 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d32 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d33 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d34 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 gate 1602702101968504800 evaluation starts +[1d35 10-14 19:01:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 signed by 0 principal evaluation starts (used [false]) +[1d36 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 processing identity 0 with bytes of 115a6c0 +[1d37 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 principal matched by identity 0 +[1d38 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1d39 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1d3a 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 principal evaluation succeeds for identity 0 +[1d3b 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042aba70 gate 1602702101968504800 evaluation succeeds +[1d3c 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d3d 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d3e 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d3f 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d40 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1d41 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1d42 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d43 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1d44 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[1d45 10-14 19:01:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d46 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d47 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d48 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d49 10-14 19:01:42.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4a 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4b 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4c 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4d 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4e 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d4f 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1d50 10-14 19:01:42.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d51 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d52 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d53 10-14 19:01:42.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d54 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d55 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1d56 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d57 10-14 19:01:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d58 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d59 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d5a 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d5b 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d5c 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d5d 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 gate 1602702102193756600 evaluation starts +[1d5e 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 signed by 0 principal evaluation starts (used [false]) +[1d5f 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 processing identity 0 with bytes of 115a6c0 +[1d60 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 principal matched by identity 0 +[1d61 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +[1d62 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +00000040 67 37 65 1c 99 ab e7 |g7e....| +[1d63 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 principal evaluation succeeds for identity 0 +[1d64 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042c5f00 gate 1602702102193756600 evaluation succeeds +[1d65 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d66 10-14 19:01:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d67 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d68 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d69 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d6a 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1d6b 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1d6c 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1d6d 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1d6e 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d6f 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d70 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d71 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1d72 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d73 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d74 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d75 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1d76 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > alive: alive: alive: +[1d77 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1d78 10-14 19:01:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d79 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d7a 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d7b 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1d7c 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7d 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7e 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7f 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d80 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d81 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d82 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1d83 10-14 19:01:42.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d84 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d85 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d86 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d87 10-14 19:01:42.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d88 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d89 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d8a 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d8b 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1d8c 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1d8d 10-14 19:01:42.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d8e 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d8f 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d90 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d91 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d92 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d93 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d94 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 gate 1602702102300791500 evaluation starts +[1d95 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 signed by 0 principal evaluation starts (used [false]) +[1d96 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 processing identity 0 with bytes of 115a6c0 +[1d97 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 principal matched by identity 0 +[1d98 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +[1d99 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +00000040 20 54 85 f2 2e 2d 0e | T...-.| +[1d9a 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 principal evaluation succeeds for identity 0 +[1d9b 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004318420 gate 1602702102300791500 evaluation succeeds +[1d9c 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d9d 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d9e 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d9f 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1da0 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1da1 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1da2 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1da3 10-14 19:01:42.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1da4 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1da5 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da6 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da7 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1da8 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1da9 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1daa 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dab 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dac 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1dad 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:%\366\336\272\204\327\210\374\357O}[\t\211\002 \017\026\364\305\345\001\264bZ\266\253\351\3351\344\3204\355o&\037\201\316,q\"\354G\374\200W6" > alive: alive: +[1dae 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1daf 10-14 19:01:42.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1db0 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1db1 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1db2 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1db3 10-14 19:01:42.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1db4 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1db5 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1db6 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1db7 10-14 19:01:42.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1db8 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1db9 10-14 19:01:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dba 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1dbb 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1dbc 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +[1dbd 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +00000040 d5 17 30 4b 07 19 61 |..0K..a| +[1dbe 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1dbf 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 ff db 5f 61 62 01 e1 9f ef c3 |0E.!...._ab.....| +00000010 72 28 f2 8c 3b d1 b2 46 22 9d 35 49 7f 70 3f 7c |r(..;..F".5I.p?|| +00000020 e9 3f b1 1c 04 02 20 77 e3 65 2e 5b 09 13 9c 34 |.?.... w.e.[...4| +00000030 81 9a 99 57 48 b5 8c e4 ce c0 84 15 b9 36 98 78 |...WH........6.x| +00000040 26 64 44 18 25 1d 19 |&dD.%..| +[1dc0 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1dc1 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1dc2 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1dc3 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1dc4 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1dc5 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc6 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc7 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1dc8 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc9 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dca 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1dcc 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1dcb 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dcd 10-14 19:01:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1dce 10-14 19:01:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dcf 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1dd0 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes to 1 peers +[1dd1 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1dd2 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1dd3 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 15 bytes, Signature: 0 bytes +[1dd4 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1dd5 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd6 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1dd7 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1dd8 10-14 19:01:42.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd9 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1dda 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1ddb 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ddc 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +[1ddd 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +[1dde 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 152 bytes, Signature: 0 bytes +[1ddf 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de0 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1de1 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de2 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1de3 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1de4 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1de5 10-14 19:01:42.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1de6 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1de7 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161020 +[1de8 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6CE4EDC4194FF2239928BA890B07E9CF92AAA8FD7C191392E2145199159BBDD1 +[1de9 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1dea 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1deb 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1dec 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1ded 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1def 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1df0 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1df1 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1df2 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1df3 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df4 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1dee 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1df5 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df6 10-14 19:01:42.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df7 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1df8 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df9 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1dfa 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1dfb 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +[1dfc 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1dfe 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 68 e8 9a 99 fc 12 bc c5 83 de |0E.!..h.........| +00000010 71 57 4f c2 9e 92 d1 0e f4 75 fc 3f 32 62 8f af |qWO......u.?2b..| +00000020 89 80 17 59 fd 02 20 20 f9 8e c3 97 3f 53 ab e1 |...Y.. ....?S..| +00000030 0b 17 63 89 88 72 2b 09 12 69 d8 5d 4d 93 5d ec |..c..r+..i.]M.].| +00000040 fc 46 9e 0d 38 d7 74 |.F..8.t| +[1dff 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1e00 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1e01 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e02 10-14 19:01:42.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e03 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e04 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e05 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e06 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e07 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e08 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e09 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1e0a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0b 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e0c 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e0d 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e0e 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e0f 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e10 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e11 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 gate 1602702102633046400 evaluation starts +[1e12 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 signed by 0 principal evaluation starts (used [false]) +[1e13 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 processing identity 0 with bytes of 115a6c0 +[1e14 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 principal matched by identity 0 +[1e15 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f b4 ef b9 73 32 c4 cd 7d e4 39 23 78 cd 25 e3 |....s2..}.9#x.%.| +00000010 93 fa c4 2c a8 ae 7e 0a bd 91 59 4f 3d 53 82 a2 |...,..~...YO=S..| +[1e16 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 42 20 c7 9b 47 27 a8 45 62 74 |0E.!..B ..G'.Ebt| +00000010 c6 64 73 ed 3b 2a 8d 6c 5e bf bf 29 b7 48 db 55 |.ds.;*.l^..).H.U| +00000020 a5 58 81 54 73 02 20 60 62 18 10 09 8f 17 0c 0d |.X.Ts. `b.......| +00000030 3c c2 62 28 b1 27 a2 c9 b7 23 c9 2a b8 a2 cf 34 |<.b(.'...#.*...4| +00000040 20 54 85 f2 2e 2d 0e | T...-.| +[1e17 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 principal evaluation succeeds for identity 0 +[1e18 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004389350 gate 1602702102633046400 evaluation succeeds +[1e19 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e1a 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e1b 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e1c 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e1d 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e1e 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e1f 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e20 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +[1e22 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +00000040 d5 17 30 4b 07 19 61 |..0K..a| +[1e21 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e23 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e24 10-14 19:01:42.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e25 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1e26 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +[1e27 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e29 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e2a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e2b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e2c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1e2d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e2e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e2f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e30 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e31 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e32 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e33 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1e34 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c e4 ed c4 19 4f f2 23 99 28 ba 89 0b 07 e9 cf |l....O.#.(......| +00000010 92 aa a8 fd 7c 19 13 92 e2 14 51 99 15 9b bd d1 |....|.....Q.....| +[1e35 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 0a 39 64 2f 07 54 7b 1d 97 3b |0E.!...9d/.T{..;| +00000010 a4 2b f6 59 a4 f0 1b 59 3c 4e a4 f7 2a 68 f6 10 |.+.Y...Y DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e37 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e38 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e39 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e3a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d9 03 7f bc 0c e7 a0 a8 dc ff ad 9a 45 8f ec |.............E..| +00000010 8f 5b c3 ef 5b 35 26 23 40 cc af 82 70 57 16 6b |.[..[5&#@...pW.k| +[1e3b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 3c 22 7f 0b 54 64 6f 22 07 71 |0E.!..<"..Tdo".q| +00000010 73 ed 64 09 ae ba c9 01 0d f4 6a 07 45 cb cb a2 |s.d.......j.E...| +00000020 21 8d aa 1c 6a 02 20 39 47 a8 3f cd d6 c5 69 8b |!...j. 9G.?...i.| +00000030 aa 14 00 36 59 ec a7 f8 1a 40 02 19 c4 8e cc 24 |...6Y....@.....$| +00000040 d5 17 30 4b 07 19 61 |..0K..a| +[1e3c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e3d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e3e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1e3f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e40 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e41 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e42 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e43 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e44 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e45 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e46 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 gate 1602702102646286000 evaluation starts +[1e47 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 signed by 0 principal evaluation starts (used [false]) +[1e48 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 processing identity 0 with bytes of 115a6c0 +[1e49 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 principal matched by identity 0 +[1e4a 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 9f c1 89 ef 25 5a 8b 47 6d e0 b4 4d 9c e7 15 |.....%Z.Gm..M...| +00000010 a4 56 77 d9 20 9d d8 fb 9b 4d bb fd ff 89 51 66 |.Vw. ....M....Qf| +[1e4b 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 91 fa b1 f7 f3 5a 43 88 90 34 |0E.!.......ZC..4| +00000010 70 c0 39 ab 9c 41 75 b8 a4 69 cf 09 cd 43 5d 25 |p.9..Au..i...C]%| +00000020 23 2b 2e b8 57 02 20 18 84 46 2d 7f 44 1f 53 eb |#+..W. ..F-.D.S.| +00000030 4f 64 23 e6 25 51 52 27 0d af c5 3f 25 0b 8d 1f |Od#.%QR'...?%...| +00000040 67 37 65 1c 99 ab e7 |g7e....| +[1e4c 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 principal evaluation succeeds for identity 0 +[1e4d 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c4cb0 gate 1602702102646286000 evaluation succeeds +[1e4e 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e4f 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e50 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e51 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e52 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e53 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e54 10-14 19:01:42.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e55 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e56 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e57 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e58 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e59 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e5a 10-14 19:01:42.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5b 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1e5c 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 b9 a9 af ce 4a d2 55 5e 3d 59 0f 69 62 e7 41 |B....J.U^=Y.ib.A| +00000010 d6 76 6a 0d 71 58 ab c2 88 bb 47 32 c5 8b 59 0f |.vj.qX....G2..Y.| +[1e5d 10-14 19:01:43.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e a3 f2 6e 80 5b 56 cd 16 db 7a 7a |0D. ~..n.[V...zz| +00000010 b9 28 7e db 2f 7f ad f6 b4 5c 38 62 80 b4 97 b1 |.(~./....\8b....| +00000020 56 84 23 74 02 20 60 42 bf d2 9e 6f 73 7f 66 10 |V.#t. `B...os.f.| +00000030 88 ca 24 5c 69 db 99 17 5f a8 07 f9 21 25 3d cd |..$\i..._...!%=.| +00000040 7b 59 16 ac e1 9e |{Y....| +[1e5e 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e5f 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e60 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e61 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[1e62 10-14 19:01:43.37 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[1e63 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e64 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e65 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e66 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e67 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1e68 10-14 19:01:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e69 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e6a 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e6b 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e6c 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e6d 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e6e 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e6f 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 gate 1602702105175146000 evaluation starts +[1e70 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 signed by 0 principal evaluation starts (used [false]) +[1e71 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 processing identity 0 with bytes of 115a6c0 +[1e72 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 principal matched by identity 0 +[1e73 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d c0 d5 37 60 6c ee f2 75 b0 fa 74 d3 90 16 4b |M..7`l..u..t...K| +00000010 51 3e 53 ef 2f 15 02 47 63 50 16 ae bb fd 74 e5 |Q>S./..GcP....t.| +[1e74 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af de c6 3a 6f 91 e8 6e 9a da bc |0E.!....:o..n...| +00000010 24 e0 3a 99 0a e6 1a 58 26 6f 9f 32 ef 9f 76 fa |$.:....X&o.2..v.| +00000020 3b 59 b4 66 6a 02 20 28 68 d3 6a fa 40 64 37 cf |;Y.fj. (h.j.@d7.| +00000030 a0 47 3f 34 03 a8 09 36 aa 20 85 b3 54 e1 40 07 |.G?4...6. ..T.@.| +00000040 28 11 45 2e 29 c9 0a |(.E.)..| +[1e75 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 principal evaluation succeeds for identity 0 +[1e76 10-14 19:01:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043eea70 gate 1602702105175146000 evaluation succeeds +[1e77 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e78 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e79 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e7a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e7b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e7c 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e7d 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e7e 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e7f 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1e80 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e81 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e82 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e83 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e84 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e85 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e86 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e87 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e88 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e89 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8a 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8b 10-14 19:01:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8c 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8d 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8e 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e8f 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e90 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e91 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e92 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e93 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e94 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e95 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e96 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e97 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e98 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e99 10-14 19:01:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e9a 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e9b 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e9c 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e9d 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e9e 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1e9f 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea0 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ea1 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ea2 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ea3 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ea4 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ea5 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ea6 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 gate 1602702105268540200 evaluation starts +[1ea7 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 signed by 0 principal evaluation starts (used [false]) +[1ea8 10-14 19:01:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 processing identity 0 with bytes of 115a6c0 +[1ea9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 principal matched by identity 0 +[1eaa 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 27 fd 42 65 78 02 08 25 0b 6a 9a d0 49 e3 d0 9c |'.Bex..%.j..I...| +00000010 94 a0 9b 84 5e 07 1e b1 bb 8e 63 28 d9 1b b9 62 |....^.....c(...b| +[1eab 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bf 6b dd 52 2c 78 e7 17 1d 7f 8e |0E.!..k.R,x.....| +00000010 96 d7 dc 2d 41 84 ca 93 dc ea de 22 52 27 6e f6 |...-A......"R'n.| +00000020 e1 49 46 6e c6 02 20 20 6a 61 6e 7e 3b 9d 4c ba |.IFn.. jan~;.L.| +00000030 9b c8 ad 5b 3a 7f d5 8d 47 a3 d6 54 e5 42 b2 d3 |...[:...G..T.B..| +00000040 d4 d0 f7 98 1d 2b ba |.....+.| +[1eac 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 principal evaluation succeeds for identity 0 +[1ead 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00441e800 gate 1602702105268540200 evaluation succeeds +[1eae 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1eaf 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1eb0 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1eb1 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1eb2 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1eb3 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1eb4 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1eb5 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1eb6 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1eb7 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1eb8 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1eb9 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eba 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebb 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebc 10-14 19:01:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebd 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ebe 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebf 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ec0 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec1 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ec2 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec3 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec4 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec5 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec6 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec7 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec8 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec9 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1eca 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ecb 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ecc 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ecd 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ece 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ecf 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ed0 10-14 19:01:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed1 10-14 19:01:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ed2 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed3 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ed4 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1ed5 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a cc f9 94 84 77 83 f5 1e 8d 48 77 ec a3 ad af |*....w....Hw....| +00000010 3d f4 b3 71 d8 80 ba 17 3b 0d ad 74 85 02 16 a2 |=..q....;..t....| +[1ed6 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 24 49 15 22 93 d5 f1 59 82 1f 2d |0D. c$I."...Y..-| +00000010 29 13 44 5c 32 47 6d 52 66 be 89 ff 57 08 c0 54 |).D\2GmRf...W..T| +00000020 8f 22 1f 6d 02 20 7a f6 07 13 c9 3b 87 6f ef b5 |.".m. z....;.o..| +00000030 c3 0c 75 29 85 27 26 e3 54 14 a7 bd ba 05 91 26 |..u).'&.T......&| +00000040 ee df 14 f9 95 ca |......| +[1ed7 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ed8 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1ed9 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1eda 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1edb 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1edc 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1edd 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ede 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1edf 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ee0 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ee1 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ee2 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1ee3 10-14 19:01:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ee4 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1ee5 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ee6 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ee7 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ee8 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ee9 10-14 19:01:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eea 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eeb 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eec 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eed 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eee 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1eef 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ef0 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef1 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1ef2 10-14 19:01:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef3 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ef4 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161021 +[1ef5 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA9C719F67232BAC2CE5B3888CFBD1F326C745938AA11914CC08CE63D6BC4A9C +[1ef6 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ef7 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1ef8 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1ef9 10-14 19:01:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1efa 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efb 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efc 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1efd 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1efe 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1eff 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f00 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1f01 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f02 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f03 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f04 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f05 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f06 10-14 19:01:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f07 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f08 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f09 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1f0a 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f0b 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f0c 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f0d 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f0e 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1f0f 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1f10 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f11 10-14 19:01:45.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1f12 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1f13 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1f14 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1f15 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f16 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f17 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f18 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f19 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f1a 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f1b 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f1c 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f1d 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 gate 1602702105933919200 evaluation starts +[1f1e 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 signed by 0 principal evaluation starts (used [false]) +[1f1f 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 processing identity 0 with bytes of 115a6c0 +[1f20 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 principal matched by identity 0 +[1f21 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1f22 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1f23 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 principal evaluation succeeds for identity 0 +[1f24 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044924d0 gate 1602702105933919200 evaluation succeeds +[1f25 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f26 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f27 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f28 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f29 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2a 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f2b 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f2c 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f2e 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f2f 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f30 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f31 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f32 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 gate 1602702105937970600 evaluation starts +[1f33 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 signed by 0 principal evaluation starts (used [false]) +[1f34 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 processing identity 0 with bytes of 115a6c0 +[1f35 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 principal matched by identity 0 +[1f2d 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1f36 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1f38 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1f39 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 principal evaluation succeeds for identity 0 +[1f3a 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004493750 gate 1602702105937970600 evaluation succeeds +[1f3b 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f3c 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f3d 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f37 10-14 19:01:45.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f3e 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1f3f 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f40 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f41 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1f42 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1f43 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1f44 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1f45 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1f46 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f47 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f48 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f49 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f4a 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f4b 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f4c 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f4d 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f4e 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 gate 1602702105948334200 evaluation starts +[1f4f 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 signed by 0 principal evaluation starts (used [false]) +[1f50 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 processing identity 0 with bytes of 115a6c0 +[1f51 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 principal matched by identity 0 +[1f52 10-14 19:01:45.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1f53 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1f54 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 principal evaluation succeeds for identity 0 +[1f55 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b9650 gate 1602702105948334200 evaluation succeeds +[1f56 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f57 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f58 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f59 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f5a 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5b 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5c 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5d 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1f5e 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f5f 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f60 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1f61 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1f62 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f63 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f64 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f65 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f66 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f67 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f68 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f69 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f6a 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 gate 1602702105959501600 evaluation starts +[1f6b 10-14 19:01:45.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 signed by 0 principal evaluation starts (used [false]) +[1f6c 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 processing identity 0 with bytes of 115a6c0 +[1f6d 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 principal matched by identity 0 +[1f6e 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1f6f 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1f70 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 principal evaluation succeeds for identity 0 +[1f71 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044da850 gate 1602702105959501600 evaluation succeeds +[1f72 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f73 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f74 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f75 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f76 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f77 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1f78 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f79 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[1f7a 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[1f7b 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f7c 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f7d 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f7e 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f7f 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f80 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f81 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f82 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f83 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 gate 1602702105968094100 evaluation starts +[1f84 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 signed by 0 principal evaluation starts (used [false]) +[1f85 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 processing identity 0 with bytes of 115a6c0 +[1f86 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 principal matched by identity 0 +[1f87 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[1f88 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[1f89 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 principal evaluation succeeds for identity 0 +[1f8a 10-14 19:01:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f8390 gate 1602702105968094100 evaluation succeeds +[1f8b 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f8c 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f8d 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f8e 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f8f 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f90 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f91 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f92 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f93 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f94 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f95 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f96 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f97 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 gate 1602702105972442700 evaluation starts +[1f98 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 signed by 0 principal evaluation starts (used [false]) +[1f99 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 processing identity 0 with bytes of 115a6c0 +[1f9a 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 principal matched by identity 0 +[1f9b 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[1f9c 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[1f9d 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 principal evaluation succeeds for identity 0 +[1f9e 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f9590 gate 1602702105972442700 evaluation succeeds +[1f9f 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fa0 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1fa1 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1fa2 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1fa3 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[1fa4 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[1fa5 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa6 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1fa7 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1fa8 10-14 19:01:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa9 10-14 19:01:46.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1faa 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fab 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1fac 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fad 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fae 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1faf 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fb0 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fb1 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fb2 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1fb3 10-14 19:01:46.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fb4 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fb5 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fb6 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fb7 10-14 19:01:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1fb8 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1fb9 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fba 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fbb 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fbc 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fbd 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1fbe 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fbf 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fc0 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 gate 1602702106199014800 evaluation starts +[1fc1 10-14 19:01:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 signed by 0 principal evaluation starts (used [false]) +[1fc2 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 processing identity 0 with bytes of 115a6c0 +[1fc3 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 principal matched by identity 0 +[1fc4 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +[1fc5 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +00000040 9c af 37 6c d0 d4 |..7l..| +[1fc6 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 principal evaluation succeeds for identity 0 +[1fc7 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044affb0 gate 1602702106199014800 evaluation succeeds +[1fc8 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fc9 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1fca 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1fcb 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1fcc 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1fcd 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1fce 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1fcf 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1fd0 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1fd1 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd2 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd3 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1fd4 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fd5 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fd6 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fd7 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fd8 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1fd9 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1fda 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fdb 10-14 19:01:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1fdc 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fdd 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fde 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1fdf 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe0 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe1 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe2 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe3 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe4 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe5 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1fe6 10-14 19:01:46.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fe7 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fe8 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe9 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fea 10-14 19:01:46.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1feb 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +[1fec 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +[1fed 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fee 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > > , Envelope: 165 bytes, Signature: 0 bytes +[1fef 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1ff0 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ff1 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ff2 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ff3 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ff4 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ff5 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ff6 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ff7 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 gate 1602702106315074600 evaluation starts +[1ff8 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 signed by 0 principal evaluation starts (used [false]) +[1ff9 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 processing identity 0 with bytes of 115a6c0 +[1ffa 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 principal matched by identity 0 +[1ffb 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +[1ffc 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +00000040 bf 13 24 fd f6 62 |..$..b| +[1ffd 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 principal evaluation succeeds for identity 0 +[1ffe 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004531c00 gate 1602702106315074600 evaluation succeeds +[1fff 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2000 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2001 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2002 10-14 19:01:46.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2003 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2004 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2005 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2006 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2007 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2008 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2009 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[200a 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[200b 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[200c 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[200d 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[200e 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[200f 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[2010 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2012 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2011 10-14 19:01:46.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +[2013 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2014 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2015 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2016 10-14 19:01:46.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2017 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2018 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2019 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[201a 10-14 19:01:46.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[201b 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[201c 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[201d 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[201e 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[201f 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +[2020 10-14 19:01:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +00000040 04 ef 12 ab 45 ef |....E.| +[2021 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2022 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 0d 48 d5 cb 7e 52 c3 93 f1 13 |0E.!...H..~R....| +00000010 c5 45 63 9c a9 19 1a be 0d 1f 17 75 65 6f ab 3d |.Ec........ueo.=| +00000020 8e b2 10 da af 02 20 4d 0f 09 d7 94 f0 e9 f0 f3 |...... M........| +00000030 de 79 6e 93 f0 81 9f 0d 43 03 7b ff d8 f6 dd cd |.yn.....C.{.....| +00000040 d4 ee cc 4f 37 50 37 |...O7P7| +[2023 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2024 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2025 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2026 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2027 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2028 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2029 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202a 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202b 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[202c 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202d 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202e 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[202f 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2030 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2031 10-14 19:01:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2032 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2033 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2034 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2035 10-14 19:01:46.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2036 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2037 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2038 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[203a 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[203b 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[203c 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2039 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[203d 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[203e 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[203f 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2040 10-14 19:01:46.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2041 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2042 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2043 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2044 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2045 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2046 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2047 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2048 10-14 19:01:46.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2049 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[204a 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161022 +[204b 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6C13DB87F533CC2248DC6EA757633380902C4A4A5CDCB7DF38C3CCCC427F0E44 +[204c 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[204d 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[204e 10-14 19:01:46.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[204f 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2050 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2051 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2052 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2053 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2054 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2055 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2056 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2057 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2058 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2059 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[205a 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[205b 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[205c 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[205d 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[205e 10-14 19:01:46.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[205f 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2060 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2061 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2062 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2063 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2064 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2065 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2066 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 gate 1602702106623688200 evaluation starts +[2067 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 signed by 0 principal evaluation starts (used [false]) +[2068 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 processing identity 0 with bytes of 115a6c0 +[2069 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 principal matched by identity 0 +[206a 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 73 c3 e7 ac fe 3f 42 d8 72 1c 46 9e 55 38 2a |is....?B.r.F.U8*| +00000010 01 8c c8 4d dd e3 b2 1a fc a2 f7 72 9b 01 f9 be |...M.......r....| +[206b 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 38 16 54 0a f7 0b d2 e7 3e 05 e3 |0D. 58.T.....>..| +00000010 83 d4 b1 5b d8 36 3a 62 3a 13 9d a5 7d 9f c6 df |...[.6:b:...}...| +00000020 a2 c7 5b 72 02 20 68 06 d4 1a 8c f0 64 9f 31 46 |..[r. h.....d.1F| +00000030 36 c0 5a d8 01 66 eb 71 6e 71 1e cf 3f 0e 5f 9a |6.Z..f.qnq..?._.| +00000040 bf 13 24 fd f6 62 |..$..b| +[206c 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[206d 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 principal evaluation succeeds for identity 0 +[206f 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004587db0 gate 1602702106623688200 evaluation succeeds +[206e 10-14 19:01:46.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2070 10-14 19:01:46.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2071 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2072 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2073 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2074 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2075 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2076 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2077 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2078 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +[2079 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +00000040 04 ef 12 ab 45 ef |....E.| +[207a 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[207b 10-14 19:01:46.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[207c 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[207d 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +[207e 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +00000040 5b 36 93 4f f5 a4 91 |[6.O...| +[207f 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2080 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2081 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2082 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2083 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2085 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2084 10-14 19:01:46.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2086 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2087 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2088 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2089 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[208a 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[208b 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[208c 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +[208d 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +00000040 5b 36 93 4f f5 a4 91 |[6.O...| +[208e 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[208f 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 b4 a8 9e ad fe e9 65 73 a4 2b |0E.!........es.+| +00000010 4c 75 81 a6 d4 bf 9d 23 2f 78 91 b4 94 45 9c 45 |Lu.....#/x...E.E| +00000020 30 0c f0 32 56 02 20 3d 6b 6f 7a c4 5e 65 23 e7 |0..2V. =koz.^e#.| +00000030 4c fd 33 fe f4 de d1 89 17 2a 53 a1 d1 fa fd d0 |L.3......*S.....| +00000040 72 cc 60 de 25 a3 9f |r.`.%..| +[2090 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2091 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2092 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2093 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2094 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2095 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2096 10-14 19:01:46.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2097 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2098 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2099 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[209a 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[209b 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[209c 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[209d 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[209e 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 gate 1602702106674480600 evaluation starts +[209f 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 signed by 0 principal evaluation starts (used [false]) +[20a0 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 processing identity 0 with bytes of 115a6c0 +[20a1 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 principal matched by identity 0 +[20a2 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d ad 6d 81 39 a2 b3 40 89 d0 8c 19 a4 2d 90 0a |-.m.9..@.....-..| +00000010 d1 8e 23 d9 ab c2 0c eb a3 f5 5f b1 2e ee 5a 4a |..#......._...ZJ| +[20a3 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 75 17 cd ab b0 51 05 d4 f5 f2 6b |0D. ou....Q....k| +00000010 8d 5b 64 4b 27 f1 00 99 d0 54 1e 87 90 bc 9c 76 |.[dK'....T.....v| +00000020 86 fe 5d 96 02 20 4d b0 99 73 0c 45 4c 2d 08 e1 |..].. M..s.EL-..| +00000030 6c d5 24 75 e3 8c a3 6d db dc 95 ca 0c cf 11 f5 |l.$u...m........| +00000040 9c af 37 6c d0 d4 |..7l..| +[20a4 10-14 19:01:46.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 principal evaluation succeeds for identity 0 +[20a5 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004606a70 gate 1602702106674480600 evaluation succeeds +[20a6 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20a7 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20a8 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20a9 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20aa 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20ab 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ac 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[20ad 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6c 13 db 87 f5 33 cc 22 48 dc 6e a7 57 63 33 80 |l....3."H.n.Wc3.| +00000010 90 2c 4a 4a 5c dc b7 df 38 c3 cc cc 42 7f 0e 44 |.,JJ\...8...B..D| +[20ae 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 06 c4 71 cf 56 54 d6 40 00 e3 |0E.!....q.VT.@..| +00000010 de 13 15 2b d3 9f 09 86 1d 9a c1 cc 59 93 91 92 |...+........Y...| +00000020 68 5a f3 2c 84 02 20 72 2d e2 c8 44 56 c3 4b 58 |hZ.,.. r-..DV.KX| +00000030 9a 9e eb c5 ed da a5 56 9e 32 07 24 ed cb fd 8c |.......V.2.$....| +00000040 5b 36 93 4f f5 a4 91 |[6.O...| +[20af 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[20b0 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[20b1 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b2 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[20b3 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f 75 7a be 33 6a 9a 26 d9 b7 5d 3b e2 39 2c ec |Ouz.3j.&..];.9,.| +00000010 7c 01 8d b5 9f 38 16 54 20 ea 05 73 6d e6 5b eb ||....8.T ..sm.[.| +[20b4 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 c7 10 d6 b6 ec 1a 98 6d 42 19 85 |0D. 5.......mB..| +00000010 d0 7d 6a d6 6a 25 af 40 82 68 c7 54 81 e6 02 ee |.}j.j%.@.h.T....| +00000020 97 db bb 7d 02 20 39 66 ee 1f 6c 13 c1 2e 55 8e |...}. 9f..l...U.| +00000030 aa ea e4 c0 95 86 48 9b 1a 2d 0a 80 c7 39 79 eb |......H..-...9y.| +00000040 04 ef 12 ab 45 ef |....E.| +[20b5 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20b6 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b7 10-14 19:01:46.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b8 10-14 19:01:46.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20b9 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20ba 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bb 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bc 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bd 10-14 19:01:46.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20be 10-14 19:01:48.13 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-661820114/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-661820114/000006.o: In function `_cgo_26061493d47f_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:58: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +[20bf 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[20c0 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f 1f 79 cd 43 0e d3 70 70 ca c7 e5 0c 4f 7c c8 |_.y.C..pp....O|.| +00000010 21 d5 72 a6 6e 77 95 0c 4e d7 78 79 23 27 d2 d6 |!.r.nw..N.xy#'..| +[20c1 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 91 6a 47 67 26 b5 90 21 55 ad 2a |0D. ..jGg&..!U.*| +00000010 de 8f ce 80 5b 71 92 da 60 46 3f 85 95 e2 51 7e |....[q..`F?...Q~| +00000020 a9 63 2a 12 02 20 15 20 82 54 c1 c5 94 16 5d f8 |.c*.. . .T....].| +00000030 96 3c ce 7d fb c5 ed 0c 90 ef 0b da a4 b7 58 89 |.<.}..........X.| +00000040 67 2c 4e c1 59 bd |g,N.Y.| +[20c2 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20c3 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c4 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c5 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[20c6 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[20c7 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[20c8 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[20c9 10-14 19:01:48.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[20ca 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20cb 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20cc 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[20cd 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20ce 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20cf 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20d0 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d1 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[20d2 10-14 19:01:49.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[20d4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[20d5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[20d7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[20d8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20da 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20db 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20dc 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20dd 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20de 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20df 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20e0 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 gate 1602702109893618500 evaluation starts +[20e1 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 signed by 0 principal evaluation starts (used [false]) +[20e2 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 processing identity 0 with bytes of 115a6c0 +[20e3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 principal matched by identity 0 +[20e4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[20e5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[20e6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 principal evaluation succeeds for identity 0 +[20e7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad0940 gate 1602702109893618500 evaluation succeeds +[20e8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20e9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20ea 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20eb 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20ec 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ed 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ee 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20ef 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20f0 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20f1 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20f2 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20f3 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20f4 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 gate 1602702109894603000 evaluation starts +[20f5 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 signed by 0 principal evaluation starts (used [false]) +[20f6 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 processing identity 0 with bytes of 115a6c0 +[20f7 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 principal matched by identity 0 +[20f8 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[20f9 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[20fa 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 principal evaluation succeeds for identity 0 +[20fb 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad1b50 gate 1602702109894603000 evaluation succeeds +[20fc 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20fd 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20fe 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20ff 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2100 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[2101 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[2102 10-14 19:01:49.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2103 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2104 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[2105 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[2106 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[2107 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[2108 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2109 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[210a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[210b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[210c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[210d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[210e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[210f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2110 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 gate 1602702109905790500 evaluation starts +[2111 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 signed by 0 principal evaluation starts (used [false]) +[2112 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 processing identity 0 with bytes of 115a6c0 +[2113 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 principal matched by identity 0 +[2114 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[2115 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[2116 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 principal evaluation succeeds for identity 0 +[2117 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b039f0 gate 1602702109905790500 evaluation succeeds +[2118 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2119 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[211a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[211b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[211c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[211e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[211f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2120 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2121 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2122 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2123 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2124 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 gate 1602702109906582300 evaluation starts +[2125 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 signed by 0 principal evaluation starts (used [false]) +[2126 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 processing identity 0 with bytes of 115a6c0 +[2127 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 principal matched by identity 0 +[2128 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[2129 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[212a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 principal evaluation succeeds for identity 0 +[212b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a26bf0 gate 1602702109906582300 evaluation succeeds +[212c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[212d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[212e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[212f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2130 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2131 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2132 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2133 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2134 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[2135 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[2136 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[2137 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[2138 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2139 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[213a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[213b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[213c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[213d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[213e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[213f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2140 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 gate 1602702109908325300 evaluation starts +[2141 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 signed by 0 principal evaluation starts (used [false]) +[2142 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 processing identity 0 with bytes of 115a6c0 +[2143 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 principal matched by identity 0 +[2144 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[2145 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[2146 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 principal evaluation succeeds for identity 0 +[2147 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b8f60 gate 1602702109908325300 evaluation succeeds +[2148 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2149 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[214a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[214b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[214c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[214d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[214e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[214f 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2150 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2151 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2152 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2153 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2154 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 gate 1602702109909436200 evaluation starts +[2155 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 signed by 0 principal evaluation starts (used [false]) +[2156 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 processing identity 0 with bytes of 115a6c0 +[2157 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 principal matched by identity 0 +[2158 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[2159 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[215a 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 principal evaluation succeeds for identity 0 +[215b 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003888220 gate 1602702109909436200 evaluation succeeds +[215c 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[215d 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[215e 10-14 19:01:49.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[215f 10-14 19:01:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2160 10-14 19:01:49.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2161 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2162 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2163 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2164 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2165 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2166 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[2167 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2168 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2169 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[216a 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[216b 10-14 19:01:49.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[216c 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[216d 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[216e 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[216f 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2170 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2171 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2172 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2173 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2174 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2175 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2176 10-14 19:01:50.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2177 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2178 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2179 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[217a 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[217b 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[217c 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[217d 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[217e 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[217f 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2180 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2181 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2182 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2183 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 gate 1602702110138671600 evaluation starts +[2184 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 signed by 0 principal evaluation starts (used [false]) +[2185 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 processing identity 0 with bytes of 115a6c0 +[2186 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 principal matched by identity 0 +[2187 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 5f f2 3b fc 57 f6 78 e3 33 5c be 31 ae 40 7b |3_.;.W.x.3\.1.@{| +00000010 35 31 b8 5c 5d 2c 21 ca 9a f0 61 ea 04 27 33 35 |51.\],!...a..'35| +[2188 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 0a 4e 6b ac 0c 9f 08 f0 87 66 9c |0D. r.Nk......f.| +00000010 bf 03 eb 4e 08 f0 b4 ac b0 b0 90 35 cf c6 b0 36 |...N.......5...6| +00000020 16 48 af c1 02 20 5e 5d f7 a1 0a a7 26 23 5e 97 |.H... ^]....&#^.| +00000030 46 1e 47 4d 3e 03 9c d8 7e ac 0a 15 ba 87 e5 af |F.GM>...~.......| +00000040 91 9c 8a 8a 82 fc |......| +[2189 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 principal evaluation succeeds for identity 0 +[218a 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038581e0 gate 1602702110138671600 evaluation succeeds +[218b 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[218c 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[218d 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[218e 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[218f 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2190 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2191 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2192 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2193 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2194 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2195 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2196 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2197 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2198 10-14 19:01:50.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2199 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[219a 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[219b 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[219c 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[219d 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[219e 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[219f 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a0 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a1 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a2 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a3 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21a4 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21a5 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21a6 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21a7 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21a8 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21a9 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21aa 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21ab 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ac 10-14 19:01:50.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21ad 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ae 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21af 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21b0 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b1 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[21b2 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[21b3 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21b4 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21b5 10-14 19:01:50.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21b6 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21b7 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21b8 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21b9 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21ba 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 gate 1602702110161676000 evaluation starts +[21bb 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 signed by 0 principal evaluation starts (used [false]) +[21bc 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 processing identity 0 with bytes of 115a6c0 +[21bd 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 principal matched by identity 0 +[21be 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +[21bf 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +00000040 ed 4e e7 a9 fc f4 |.N....| +[21c0 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 principal evaluation succeeds for identity 0 +[21c1 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003802e10 gate 1602702110161676000 evaluation succeeds +[21c2 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21c3 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21c4 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21c5 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21c6 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21c7 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[21c8 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[21c9 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[21ca 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[21cb 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21cc 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21cd 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ce 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[21cf 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d0 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d1 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d2 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[21d3 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\343\203\324\261[\3306:b:\023\235\245}\237\306\337\242\307[r\002 h\006\324\032\214\360d\2371F6\300Z\330\001f\353qnq\036\317?\016_\232\277\023$\375\366b" > alive: +[21d4 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21d5 10-14 19:01:50.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d6 10-14 19:01:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21d9 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21d7 10-14 19:01:50.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21d8 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21da 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21dc 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21db 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21dd 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[21de 10-14 19:01:50.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21df 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21e0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21e1 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21e2 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21e3 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21e4 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21e5 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 gate 1602702110258933700 evaluation starts +[21e6 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 signed by 0 principal evaluation starts (used [false]) +[21e7 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 processing identity 0 with bytes of 115a6c0 +[21e8 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 principal matched by identity 0 +[21e9 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f f7 c2 85 6f 12 61 82 a6 ae e3 60 2d a4 ca a4 |/...o.a....`-...| +00000010 c5 d7 fa e0 72 bb f9 2e 9c 43 00 18 c7 e7 b4 34 |....r....C.....4| +[21ea 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 b0 f2 f0 6f 0d c3 f5 ac 77 30 |0E.!.....o....w0| +00000010 1d a9 c3 35 fd b1 76 44 fe be c3 f5 36 4b 95 ff |...5..vD....6K..| +00000020 d4 52 7e f2 38 02 20 72 6e b5 33 6d e5 d1 29 a4 |.R~.8. rn.3m..).| +00000030 61 c4 fc 8e 56 0e af b7 5e 57 03 78 44 ae 38 e9 |a...V...^W.xD.8.| +00000040 0e a3 b9 3a e5 35 57 |...:.5W| +[21eb 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 principal evaluation succeeds for identity 0 +[21ec 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c9070 gate 1602702110258933700 evaluation succeeds +[21ed 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[21ee 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[21ef 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[21f0 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[21f1 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21f2 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[21f3 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[21f4 10-14 19:01:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[21f5 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[21f6 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21f7 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21f8 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21f9 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[21fa 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21fb 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21fc 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21fd 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21fe 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ff 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2200 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2201 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2202 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2203 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2204 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2205 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2206 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2207 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2208 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2209 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[220a 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[220b 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220c 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[220d 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220e 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[220f 10-14 19:01:50.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2210 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2211 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2212 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2213 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2215 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2214 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2216 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2217 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2218 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[221a 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2219 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221b 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[221e 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221f 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2220 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2221 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2222 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2223 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2224 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2225 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 gate 1602702110296578300 evaluation starts +[2226 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 signed by 0 principal evaluation starts (used [false]) +[2227 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 processing identity 0 with bytes of 115a6c0 +[2228 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 principal matched by identity 0 +[2229 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +[222a 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +00000040 98 8b 06 b0 3b 10 |....;.| +[222b 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 principal evaluation succeeds for identity 0 +[222c 10-14 19:01:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037643b0 gate 1602702110296578300 evaluation succeeds +[222d 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[222e 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[222f 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2230 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2231 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[221c 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[221d 10-14 19:01:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2232 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2233 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2234 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2235 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2236 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2237 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2238 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2239 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[223a 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[223b 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223c 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223d 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223e 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[223f 10-14 19:01:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2240 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2241 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2242 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2243 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2244 10-14 19:01:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2245 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2246 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2247 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2248 10-14 19:01:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2249 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[224a 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[224b 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[224c 10-14 19:01:50.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[224d 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[224e 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[224f 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2250 10-14 19:01:50.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2251 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 4a 8d 3c 07 fd d1 a3 2c 7b 0b 1b ad 48 91 1c |.J.<....,{...H..| +00000010 01 b1 3f 2f 9d 50 db b0 2a 1a ae 19 e7 46 5b af |..?/.P..*....F[.| +[2252 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed fa 2e 37 07 30 d1 e7 d3 e8 a9 |0E.!....7.0.....| +00000010 44 98 b7 06 36 54 3c 24 db 77 0a 51 7d e0 e9 22 |D...6T<$.w.Q}.."| +00000020 46 cf 25 1f 2c 02 20 68 47 93 54 d1 55 9b 4a 9b |F.%.,. hG.T.U.J.| +00000030 10 f0 fa ee 76 e9 c9 eb 9a b4 c0 de cf 42 98 0a |....v........B..| +00000040 7f 76 c9 31 ec b7 54 |.v.1..T| +[2253 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2254 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2255 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2256 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2257 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2258 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2259 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[225a 10-14 19:01:50.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[225b 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[225c 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[225d 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[225e 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2260 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[225f 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2261 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2263 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2262 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2264 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2265 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2266 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2267 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[226a 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[226b 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[226c 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2268 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[226d 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2269 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[226e 10-14 19:01:50.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[226f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2270 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2271 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2272 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2273 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +[2274 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +00000040 a9 3d f4 36 c6 7a |.=.6.z| +[2275 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2276 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 d4 95 0f 82 db e4 e8 30 8f 98 |0E.!.........0..| +00000010 e1 ed 77 2e c1 c7 e5 a1 5a c6 e9 90 03 de e8 b5 |..w.....Z.......| +00000020 b7 5f e9 ca c5 02 20 50 7f c5 15 e1 be 0c 44 37 |._.... P......D7| +00000030 71 65 b9 18 c9 6b 61 bb 8f 52 10 b0 fc 60 43 31 |qe...ka..R...`C1| +00000040 48 c3 07 e1 6d ff fc |H...m..| +[2277 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2278 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2279 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[227a 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[227b 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[227c 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227d 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227e 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[227f 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2280 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2281 10-14 19:01:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2282 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[2283 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2284 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2285 10-14 19:01:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2286 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2287 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2288 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2289 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[228a 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[228b 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[228c 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[228d 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[228e 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[228f 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2290 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2291 10-14 19:01:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2292 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2293 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2294 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2295 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2296 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2297 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2298 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2299 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[229a 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[229b 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[229c 10-14 19:01:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[229d 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[229e 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161023 +[229f 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3A4EC816338DE3908309EC1512329F3E3572DC55A8004984A9EF36EEC1420B96 +[22a0 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[22a1 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[22a2 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[22a3 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[22a4 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a5 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a6 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a7 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[22a8 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22a9 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[22aa 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[22ab 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22ac 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22ad 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22ae 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22af 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22b0 10-14 19:01:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22b1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[22b2 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161024 +[22b3 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 530BAD755692BEB3D71261702654172AB46FF3ABB69AAEAEBF0691BF827DDD8F +[22b4 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[22b5 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[22b6 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[22b7 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[22b8 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22b9 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[22ba 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22bb 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[22bc 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[22bd 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22be 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[22bf 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c0 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[22c1 10-14 19:01:50.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c2 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22c3 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[22c4 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22c5 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c6 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c7 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c8 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c9 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[22ca 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22cb 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[22cc 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[22cd 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ce 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[22d0 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[22d1 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[22d2 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[22cf 10-14 19:01:50.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[22d3 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22d4 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[22d5 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[22d6 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 gate 1602702110627072700 evaluation starts +[22d7 10-14 19:01:50.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 signed by 0 principal evaluation starts (used [false]) +[22d8 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 processing identity 0 with bytes of 115a6c0 +[22d9 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 principal matched by identity 0 +[22da 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 52 1d 82 09 a6 6d 0b cc a4 ad cf 40 ce 01 70 |.R....m.....@..p| +00000010 02 d2 13 d2 62 d8 cd 05 a3 b9 11 fe 07 c9 e4 ac |....b...........| +[22db 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c f9 11 d1 36 a7 49 ac 87 e7 d8 d4 |0D. |...6.I.....| +00000010 f6 3d f6 fc 9c c8 e7 7e da b4 96 21 fa 4e 61 bf |.=.....~...!.Na.| +00000020 56 4a bd 0d 02 20 63 c7 a6 a0 a2 b0 08 c2 ce 3d |VJ... c........=| +00000030 be 6e f9 ec 13 11 9e d2 5c 5e 9d 5d 20 94 38 68 |.n......\^.] .8h| +00000040 98 8b 06 b0 3b 10 |....;.| +[22dc 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 principal evaluation succeeds for identity 0 +[22dd 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c91c0 gate 1602702110627072700 evaluation succeeds +[22de 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[22df 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[22e0 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[22e1 10-14 19:01:50.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[22e2 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[22e3 10-14 19:01:50.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22e4 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[22e5 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +[22e6 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +00000040 a9 3d f4 36 c6 7a |.=.6.z| +[22e7 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[22e8 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22e9 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[22ea 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +[22eb 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +00000040 66 93 ac 3b d3 c5 65 |f..;..e| +[22ec 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22ed 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[22ee 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22ef 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22f0 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[22f1 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[22f2 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +[22f3 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +00000040 66 93 ac 3b d3 c5 65 |f..;..e| +[22f4 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[22f5 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 de 6e 1f 65 a9 34 17 de a3 83 4e |0D. 4.n.e.4....N| +00000010 ee 7e 33 22 07 90 5f 13 e7 0e 02 a9 4c 9c ec c7 |.~3".._.....L...| +00000020 b4 45 86 68 02 20 26 fc 08 de 5e f0 c3 c8 62 8d |.E.h. &...^...b.| +00000030 ce 66 6e 5f df 91 87 43 09 33 87 fa f6 87 1d 69 |.fn_...C.3.....i| +00000040 0a 94 20 91 03 89 |.. ...| +[22f6 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[22f7 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[22f8 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22f9 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fa 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fb 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22fc 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fd 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[22fe 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[22ff 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2300 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2301 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2302 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2303 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2304 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2305 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2306 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 gate 1602702110657385800 evaluation starts +[2307 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 signed by 0 principal evaluation starts (used [false]) +[2308 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 processing identity 0 with bytes of 115a6c0 +[2309 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 principal matched by identity 0 +[230a 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fb 57 65 f9 d2 ac 06 59 8c 2a a3 49 9c 9e 5b 68 |.We....Y.*.I..[h| +00000010 de 40 82 3c ff ff a0 f6 85 0e 88 c2 07 e7 6c 27 |.@.<..........l'| +[230b 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 42 ec b9 e6 d1 d7 d2 26 b1 55 ff |0D. GB......&.U.| +00000010 09 af 2e fa 5e a5 83 c6 dd 8f 17 1b c0 23 b1 49 |....^........#.I| +00000020 d6 69 d6 a1 02 20 7a 33 96 1e fd 86 87 b0 56 c4 |.i... z3......V.| +00000030 1c e6 6a 0d ea de e1 43 ad 8d 54 e6 b9 ac ce 88 |..j....C..T.....| +00000040 ed 4e e7 a9 fc f4 |.N....| +[230c 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 principal evaluation succeeds for identity 0 +[230d 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d50 gate 1602702110657385800 evaluation succeeds +[230e 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[230f 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2310 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2311 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2312 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2313 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2314 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2315 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 0b ad 75 56 92 be b3 d7 12 61 70 26 54 17 2a |S..uV.....ap&T.*| +00000010 b4 6f f3 ab b6 9a ae ae bf 06 91 bf 82 7d dd 8f |.o...........}..| +[2316 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 05 e7 d4 db f9 74 f0 61 0d 9b |0E.!.......t.a..| +00000010 7c 71 75 7e af 5d a9 fe 04 db 94 e3 5f fa 37 de ||qu~.]......_.7.| +00000020 94 e4 fa 0c 77 02 20 1c ba e9 be 34 7c d1 4a c3 |....w. ....4|.J.| +00000030 9d d9 50 04 b1 5c 1c 5e a5 0b 07 9b 87 f8 ac 5b |..P..\.^.......[| +00000040 66 93 ac 3b d3 c5 65 |f..;..e| +[2317 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2318 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2319 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[231a 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[231b 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 02 8d d6 1f aa 84 b6 92 f4 83 2d ee 0a c5 6c |...........-...l| +00000010 a2 f7 e9 a4 7d e6 60 45 61 2b 41 13 93 58 2f 02 |....}.`Ea+A..X/.| +[231c 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 51 e2 be 66 59 56 cd 97 ff ed a4 2b |0D. Q..fYV.....+| +00000010 b1 43 75 56 72 4a 45 76 53 65 d2 f1 1e 05 40 ba |.CuVrJEvSe....@.| +00000020 ca 80 74 0d 02 20 42 2f 57 bc 85 b5 b1 5a 5d 74 |..t.. B/W....Z]t| +00000030 8c 7b 30 b3 26 cf 0c da ba c2 d5 80 73 1a ed a4 |.{0.&.......s...| +00000040 a9 3d f4 36 c6 7a |.=.6.z| +[231d 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[231e 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[231f 10-14 19:01:50.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2320 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2321 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2322 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2323 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2324 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2325 10-14 19:01:50.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2326 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +[2327 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[2328 10-14 19:01:51.66 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[2329 10-14 19:01:51.70 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[232a 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +[232b 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[232c 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[232d 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[232e 10-14 19:01:52.13 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[232f 10-14 19:01:52.19 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +[2330 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[2331 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[2332 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +[2333 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +[2334 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +[2335 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +[2336 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +[2337 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[2338 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2339 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[233a 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +[233b 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +[233c 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[233d 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] handling PUT_STATE from chaincode +[233e 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Completed PUT_STATE. Sending RESPONSE +[233f 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2340 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [7f8c4d3c] notifying Txid:7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, channelID:businesschannel +[2341 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2342 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7f8c4d3c] Exit chaincode: name:"lscc" (38302ms) +[2343 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2344 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +[2345 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Exit +[2346 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Entry chaincode: name:"lscc" +[2347 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] escc for chaincode name:"lscc" is escc +[2348 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, chaincode: lscc} +[2349 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20553F97190707D18CDA1130C80D68...455254494649434154452D2D2D2D2D0A +[234a 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1DD17EF9CD394191E7FEC6AABA0BF23A083A1212E39C57C215E1D3660F7EC9E5 +[234b 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, chaincode: lscc} +[234c 10-14 19:01:52.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][7f8c4d3c] Exit +[234d 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +[234e 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41754 +[234f 10-14 19:01:52.21 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41754 grpc.code=OK grpc.call_duration=38.3243079s +[2350 10-14 19:01:52.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2351 10-14 19:01:52.23 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2352 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41764 +[2353 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003aa1b30 +[2354 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2355 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2356 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2357 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2358 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2359 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 ce 8c 96 43 79 34 e1 e6 ba b6 47 16 94 83 1f |t...Cy4....G....| +00000010 0d ea fc 20 bd a5 a2 4f 01 fd c2 95 07 db cd 72 |... ...O.......r| +[235a 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da cb 6f 2a 82 1e e2 ff 7a ae fe |0E.!...o*....z..| +00000010 d2 6b f1 08 f6 a0 f3 ec 8b d4 7e 3b 79 fb 1c 33 |.k........~;y..3| +00000020 1d 48 b9 e2 b2 02 20 2f 0b eb 74 97 39 b8 a6 d3 |.H.... /..t.9...| +00000030 fa 3e f5 81 ca fa 6d 84 59 5e 58 27 a3 d1 8a 48 |.>....m.Y^X'...H| +00000040 fa f9 41 d8 b8 7d ac |..A..}.| +[235b 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[235c 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003553e30, header 0xc0038d6000 +[235d 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[235e 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] processing txid: 9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124 +[235f 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +[2360 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2361 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2362 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2363 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2364 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2365 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 gate 1602702112658214000 evaluation starts +[2366 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 signed by 0 principal evaluation starts (used [false]) +[2367 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 processing identity 0 with bytes of 115a6c0 +[2368 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2369 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[236a 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[236b 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 principal matched by identity 0 +[236c 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 ce 8c 96 43 79 34 e1 e6 ba b6 47 16 94 83 1f |t...Cy4....G....| +00000010 0d ea fc 20 bd a5 a2 4f 01 fd c2 95 07 db cd 72 |... ...O.......r| +[236d 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 da cb 6f 2a 82 1e e2 ff 7a ae fe |0E.!...o*....z..| +00000010 d2 6b f1 08 f6 a0 f3 ec 8b d4 7e 3b 79 fb 1c 33 |.k........~;y..3| +00000020 1d 48 b9 e2 b2 02 20 2f 0b eb 74 97 39 b8 a6 d3 |.H.... /..t.9...| +00000030 fa 3e f5 81 ca fa 6d 84 59 5e 58 27 a3 d1 8a 48 |.>....m.Y^X'...H| +00000040 fa f9 41 d8 b8 7d ac |..A..}.| +[236e 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 principal evaluation succeeds for identity 0 +[236f 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b027c0 gate 1602702112658214000 evaluation succeeds +[2370 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2371 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2372 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2373 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2374 10-14 19:01:52.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2375 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +[2376 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] Entry chaincode: name:"exp02" +[2377 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2378 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9c482fbc] Exit +[2379 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9c482fbcee193cc83bc27cad42fee55e3199073bdd8937a10dfa7eca92e55124] +[237a 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41764 +[237b 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41764 grpc.code=OK grpc.call_duration=5.6458ms +[237c 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[237d 10-14 19:01:52.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[237e 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[237f 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 d6 62 71 36 0a 4a 24 81 fb c1 83 32 35 8d 88 |..bq6.J$....25..| +00000010 87 90 8f 62 d5 5f 1c d5 ad f8 84 d7 ed 3b 45 9c |...b._.......;E.| +[2380 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 05 f4 4d f6 05 99 9b 8e 33 a8 |0E.!....M.....3.| +00000010 6e c5 3b 1d 96 57 c4 32 af 7d 06 6b 05 90 b2 06 |n.;..W.2.}.k....| +00000020 dc 9f c8 15 7a 02 20 4c dd 70 b1 82 38 a9 c1 1c |....z. L.p..8...| +00000030 78 f6 8e 6a 40 c1 24 0d ac c0 71 fc 30 19 db b4 |x..j@.$...q.0...| +00000040 f8 52 db 96 9f 4e 09 |.R...N.| +[2381 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2382 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2383 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2384 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[2385 10-14 19:01:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[2386 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2387 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2388 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2389 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[238b 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[238c 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[238d 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[238a 10-14 19:01:53.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[238e 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[238f 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2390 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2391 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2392 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[2393 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[2394 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2395 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[2396 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[2397 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2398 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2399 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[239a 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[239b 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[239c 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[239d 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[239e 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[239f 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 gate 1602702113897640400 evaluation starts +[23a0 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 signed by 0 principal evaluation starts (used [false]) +[23a1 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 processing identity 0 with bytes of 115a6c0 +[23a2 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 principal matched by identity 0 +[23a3 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[23a4 10-14 19:01:53.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[23a5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 principal evaluation succeeds for identity 0 +[23a6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00374f030 gate 1602702113897640400 evaluation succeeds +[23a7 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23a8 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23a9 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23aa 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23ab 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23ac 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23ad 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23ae 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23af 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23b0 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23b1 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23b2 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23b3 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 gate 1602702113905449400 evaluation starts +[23b4 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 signed by 0 principal evaluation starts (used [false]) +[23b5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 processing identity 0 with bytes of 115a6c0 +[23b6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 principal matched by identity 0 +[23b7 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[23b8 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[23b9 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 principal evaluation succeeds for identity 0 +[23ba 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367e230 gate 1602702113905449400 evaluation succeeds +[23bb 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23bc 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23bd 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23be 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23bf 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23c0 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[23c1 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[23c2 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[23c3 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[23c4 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[23c5 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23c6 10-14 19:01:53.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23c7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23c8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23c9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23ca 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23cb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23cc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23cd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 gate 1602702113911474000 evaluation starts +[23ce 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 signed by 0 principal evaluation starts (used [false]) +[23cf 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 processing identity 0 with bytes of 115a6c0 +[23d0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 principal matched by identity 0 +[23d1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[23d2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[23d3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 principal evaluation succeeds for identity 0 +[23d4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e950 gate 1602702113911474000 evaluation succeeds +[23d5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23d6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23d7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23d8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23d9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23da 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23db 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23dc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23dd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23de 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23df 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23e0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23e1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 gate 1602702113914409000 evaluation starts +[23e2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 signed by 0 principal evaluation starts (used [false]) +[23e3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 processing identity 0 with bytes of 115a6c0 +[23e4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 principal matched by identity 0 +[23e5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[23e6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[23e7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 principal evaluation succeeds for identity 0 +[23e8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360fdd0 gate 1602702113914409000 evaluation succeeds +[23e9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23ea 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23eb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23ec 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23ed 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23ee 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[23ef 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f0 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 24 96 f4 5a 90 49 6e af ca 14 d5 e5 30 0d f1 |.$..Z.In.....0..| +00000010 c7 c8 66 57 1e 1a 4c 36 d2 7c 66 c6 07 26 95 f7 |..fW..L6.|f..&..| +[23f1 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a f6 11 8b a2 ed 0a e9 04 d5 05 99 |0D. *...........| +00000010 41 34 aa 20 66 a7 73 67 22 79 be 94 14 f9 ac 16 |A4. f.sg"y......| +00000020 18 6b ac ec 02 20 55 c5 f6 f8 ed 54 b4 2a 57 27 |.k... U....T.*W'| +00000030 fd b5 d4 e6 85 72 9b 4e df 1f f5 03 a8 df e2 64 |.....r.N.......d| +00000040 09 c9 5b 1d d9 71 |..[..q| +[23f2 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f3 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f4 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23f5 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23f6 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23f7 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23f8 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23f9 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23fa 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 gate 1602702113916797200 evaluation starts +[23fb 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 signed by 0 principal evaluation starts (used [false]) +[23fc 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 processing identity 0 with bytes of 115a6c0 +[23fd 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 principal matched by identity 0 +[23fe 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b c2 bc 58 df 95 f6 6c c6 a8 3a 9e 49 63 f8 80 |K..X...l..:.Ic..| +00000010 25 71 40 d8 3a c6 9b fd da 5b ce 30 23 b2 31 16 |%q@.:....[.0#.1.| +[23ff 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 8b d1 62 3b a7 d4 c0 c5 4d 93 |0E.!....b;....M.| +00000010 20 e6 40 28 7b f5 19 5f 79 a6 31 9c 71 a5 18 c8 | .@({.._y.1.q...| +00000020 3d c4 64 78 18 02 20 28 b9 cc c6 1b 4f bc ab 74 |=.dx.. (....O..t| +00000030 14 b9 83 5f fc 53 42 0c 8b d7 e4 98 70 e8 9e 5e |..._.SB.....p..^| +00000040 dc f7 90 57 13 e9 0a |...W...| +[2400 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 principal evaluation succeeds for identity 0 +[2401 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f9b0 gate 1602702113916797200 evaluation succeeds +[2402 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2403 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2404 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2405 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2406 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2407 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2408 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2409 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[240a 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[240b 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[240c 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[240d 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[240e 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 gate 1602702113919010000 evaluation starts +[240f 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 signed by 0 principal evaluation starts (used [false]) +[2410 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 processing identity 0 with bytes of 115a6c0 +[2411 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 principal matched by identity 0 +[2412 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e eb 10 a2 a1 a3 74 12 78 32 eb d4 ca 4f 68 27 |......t.x2...Oh'| +00000010 4c 04 3d b9 95 b9 ca 51 00 69 99 d0 d2 8a aa 1d |L.=....Q.i......| +[2413 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 e5 c4 1d e6 ed 05 23 8f 1b 70 |0E.!........#..p| +00000010 08 94 d8 2a cf 44 e3 ec 60 e7 4e 5b e0 dc d1 f4 |...*.D..`.N[....| +00000020 e5 5e 8f 4f 6f 02 20 12 0e 16 05 04 c5 b2 50 db |.^.Oo. .......P.| +00000030 a9 fd 46 b0 e7 ae 0c b0 5b 37 5c 64 84 38 36 2b |..F.....[7\d.86+| +00000040 eb d2 9f b7 12 e7 8c |.......| +[2414 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 principal evaluation succeeds for identity 0 +[2415 10-14 19:01:53.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003574cc0 gate 1602702113919010000 evaluation succeeds +[2417 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2418 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2419 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[241a 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[241b 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 08 02 e0 5d bc 24 34 d8 de b6 67 83 c7 e9 ea |....].$4...g....| +00000010 ae db 15 1c ff d9 8b b5 ad 9e 01 41 7b b0 14 4a |...........A{..J| +[241c 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d3 90 9d 58 28 45 d4 1f 97 49 |0E.!.....X(E...I| +00000010 57 ba f5 b8 15 5e 1d 17 5b 15 a1 49 42 03 4a 3b |W....^..[..IB.J;| +00000020 fe a2 71 af 12 02 20 03 5a 80 8c 30 ca 5b 43 de |..q... .Z..0.[C.| +00000030 e3 2f bb 66 ea 57 b1 9e b6 b7 a8 48 17 bb ea 04 |./.f.W.....H....| +00000040 eb ba a9 6a 67 2e 62 |...jg.b| +[2416 10-14 19:01:53.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[241d 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[241e 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[241f 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2420 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2421 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2422 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2423 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2424 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2425 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2426 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[2427 10-14 19:01:53.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2428 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2429 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[242a 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[242b 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[242c 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[242d 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[242e 10-14 19:01:54.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[242f 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2430 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2431 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2432 10-14 19:01:54.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2433 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2434 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2435 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2436 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2437 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2438 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2439 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[243a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[243b 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[243c 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[243d 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[243e 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[243f 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 gate 1602702114173540900 evaluation starts +[2440 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 signed by 0 principal evaluation starts (used [false]) +[2441 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 processing identity 0 with bytes of 115a6c0 +[2442 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 principal matched by identity 0 +[2443 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +[2444 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +00000040 a0 b9 2d 85 e1 58 |..-..X| +[2445 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 principal evaluation succeeds for identity 0 +[2446 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367f270 gate 1602702114173540900 evaluation succeeds +[2447 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2448 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2449 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[244a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[244b 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[244c 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[244d 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[244e 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[244f 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2450 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2451 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2452 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2453 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2454 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2455 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2456 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2457 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2458 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2459 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[245a 10-14 19:01:54.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[245b 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[245c 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[245d 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[245e 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[245f 10-14 19:01:54.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2460 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2461 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2462 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2463 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2464 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2465 10-14 19:01:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2466 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2467 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2468 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2469 10-14 19:01:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[246a 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[246b 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[246c 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[246d 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[246e 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[246f 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2470 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2471 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2472 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2473 10-14 19:01:54.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2474 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2475 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2476 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 gate 1602702114290641600 evaluation starts +[2477 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 signed by 0 principal evaluation starts (used [false]) +[2478 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 processing identity 0 with bytes of 115a6c0 +[2479 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 principal matched by identity 0 +[247a 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +[247b 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +00000040 4c 39 e8 8a eb 22 |L9..."| +[247c 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 principal evaluation succeeds for identity 0 +[247d 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331e9b0 gate 1602702114290641600 evaluation succeeds +[247e 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[247f 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2480 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2481 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2482 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2483 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2484 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2485 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2486 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2487 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2488 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2489 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[248a 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[248b 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248c 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248d 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248e 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[248f 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2490 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2491 10-14 19:01:54.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2492 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +[2493 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2494 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2495 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2496 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2497 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2498 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2499 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +zT4JIZZIt8ZQKDz2PbySBfC+rA== +-----END CERTIFICATE----- +[249a 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 gate 1602702114315053700 evaluation starts +[249b 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 signed by 0 principal evaluation starts (used [false]) +[249c 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 processing identity 0 with bytes of 115a6c0 +[249d 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[249e 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[249f 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[24a0 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 principal matched by identity 0 +[24a1 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e b5 32 af 5e 84 e5 36 ba ad 2c 51 c4 da b0 12 |..2.^..6..,Q....| +00000010 9e a7 95 4d 2a a6 de e1 5e e2 b9 3c d2 20 ee 5a |...M*...^..<. .Z| +[24a2 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be bc 12 60 e2 0c 7a 31 f7 af 5d |0E.!....`..z1..]| +00000010 82 07 30 67 60 95 9a fc 9f 21 a3 bb eb a0 a0 3e |..0g`....!.....>| +00000020 0f 42 3e 5f b2 02 20 3f 16 3f 15 df a6 99 23 6a |.B>_.. ?.?....#j| +00000030 11 ae 88 0c f8 22 a8 0a 07 db e5 39 6b 65 91 91 |.....".....9ke..| +00000040 22 aa 43 a5 19 a1 bb |".C....| +[24a3 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 principal evaluation succeeds for identity 0 +[24a4 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003398e50 gate 1602702114315053700 evaluation succeeds +[24a5 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[24a6 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[24a7 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[24a8 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[24a9 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +[24aa 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +[24ab 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ac 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[24ad 10-14 19:01:54.31 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[24ae 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24af 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24b4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +[24b5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +[24b6 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +[24b7 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +[24b8 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +[24b9 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[24ba 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0037f5740 env 0xc00373f590 txn 0 +[24bb 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00373f590 +[24bc 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +[24bd 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[24be 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[24bf 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[24c0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[24c1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[24c2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +[24c3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +00000040 e0 6a d1 21 ea 79 |.j.!.y| +[24c4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[24c5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0025d6a80, header channel_header:"\010\003\032\014\010\371\225\235\374\005\020\240\220\366\306\003\"\017businesschannel*@7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\013\253Q\245ns\210W\337\307\277|:\r\332\230[\207\377;5\255A\"" +[24c6 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[24c7 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[24c8 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[24c9 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[24ca 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] +[24cb 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[24cc 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002644000 +[24cd 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +[24ce 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [40302d83-fecd-42f6-aee8-7530d58272e8] +[24cf 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [40302d83-fecd-42f6-aee8-7530d58272e8] +[24d0 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24d1 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[24d2 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 gate 1602702114326064900 evaluation starts +[24d3 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 signed by 0 principal evaluation starts (used [false]) +[24d4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 processing identity 0 with bytes of 115a6c0 +[24d5 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[24d6 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[24d7 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[24d8 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal matched by identity 0 +[24d9 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d d1 7e f9 cd 39 41 91 e7 fe c6 aa ba 0b f2 3a |..~..9A........:| +00000010 08 3a 12 12 e3 9c 57 c2 15 e1 d3 66 0f 7e c9 e5 |.:....W....f.~..| +[24da 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 36 5a e6 6d d9 08 99 36 4e 84 |0E.!..6Z.m...6N.| +00000010 c6 2b 58 d9 54 14 05 aa fa 5d 60 52 7f 30 72 e8 |.+X.T....]`R.0r.| +00000020 45 e2 38 c2 7f 02 20 0f f9 a7 2d 5d db 9d bd 9f |E.8... ...-]....| +00000030 54 6d 2b 62 ab e9 bc d9 7d 77 6d 0f d2 66 07 4c |Tm+b....}wm..f.L| +00000040 83 4e 0a 0e d1 2c bd |.N...,.| +[24db 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal evaluation succeeds for identity 0 +[24dc 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 signed by 1 principal evaluation starts (used [true]) +[24dd 10-14 19:01:54.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 skipping identity 0 because it has already been used +[24de 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 principal evaluation fails +[24df 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a54d0 gate 1602702114326064900 evaluation succeeds +[24e0 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +[24e1 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[24e2 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[24e3 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +[24e4 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +[24e5 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [95fe1049-8ce8-4eeb-a0c1-d4b2d23c5c95] +[24e6 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[24e7 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [95fe1049-8ce8-4eeb-a0c1-d4b2d23c5c95] +[24e8 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +[24e9 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f80ae88a-7899-43f9-b724-9ff90f70c787] +[24ea 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[24eb 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f80ae88a-7899-43f9-b724-9ff90f70c787] +[24ec 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 gate 1602702114341277900 evaluation starts +[24ed 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 signed by 0 principal evaluation starts (used [false]) +[24ee 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 processing identity 0 with bytes of 115a6c0 +[24ef 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal matched by identity 0 +[24f0 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 c9 a8 23 af 87 6d a0 91 c0 05 1d 0f 58 5f 98 |...#..m......X_.| +00000010 41 25 84 3d 53 93 ff 5d c5 5a 7b 42 53 6a c2 9b |A%.=S..].Z{BSj..| +[24f1 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 11 24 29 3b c4 88 03 f8 e8 2c 02 |0D. ..$);.....,.| +00000010 ae c9 8a 53 ea 7d cc 30 83 38 9c 3b 90 47 da 4f |...S.}.0.8.;.G.O| +00000020 3c 3d 0d 86 02 20 51 fd 6a 3b 3f 3a d1 81 e7 cb |<=... Q.j;?:....| +00000030 49 30 16 e4 bf 36 7b 9a 79 11 6b e6 b4 8a ec fd |I0...6{.y.k.....| +00000040 e0 6a d1 21 ea 79 |.j.!.y| +[24f2 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal evaluation succeeds for identity 0 +[24f3 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 signed by 1 principal evaluation starts (used [true]) +[24f4 10-14 19:01:54.32 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[24f5 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 skipping identity 0 because it has already been used +[24f6 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 principal evaluation fails +[24f7 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032150e0 gate 1602702114341277900 evaluation succeeds +[24f8 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +[24f9 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction 7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 appears to be valid +[24fa 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002644000 +[24fb 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[24fc 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 26ms +[24fd 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[24fe 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[24ff 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +[2500 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2501 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2502 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2503 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +[2504 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2505 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2506 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2507 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +[2508 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] marked as valid by state validator +[2509 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003857bc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003857c00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc003857c40)} +[250a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[250b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[250c 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[250d 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0036a13b0)}} +[250e 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +[250f 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2510 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[2511 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[2512 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +[2513 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[2514 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +[2515 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2516 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 151 164 150 3 42 54 251 198 220 254 243 232 7 63 158 185 190 98 224 235 201 1 135 123 87 193 150 10 223 70 214 201 2 32 66 100 160 197 58 176 43 73 229 185 34 203 0 187 205 83 123 33 80 76 138 144 89 127 55 227 56 130 84 227 91 153]} 0x151b080}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002a6e480 0xc0029b6fc0 {{0 0} 0 0 0 0} {false}})]} +[2517 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2518 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00000ec80})} +[2519 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +[251a 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +[251b 10-14 19:01:54.35 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +[251c 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +[251d 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[251e 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[251f 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2520 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2521 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x12, 0x47, 0x5d, 0xc5, 0x37, 0x4, 0x7e, 0xac, 0x66, 0xec, 0x81, 0x4, 0xf2, 0x56, 0x7a, 0x44, 0x3e, 0x1e, 0x49, 0xa0, 0x3c, 0x8f, 0xdc, 0xfa, 0x4, 0x6b, 0x6b, 0x36, 0x2d, 0xec, 0xa3, 0xef} txOffsets= +txId=7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378 locPointer=offset=70, bytesLength=3520 +] +[2522 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to txid-index +[2523 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [7f8c4d3c308a5e6ed868705182c31b1eb984e1ba84859d2431355576ad964378] to blockNumTranNum index +[2524 10-14 19:01:54.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0037f5740 env 0xc00373f590 txn 0 +[2525 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +[2526 10-14 19:01:54.36 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +[2527 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +[2528 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +[2529 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[252a 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[252b 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[252c 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[252d 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +[252e 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[252f 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[2530 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2531 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [85ac9dbf-94e1-4c46-808c-5de8e7780001] +[2532 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +[2533 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2534 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +[2535 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [85ac9dbf-94e1-4c46-808c-5de8e7780001] +[2536 10-14 19:01:54.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +[2537 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2538 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08031A0C0A0565787030321203312E30 +[2539 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5400EED54209D605C245A392EC8274B9A193FEF06106B6BD25A5751F6CF2AFE9 +[253a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[253b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +[253c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +[253e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +[253d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[253f 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +[2540 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[2541 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[2542 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 31ms (state_validation=3ms block_and_pvtdata_commit=13ms state_commit=12ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +[2543 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +[2544 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2545 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2546 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[2547 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2548 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2549 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[254a 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254b 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[254c 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254d 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[254e 10-14 19:01:54.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254f 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2550 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2551 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2552 10-14 19:01:54.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2553 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2554 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2555 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2556 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2557 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2558 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2559 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[255a 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[255b 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[255c 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 gate 1602702114449462900 evaluation starts +[255d 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 signed by 0 principal evaluation starts (used [false]) +[255e 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 processing identity 0 with bytes of 115a6c0 +[255f 10-14 19:01:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 principal matched by identity 0 +[2560 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +[2561 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +00000040 af 5e ad 10 29 18 |.^..).| +[2562 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 principal evaluation succeeds for identity 0 +[2563 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f2f10 gate 1602702114449462900 evaluation succeeds +[2564 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2565 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2566 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2567 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2568 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2569 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[256a 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[256b 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[256c 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[256d 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[256e 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[256f 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 gate 1602702114454021000 evaluation starts +[2570 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 signed by 0 principal evaluation starts (used [false]) +[2571 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 processing identity 0 with bytes of 115a6c0 +[2572 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 principal matched by identity 0 +[2573 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +[2574 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +00000040 af 5e ad 10 29 18 |.^..).| +[2575 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 principal evaluation succeeds for identity 0 +[2576 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f3b20 gate 1602702114454021000 evaluation succeeds +[2577 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2578 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2579 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[257a 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[257b 10-14 19:01:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[257c 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes +[257d 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[257e 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > > , Envelope: 270 bytes, Signature: 0 bytes +[257f 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2580 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2582 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2583 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[2581 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +[2584 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2585 10-14 19:01:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +00000040 a8 43 1d 37 fe 92 |.C.7..| +[2586 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2587 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a b8 5f 7a f9 0f 2e 9f 45 48 5d 06 |0D. Z._z....EH].| +00000010 6a 4f 3e 63 22 4a 35 6b a1 87 47 7a 04 8c a7 60 |jO>c"J5k..Gz...`| +00000020 f6 bc 3c 5d 02 20 30 23 c6 10 05 bf 6e 72 c7 a6 |..<]. 0#....nr..| +00000030 93 42 f1 48 65 80 e8 d2 3a 2b ee 2c a0 e3 1f 6a |.B.He...:+.,...j| +00000040 4e 3b 3d f4 5c 2b |N;=.\+| +[2588 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2589 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[258a 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[258c 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[258d 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[258b 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[258e 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[258f 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2590 10-14 19:01:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2591 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2592 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2593 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2594 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2595 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2596 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2597 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2598 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[2599 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\025I\2557\r\010\230R\000Rj\251\275\215h\250C\0357\376\222" secret_envelope:c\"J5k\241\207Gz\004\214\247`\366\274<]\002 0#\306\020\005\277nr\307\246\223B\361He\200\350\322:+\356,\240\343\037jN;=\364\\+" > > alive: +[259a 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[259b 10-14 19:01:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[259c 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[259d 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[259e 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[259f 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25a0 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25a1 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25a2 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25a3 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25a4 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 gate 1602702114506385600 evaluation starts +[25a5 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 signed by 0 principal evaluation starts (used [false]) +[25a6 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 processing identity 0 with bytes of 115a6c0 +[25a7 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 principal matched by identity 0 +[25a8 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +[25a9 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +00000040 af 5e ad 10 29 18 |.^..).| +[25aa 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 principal evaluation succeeds for identity 0 +[25ab 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003177500 gate 1602702114506385600 evaluation succeeds +[25ac 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25ad 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25ae 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25af 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25b0 10-14 19:01:54.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25b1 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25b2 10-14 19:01:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25b3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25b4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25b5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25b6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25b7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25b8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25b9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25ba 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 gate 1602702114521626100 evaluation starts +[25bb 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 signed by 0 principal evaluation starts (used [false]) +[25bc 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 processing identity 0 with bytes of 115a6c0 +[25bd 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 principal matched by identity 0 +[25be 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +[25bf 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +00000040 9e a1 4c 06 fd 98 |..L...| +[25c0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 principal evaluation succeeds for identity 0 +[25c1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030da870 gate 1602702114521626100 evaluation succeeds +[25c2 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25c3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25c4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25c5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25c6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25c7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25c8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25c9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25ca 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25cb 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25cc 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25cd 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 gate 1602702114526838100 evaluation starts +[25ce 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 signed by 0 principal evaluation starts (used [false]) +[25cf 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 processing identity 0 with bytes of 115a6c0 +[25d0 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 principal matched by identity 0 +[25d1 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +[25d2 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +00000040 9e a1 4c 06 fd 98 |..L...| +[25d3 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 principal evaluation succeeds for identity 0 +[25d4 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030db460 gate 1602702114526838100 evaluation succeeds +[25d5 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25d6 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25d7 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25d8 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25d9 10-14 19:01:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25da 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25db 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25dc 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25dd 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25de 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25df 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25e0 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25e1 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25e2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25e3 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 gate 1602702114534497900 evaluation starts +[25e4 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 signed by 0 principal evaluation starts (used [false]) +[25e5 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 processing identity 0 with bytes of 115a6c0 +[25e6 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 principal matched by identity 0 +[25e7 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +[25e8 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +00000040 9e a1 4c 06 fd 98 |..L...| +[25e9 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 principal evaluation succeeds for identity 0 +[25ea 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e7f0 gate 1602702114534497900 evaluation succeeds +[25eb 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25ec 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25ed 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25ee 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25ef 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f0 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f1 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[25f3 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[25f2 10-14 19:01:54.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f5 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[25f6 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[25f7 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f8 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[25f9 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25fb 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25fc 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25fd 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[25fe 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25ff 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f4 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2600 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[25fa 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2601 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2602 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2603 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2604 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2605 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 gate 1602702114547000500 evaluation starts +[2607 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2608 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 signed by 0 principal evaluation starts (used [false]) +[2609 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[260a 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 processing identity 0 with bytes of 115a6c0 +[260b 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[260c 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 principal evaluation fails +[260d 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9ff90 gate 1602702114547000500 evaluation fails +[260e 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[260f 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2610 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2611 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 gate 1602702114549577400 evaluation starts +[2612 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 signed by 0 principal evaluation starts (used [false]) +[2613 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 processing identity 0 with bytes of 115a6c0 +[2614 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 principal matched by identity 0 +[2606 10-14 19:01:54.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2615 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[2617 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[2616 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2619 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[261a 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[261b 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2618 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[261c 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[261d 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 principal evaluation succeeds for identity 0 +[261e 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5a500 gate 1602702114549577400 evaluation succeeds +[261f 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2620 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2621 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2622 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2623 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2624 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2625 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2626 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2627 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2628 10-14 19:01:54.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2629 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262a 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[262b 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262c 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[262d 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[262e 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262f 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2630 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2631 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2632 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2633 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[2634 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[2635 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2636 10-14 19:01:54.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2637 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2638 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2639 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[263a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[263b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[263c 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[263d 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[263e 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[263f 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 gate 1602702114587283900 evaluation starts +[2640 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 signed by 0 principal evaluation starts (used [false]) +[2641 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 processing identity 0 with bytes of 115a6c0 +[2642 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 principal matched by identity 0 +[2643 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 7f 71 f9 61 f3 66 e7 92 67 79 d5 3f cf 49 4f |..q.a.f..gy.?.IO| +00000010 d9 de 98 46 f8 1c 94 47 f7 ef 6f 27 e2 69 85 50 |...F...G..o'.i.P| +[2644 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 61 6f d3 63 57 65 77 77 6b be e1 |0D. }ao.cWewwk..| +00000010 05 45 4e 2b 8e e4 fd fe 15 5b 84 ba 1e 18 37 6d |.EN+.....[....7m| +00000020 46 3b 0b 53 02 20 6b 7a 28 21 50 42 bf 85 5a e1 |F;.S. kz(!PB..Z.| +00000030 b9 81 af 00 ef 52 29 80 20 bd c5 86 bc 50 05 39 |.....R). ....P.9| +00000040 9e a1 4c 06 fd 98 |..L...| +[2645 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 principal evaluation succeeds for identity 0 +[2646 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c5bbc0 gate 1602702114587283900 evaluation succeeds +[2647 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2648 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2649 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[264a 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[264b 10-14 19:01:54.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[264c 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[264d 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[264e 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[264f 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2650 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2651 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2652 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2653 10-14 19:01:54.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161025 +[2654 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5DA4B741ECB0BAEFF7A6D229504A085632B8666C70DBD4DFC5EF2FDE18870C18 +[2655 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2656 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2657 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2658 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[2659 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[265a 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[265b 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[265c 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[265d 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +[265e 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[265f 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[2660 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2661 10-14 19:01:54.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:-HF\256\341\312\256c>\337\353|QiK\271\247\352\352\010L\270\002 ?v\327\262\010\340s{\266\357t\213\260:r\220\363y\266]<\202\230p\243\275} vQW\227" > > , Envelope: 165 bytes, Signature: 0 bytes +[2662 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2663 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2664 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2665 10-14 19:01:54.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2666 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2667 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2668 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2669 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[266a 10-14 19:01:54.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[266b 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[266c 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[266d 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[266e 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[266f 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2670 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2671 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2672 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2673 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 gate 1602702114635922000 evaluation starts +[2674 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 signed by 0 principal evaluation starts (used [false]) +[2675 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 processing identity 0 with bytes of 115a6c0 +[2676 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 principal matched by identity 0 +[2677 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 6e 48 14 8e 9b 6c 22 93 aa d7 31 4e 30 a5 af |.nH...l"...1N0..| +00000010 c3 0f d6 dd 99 68 1a fd 8c b9 af f2 69 47 78 85 |.....h......iGx.| +[2678 10-14 19:01:54.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a 2f bb c3 99 85 d3 46 14 85 67 f4 |0D. */.....F..g.| +00000010 d2 0d 73 01 75 c7 40 c5 0a f1 fd 80 6f ea 58 ff |..s.u.@.....o.X.| +00000020 6b b4 48 33 02 20 52 45 df f5 27 c0 31 b6 43 13 |k.H3. RE..'.1.C.| +00000030 35 95 e6 94 a6 2f b8 a2 4f ce dc 38 27 42 54 72 |5..../..O..8'BTr| +00000040 af 5e ad 10 29 18 |.^..).| +[2679 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[267a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 principal evaluation succeeds for identity 0 +[267b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b3de10 gate 1602702114635922000 evaluation succeeds +[267c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[267d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[267e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[267f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2680 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2681 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2682 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2683 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2684 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2685 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2686 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2687 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2688 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2689 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[268a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 gate 1602702114641801600 evaluation starts +[268b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 signed by 0 principal evaluation starts (used [false]) +[268c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 processing identity 0 with bytes of 115a6c0 +[268d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 principal matched by identity 0 +[268e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[268f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[2690 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 principal evaluation succeeds for identity 0 +[2691 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27200 gate 1602702114641801600 evaluation succeeds +[2692 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2693 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2694 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2695 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2696 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2697 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2698 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2699 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[269a 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[269b 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[269c 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[269d 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 gate 1602702114642491200 evaluation starts +[269e 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 signed by 0 principal evaluation starts (used [false]) +[269f 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 processing identity 0 with bytes of 115a6c0 +[26a0 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 principal matched by identity 0 +[26a1 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[26a2 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[26a3 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 principal evaluation succeeds for identity 0 +[26a4 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b27df0 gate 1602702114642491200 evaluation succeeds +[26a5 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26a6 10-14 19:01:54.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26a7 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26a8 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26a9 10-14 19:01:54.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26aa 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ab 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ac 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[26ad 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ae 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[26b0 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26af 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[26b2 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26b1 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26b3 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[26b4 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[26b5 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26b6 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[26b7 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[26b8 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26b9 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26ba 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26bb 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26bc 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26bd 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26be 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26bf 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 gate 1602702114668202100 evaluation starts +[26c0 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 signed by 0 principal evaluation starts (used [false]) +[26c1 10-14 19:01:54.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 processing identity 0 with bytes of 115a6c0 +[26c2 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 principal matched by identity 0 +[26c3 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 24 65 5e 94 e5 ea ec ac 31 c7 c0 0f 78 04 3f |.$e^.....1...x.?| +00000010 34 20 14 5c 9e 09 04 68 20 d4 f2 5e 49 08 ab a6 |4 .\...h ..^I...| +[26c4 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 5d b0 be d2 e8 22 ac 23 a5 ff b3 |0D. "]....".#...| +00000010 56 b5 6a 55 95 bd d8 96 4a 8a 79 bf 76 fa 88 02 |V.jU....J.y.v...| +00000020 7a 62 7b 51 02 20 79 b1 74 45 41 7e ad 57 20 14 |zb{Q. y.tEA~.W .| +00000030 55 9a 2d ec 3d e3 1b ee 9e 7a e9 09 e0 1c 14 a1 |U.-.=....z......| +00000040 4c 39 e8 8a eb 22 |L9..."| +[26c5 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 principal evaluation succeeds for identity 0 +[26c7 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bcd590 gate 1602702114668202100 evaluation succeeds +[26c8 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26c9 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26c6 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[26ca 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26cb 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26cc 10-14 19:01:54.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26cd 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26ce 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[26cf 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +[26d0 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +00000040 a8 43 1d 37 fe 92 |.C.7..| +[26d1 10-14 19:01:54.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26d2 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26d3 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[26d4 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +[26d5 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +00000040 7d 20 76 51 57 97 |} vQW.| +[26d6 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26d7 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[26d8 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26d9 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26da 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[26db 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26dc 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[26dd 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +[26de 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +00000040 7d 20 76 51 57 97 |} vQW.| +[26df 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[26e0 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 58 2f 15 4b 4e 6d ad 13 c8 39 47 |0D. wX/.KNm...9G| +00000010 fa 07 77 7e b2 8d 03 84 08 21 bd 69 3f 61 fa dc |..w~.....!.i?a..| +00000020 58 89 db 25 02 20 51 5d 8a d6 e5 91 0a 60 f6 b1 |X..%. Q].....`..| +00000030 66 f7 d1 87 b0 eb 19 7e 80 ba 90 15 fc c5 a0 6c |f......~.......l| +00000040 10 5a e7 c5 9b 63 |.Z...c| +[26e1 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[26e2 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26e3 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26e4 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26e5 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26e6 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26e7 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26e8 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26e9 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[26ea 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[26ec 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26eb 10-14 19:01:54.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 gate 1602702114698214200 evaluation starts +[26ed 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 signed by 0 principal evaluation starts (used [false]) +[26ee 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 processing identity 0 with bytes of 115a6c0 +[26ef 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 principal matched by identity 0 +[26f0 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[26f1 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[26f2 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 principal evaluation succeeds for identity 0 +[26f3 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002968690 gate 1602702114698214200 evaluation succeeds +[26f4 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26f5 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26f6 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26f7 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26f8 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26f9 10-14 19:01:54.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26fa 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[26fb 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[26fc 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26fd 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26fe 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26ff 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2700 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2701 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2702 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2703 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 gate 1602702114716922200 evaluation starts +[2704 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 signed by 0 principal evaluation starts (used [false]) +[2705 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 processing identity 0 with bytes of 115a6c0 +[2706 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 principal matched by identity 0 +[2707 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[2708 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[2709 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 principal evaluation succeeds for identity 0 +[270a 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002969b10 gate 1602702114716922200 evaluation succeeds +[270b 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[270c 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[270d 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[270e 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[270f 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2710 10-14 19:01:54.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2711 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2712 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2713 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2714 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2715 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2716 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2717 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2718 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2719 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[271a 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[271b 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[271c 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 gate 1602702114724600900 evaluation starts +[271d 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 signed by 0 principal evaluation starts (used [false]) +[271e 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 processing identity 0 with bytes of 115a6c0 +[271f 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 principal matched by identity 0 +[2720 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 23 45 8f a6 74 8e eb 3a a4 63 e7 46 32 1f b2 e0 |#E..t..:.c.F2...| +00000010 e1 d8 1f 12 83 9b cc 88 b2 de 6e 36 91 96 b0 8b |..........n6....| +[2721 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f c6 c9 4f f8 81 f1 2f 4d 9a e8 dd |0D. _..O.../M...| +00000010 f4 7d 84 da 20 80 e9 22 ab 1f 7a 8c ad e6 da 5a |.}.. .."..z....Z| +00000020 55 42 5f 8b 02 20 5a 76 ab 4f fa 47 91 44 1c c0 |UB_.. Zv.O.G.D..| +00000030 b5 11 21 8d cf 07 96 c7 e2 d3 b9 04 b1 d9 2e c5 |..!.............| +00000040 a0 b9 2d 85 e1 58 |..-..X| +[2722 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2723 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 principal evaluation succeeds for identity 0 +[2724 10-14 19:01:54.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027f6330 gate 1602702114724600900 evaluation succeeds +[2725 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2726 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2727 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2728 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2729 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272a 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[272b 10-14 19:01:54.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[272c 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d a4 b7 41 ec b0 ba ef f7 a6 d2 29 50 4a 08 56 |]..A.......)PJ.V| +00000010 32 b8 66 6c 70 db d4 df c5 ef 2f de 18 87 0c 18 |2.flp...../.....| +[272d 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 3f f3 fb 73 d7 d6 62 67 3e 2d 48 |0D. i?..s..bg>-H| +00000010 46 ae e1 ca ae 63 3e df eb 7c 51 69 4b b9 a7 ea |F....c>..|QiK...| +00000020 ea 08 4c b8 02 20 3f 76 d7 b2 08 e0 73 7b b6 ef |..L.. ?v....s{..| +00000030 74 8b b0 3a 72 90 f3 79 b6 5d 3c 82 98 70 a3 bd |t..:r..y.]<..p..| +00000040 7d 20 76 51 57 97 |} vQW.| +[272e 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272f 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2730 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2731 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2732 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 f9 32 d0 b6 6b 5b 82 22 56 fd 3d 25 c3 f8 2d |..2..k[."V.=%..-| +00000010 eb 34 9f cb 2f 54 81 61 4f 07 23 37 83 75 87 08 |.4../T.aO.#7.u..| +[2733 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a e3 24 e2 6c 27 ed c7 f5 ba c5 f4 |0D. *.$.l'......| +00000010 2c 18 d4 81 bc 9c 60 a2 be 9d 2b 38 e3 fc 52 ef |,.....`...+8..R.| +00000020 09 63 a4 16 02 20 07 11 46 62 7e 62 a1 88 09 a4 |.c... ..Fb~b....| +00000030 3e 15 49 ad 37 0d 08 98 52 00 52 6a a9 bd 8d 68 |>.I.7...R.Rj...h| +00000040 a8 43 1d 37 fe 92 |.C.7..| +[2734 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2735 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2736 10-14 19:01:54.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2737 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41768 +[2738 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00325bd10 +[2739 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[273a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[273b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[273c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[273d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[273e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 35 a9 ed 07 94 87 b6 b5 a7 e4 ac d5 4e 12 |..5...........N.| +00000010 37 e1 bf cd fc 0c d6 03 22 38 f8 81 71 b4 83 2a |7......."8..q..*| +[273f 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 59 41 7b 8f 9b 26 8d a0 06 42 |0E.!..YA{..&...B| +00000010 ad b5 fc fb 0a 56 31 92 7a 96 88 3c e5 4a 42 02 |.....V1.z..<.JB.| +00000020 73 a7 aa db 70 02 20 70 1b 8f 3c 73 81 68 8b 67 |s...p. p.. DEBU exits successfully +[2741 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0029e1810, header 0xc002ca0140 +[2742 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2743 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] processing txid: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098 +[2744 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +[2745 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2746 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2747 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2748 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2749 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[274a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 gate 1602702114885946100 evaluation starts +[274b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 signed by 0 principal evaluation starts (used [false]) +[274c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 processing identity 0 with bytes of 115a6c0 +[274d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 principal matched by identity 0 +[274e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 e2 35 a9 ed 07 94 87 b6 b5 a7 e4 ac d5 4e 12 |..5...........N.| +00000010 37 e1 bf cd fc 0c d6 03 22 38 f8 81 71 b4 83 2a |7......."8..q..*| +[274f 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 59 41 7b 8f 9b 26 8d a0 06 42 |0E.!..YA{..&...B| +00000010 ad b5 fc fb 0a 56 31 92 7a 96 88 3c e5 4a 42 02 |.....V1.z..<.JB.| +00000020 73 a7 aa db 70 02 20 70 1b 8f 3c 73 81 68 8b 67 |s...p. p.. DEBU 0xc0028bb950 principal evaluation succeeds for identity 0 +[2751 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028bb950 gate 1602702114885946100 evaluation succeeds +[2752 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2753 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2754 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2755 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2756 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2757 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +[2758 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Entry chaincode: name:"exp02" +[2759 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[275a 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[275b 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][af9659d4] Entry chaincode: name:"exp02" +[275c 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[275d 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[275e 10-14 19:01:54.88 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] handling GET_STATE from chaincode +[275f 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] getting state for chaincode exp02, key a, channel businesschannel +[2760 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2761 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Completed GET_STATE. Sending RESPONSE +[2762 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2763 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [af9659d4] notifying Txid:af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, channelID:businesschannel +[2764 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2765 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][af9659d4] Exit chaincode: name:"exp02" (3ms) +[2766 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2767 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +[2768 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Exit +[2769 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Entry chaincode: name:"exp02" +[276a 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] escc for chaincode name:"exp02" is escc +[276b 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, chaincode: exp02} +[276c 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208201DF2DC956A57855219D5097CC...455254494649434154452D2D2D2D2D0A +[276d 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B1D5542891C2E0B4CD2C384B2669AF43B5E655FFDA976E471513B4C1431629B4 +[276e 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098, chaincode: exp02} +[276f 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][af9659d4] Exit +[2770 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [af9659d4325d4472b7e01858d8d520f069f3a2f28d375238a6381b54db182098] +[2771 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41768 +[2772 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41768 grpc.code=OK grpc.call_duration=11.9773ms +[2773 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2774 10-14 19:01:54.89 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2775 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2776 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[2777 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2778 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2779 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[277a 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[277b 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[277c 10-14 19:01:54.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[277d 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[277e 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[277f 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2780 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2781 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2782 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2783 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2784 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 gate 1602702114948053200 evaluation starts +[2785 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 signed by 0 principal evaluation starts (used [false]) +[2786 10-14 19:01:54.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 processing identity 0 with bytes of 115a6c0 +[2787 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 principal matched by identity 0 +[2788 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[2789 10-14 19:01:54.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[278a 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 principal evaluation succeeds for identity 0 +[278b 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027316a0 gate 1602702114948053200 evaluation succeeds +[278c 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[278d 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[278e 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[278f 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2790 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2791 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2792 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2793 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2794 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2795 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2796 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2797 10-14 19:01:54.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 gate 1602702114969010600 evaluation starts +[2798 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 signed by 0 principal evaluation starts (used [false]) +[2799 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 processing identity 0 with bytes of 115a6c0 +[279a 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 principal matched by identity 0 +[279b 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[279c 10-14 19:01:54.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[279d 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 principal evaluation succeeds for identity 0 +[279e 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00272a2a0 gate 1602702114969010600 evaluation succeeds +[279f 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27a0 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27a1 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27a2 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27a3 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a4 10-14 19:01:54.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a5 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a6 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[27a7 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a8 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27a9 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[27aa 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ab 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[27ac 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ad 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[27ae 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[27af 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27b0 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27b1 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27b2 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27b3 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27b4 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27b5 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27b6 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 gate 1602702114996303000 evaluation starts +[27b7 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 signed by 0 principal evaluation starts (used [false]) +[27b8 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 processing identity 0 with bytes of 115a6c0 +[27b9 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 principal matched by identity 0 +[27ba 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[27bb 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[27bc 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 principal evaluation succeeds for identity 0 +[27bd 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00276fee0 gate 1602702114996303000 evaluation succeeds +[27be 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27bf 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27c0 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27c1 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27c2 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c3 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27c4 10-14 19:01:54.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[27c5 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c6 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27c7 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27c8 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27c9 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27ca 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27cb 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27cc 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 gate 1602702115017354500 evaluation starts +[27cd 10-14 19:01:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 signed by 0 principal evaluation starts (used [false]) +[27ce 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 processing identity 0 with bytes of 115a6c0 +[27cf 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 principal matched by identity 0 +[27d0 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[27d1 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[27d2 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 principal evaluation succeeds for identity 0 +[27d3 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026f75e0 gate 1602702115017354500 evaluation succeeds +[27d4 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27d5 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27d6 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27d7 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27d8 10-14 19:01:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27d9 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27da 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27db 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27dc 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27dd 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[27de 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27df 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27e0 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27e1 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27e2 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27e3 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27e4 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27e5 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 gate 1602702115129143400 evaluation starts +[27e6 10-14 19:01:55.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 signed by 0 principal evaluation starts (used [false]) +[27e7 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 processing identity 0 with bytes of 115a6c0 +[27e8 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 principal matched by identity 0 +[27e9 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f fe 40 34 23 6b 56 0b d7 82 13 da 13 73 04 5b |..@4#kV......s.[| +00000010 73 c0 4b a0 d9 34 9e ed 48 4b a4 3a 28 3b 6b e7 |s.K..4..HK.:(;k.| +[27ea 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 84 99 32 35 5e c9 84 fe e6 e6 |0E.!....25^.....| +00000010 12 1d 85 81 a5 32 1e c2 9f 12 c0 10 25 b8 c5 ca |.....2......%...| +00000020 81 8f 78 ac 4e 02 20 5e ae 73 b6 3b 1d db 8d 6e |..x.N. ^.s.;...n| +00000030 37 c4 15 56 cb 5c 22 d2 77 ce ce 5a e5 78 97 e8 |7..V.\".w..Z.x..| +00000040 09 c4 dc 13 5f 7f aa |...._..| +[27eb 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 principal evaluation succeeds for identity 0 +[27ec 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002686820 gate 1602702115129143400 evaluation succeeds +[27ed 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27ee 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27ef 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27f0 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27f1 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27f2 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[27f3 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[27f4 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[27f5 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[27f6 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f7 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f8 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f9 10-14 19:01:55.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27fa 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27fb 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27fd 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27fc 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27fe 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ff 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2800 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2801 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2802 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2803 10-14 19:01:55.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2804 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2805 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2806 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2807 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2808 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2809 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[280a 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[280b 10-14 19:01:55.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[280c 10-14 19:01:55.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[280d 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[280e 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[280f 10-14 19:01:55.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2810 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41772 +[2811 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002c651d0 +[2812 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2813 10-14 19:01:55.20 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2814 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2815 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2816 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2817 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a9 17 da 96 da d8 b4 90 37 4d 6c 04 8c ad ab |.........7Ml....| +00000010 eb 2b 9f 1e dc f1 e9 b0 2a 11 b0 7f f2 49 b6 47 |.+......*....I.G| +[2818 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 ee db 5e 48 a0 c3 fd e1 52 49 |0D. s2..^H....RI| +00000010 30 60 e0 a1 c2 af 09 bd 82 a7 af 71 d0 f3 d5 1e |0`.........q....| +00000020 d4 10 28 fc 02 20 0e 10 32 94 5a a3 a4 2d ef 20 |..(.. ..2.Z..-. | +00000030 b6 9e ea 95 45 a4 1b a2 8d 41 64 67 6b 36 43 07 |....E....Adgk6C.| +00000040 03 0f 41 d1 ab 50 |..A..P| +[2819 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[281a 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00286f9d0, header 0xc002c65680 +[281b 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[281c 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] processing txid: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 +[281d 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +[281e 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[281f 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2820 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2821 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2822 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2823 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 gate 1602702115214863200 evaluation starts +[2824 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 signed by 0 principal evaluation starts (used [false]) +[2825 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 processing identity 0 with bytes of 115a6c0 +[2826 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 principal matched by identity 0 +[2827 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a9 17 da 96 da d8 b4 90 37 4d 6c 04 8c ad ab |.........7Ml....| +00000010 eb 2b 9f 1e dc f1 e9 b0 2a 11 b0 7f f2 49 b6 47 |.+......*....I.G| +[2828 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 32 ee db 5e 48 a0 c3 fd e1 52 49 |0D. s2..^H....RI| +00000010 30 60 e0 a1 c2 af 09 bd 82 a7 af 71 d0 f3 d5 1e |0`.........q....| +00000020 d4 10 28 fc 02 20 0e 10 32 94 5a a3 a4 2d ef 20 |..(.. ..2.Z..-. | +00000030 b6 9e ea 95 45 a4 1b a2 8d 41 64 67 6b 36 43 07 |....E....Adgk6C.| +00000040 03 0f 41 d1 ab 50 |..A..P| +[2829 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 principal evaluation succeeds for identity 0 +[282a 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026731e0 gate 1602702115214863200 evaluation succeeds +[282b 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[282c 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[282d 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[282e 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[282f 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2830 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +[2831 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Entry chaincode: name:"exp02" +[2832 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2833 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2834 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b42739d3] Entry chaincode: name:"exp02" +[2835 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2836 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2837 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling GET_STATE from chaincode +[2838 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] getting state for chaincode exp02, key a, channel businesschannel +[2839 10-14 19:01:55.21 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[283a 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed GET_STATE. Sending RESPONSE +[283b 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[283c 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling GET_STATE from chaincode +[283d 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] getting state for chaincode exp02, key b, channel businesschannel +[283e 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[283f 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed GET_STATE. Sending RESPONSE +[2840 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2841 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling PUT_STATE from chaincode +[2842 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed PUT_STATE. Sending RESPONSE +[2843 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2844 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] handling PUT_STATE from chaincode +[2845 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Completed PUT_STATE. Sending RESPONSE +[2846 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2847 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [b42739d3] notifying Txid:b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, channelID:businesschannel +[2848 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2849 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b42739d3] Exit chaincode: name:"exp02" (9ms) +[284a 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[284b 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +[284c 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Exit +[284d 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Entry chaincode: name:"exp02" +[284e 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] escc for chaincode name:"exp02" is escc +[284f 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, chaincode: exp02} +[2850 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20E3FB391561259C14E9AA871CB8AF...455254494649434154452D2D2D2D2D0A +[2851 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E953BE0289F04B3715136B2AA5164A0804F89537B7BFF1AB1E1A229392073229 +[2852 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, chaincode: exp02} +[2853 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][b42739d3] Exit +[2854 10-14 19:01:55.22 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +[2855 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41772 +[2856 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41772 grpc.code=OK grpc.call_duration=21.981ms +[2857 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2858 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2859 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[285a 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[285b 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[285c 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[285d 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[285e 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[285f 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2860 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2861 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2862 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2863 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 gate 1602702115239045600 evaluation starts +[2864 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 signed by 0 principal evaluation starts (used [false]) +[2865 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 processing identity 0 with bytes of 115a6c0 +[2866 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 principal matched by identity 0 +[2867 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 71 1e 63 bd e5 53 ad 55 f2 a8 61 57 71 d6 b2 18 |q.c..S.U..aWq...| +00000010 a0 fa 08 14 7e 73 46 d2 98 f2 c5 8a a9 3a 47 4b |....~sF......:GK| +[2868 10-14 19:01:55.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 9e 09 00 a1 a8 aa 64 2b de f1 13 |0D. .......d+...| +00000010 a3 cf f7 89 b5 f0 14 b4 ce bc f3 b5 8f 93 bf 85 |................| +00000020 30 ba 14 e1 02 20 54 f1 25 7b 41 c5 8d e1 82 25 |0.... T.%{A....%| +00000030 7c b1 90 ec ab b1 ac 71 c5 7d 34 3b a3 37 df 65 ||......q.}4;.7.e| +00000040 41 57 f5 5c 41 66 |AW.\Af| +[2869 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 principal evaluation succeeds for identity 0 +[286a 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002642090 gate 1602702115239045600 evaluation succeeds +[286b 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[286c 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[286d 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[286e 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[286f 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2870 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2871 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2872 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2873 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2874 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2875 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2876 10-14 19:01:55.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2877 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2878 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2879 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287a 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287b 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287c 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287d 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[287e 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[287f 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2880 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2881 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2882 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2883 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2884 10-14 19:01:55.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2885 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2886 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2887 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2888 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2889 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[288a 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[288c 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288b 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[288d 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288e 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[288f 10-14 19:01:55.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2890 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2891 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2892 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2893 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2894 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 31 71 c5 ef 6b 70 3c 9e 71 a1 a9 16 c4 47 0e |.1q..kp<.q....G.| +00000010 a6 46 0c 80 8a 6b 1c ce cb 9d 46 e4 3b 17 6d 76 |.F...k....F.;.mv| +[2895 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 b0 5a b1 68 69 4c 5e 03 38 05 e0 |0D. ..Z.hiL^.8..| +00000010 c7 c0 a2 da 2a 22 76 5c 8a ca 58 86 2a 5e 3a 80 |....*"v\..X.*^:.| +00000020 59 bc 33 97 02 20 63 5f 9f 72 4f ec 8b 6c c4 2d |Y.3.. c_.rO..l.-| +00000030 57 a2 10 bd 92 ef 80 b3 0b 87 d1 d5 54 38 f4 d6 |W...........T8..| +00000040 5b c5 ef d9 c7 f6 |[.....| +[2896 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2897 10-14 19:01:55.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd e4 14 a6 05 c8 95 47 08 11 5a |0E.!........G..Z| +00000010 12 1f 21 c9 19 3f 17 8e 69 1e 63 12 2c 76 8b f8 |..!..?..i.c.,v..| +00000020 9c 2b b4 60 3c 02 20 04 22 10 35 8a cc 4b ab f7 |.+.`<. .".5..K..| +00000030 dd ef 66 f3 c6 f5 ad 79 b8 c4 f9 bc f5 51 30 99 |..f....y.....Q0.| +00000040 86 e3 fc 64 d3 45 55 |...d.EU| +[2898 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2899 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[289a 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[289b 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[289c 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[289d 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[289e 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[289f 10-14 19:01:55.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28a0 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a1 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a2 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a3 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[28a4 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28a5 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[28a6 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28a8 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28a7 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28a9 10-14 19:01:55.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28aa 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28ab 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28ac 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ad 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28ae 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28af 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28b0 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28b1 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b2 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28b3 10-14 19:01:55.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b4 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41778 +[28b5 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002bafbd0 +[28b6 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[28b7 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[28b8 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[28b9 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28ba 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[28bb 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[28bc 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[28bd 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[28be 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[28bf 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 1f ed 70 f2 e3 d0 a4 02 d7 23 49 69 67 43 f5 |g..p......#IigC.| +00000010 4d ca a2 c7 65 a4 14 77 1d 6f 7d 38 18 7d 89 37 |M...e..w.o}8.}.7| +[28c0 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8c 4c 72 67 da c7 20 74 df fa |0E.!...Lrg.. t..| +00000010 f7 90 c4 38 08 a4 60 8d de 3d 36 7f 41 a5 77 51 |...8..`..=6.A.wQ| +00000020 f3 1d 4f ef c1 02 20 65 60 d1 66 94 82 ad 96 19 |..O... e`.f.....| +00000030 f2 8c 86 7b 18 39 3a 62 84 a5 38 e1 37 65 9a c0 |...{.9:b..8.7e..| +00000040 b9 5b fb c2 25 f9 0c |.[..%..| +[28c1 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[28c2 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00012b180, header 0xc002a7a000 +[28c3 10-14 19:01:55.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[28c4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] processing txid: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d +[28c5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +[28c6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[28c7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[28c8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[28c9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28ca 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[28cb 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 gate 1602702115501457000 evaluation starts +[28cc 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 signed by 0 principal evaluation starts (used [false]) +[28cd 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 processing identity 0 with bytes of 115a6c0 +[28ce 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[28cf 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 principal evaluation fails +[28d0 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac150 gate 1602702115501457000 evaluation fails +[28d1 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[28d2 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[28d3 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[28d4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 gate 1602702115503036900 evaluation starts +[28d5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 signed by 0 principal evaluation starts (used [false]) +[28d6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 processing identity 0 with bytes of 115a6c0 +[28d7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[28d8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[28d9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[28da 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 principal matched by identity 0 +[28db 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 67 1f ed 70 f2 e3 d0 a4 02 d7 23 49 69 67 43 f5 |g..p......#IigC.| +00000010 4d ca a2 c7 65 a4 14 77 1d 6f 7d 38 18 7d 89 37 |M...e..w.o}8.}.7| +[28dc 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 8c 4c 72 67 da c7 20 74 df fa |0E.!...Lrg.. t..| +00000010 f7 90 c4 38 08 a4 60 8d de 3d 36 7f 41 a5 77 51 |...8..`..=6.A.wQ| +00000020 f3 1d 4f ef c1 02 20 65 60 d1 66 94 82 ad 96 19 |..O... e`.f.....| +00000030 f2 8c 86 7b 18 39 3a 62 84 a5 38 e1 37 65 9a c0 |...{.9:b..8.7e..| +00000040 b9 5b fb c2 25 f9 0c |.[..%..| +[28dd 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 principal evaluation succeeds for identity 0 +[28de 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025ac740 gate 1602702115503036900 evaluation succeeds +[28df 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[28e0 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[28e1 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[28e2 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[28e3 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[28e4 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +[28e5 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +[28e6 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[28e7 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[28e8 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +[28e9 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[28ea 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[28eb 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] handling GET_STATE from chaincode +[28ec 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] getting state for chaincode exp02, key a, channel businesschannel +[28ed 10-14 19:01:55.50 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[28ee 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Completed GET_STATE. Sending RESPONSE +[28ef 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[28f0 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [5e22eae9] notifying Txid:5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, channelID:businesschannel +[28f1 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[28f2 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5e22eae9] Exit chaincode: name:"exp02" (4ms) +[28f3 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[28f4 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +[28f5 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Exit +[28f6 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Entry chaincode: name:"exp02" +[28f7 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] escc for chaincode name:"exp02" is escc +[28f8 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, chaincode: exp02} +[28f9 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A204D97F6D0E07B02B2CB10AD339963...455254494649434154452D2D2D2D2D0A +[28fa 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6AD822634A59BFB64D73CAD62DBAA278E299DA144D0A9BB57390EF16FE11B1AC +[28fb 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d, chaincode: exp02} +[28fc 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5e22eae9] Exit +[28fd 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5e22eae9bf208fdce937a06eada4cafde40b3030d2a79fcd631746db5dd2466d] +[28fe 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41778 +[28ff 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41778 grpc.code=OK grpc.call_duration=18.4622ms +[2900 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2901 10-14 19:01:55.51 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2902 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2903 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161026 +[2904 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B7F8E5EC1BD732E60B072D283D530FD657422FB2F1E8A2994B72C17CCE56A341 +[2905 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2906 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2907 10-14 19:01:55.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2908 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2909 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[290a 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[290b 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[290c 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[290d 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[290e 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2910 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[290f 10-14 19:01:55.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2911 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2913 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2914 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2915 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2916 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2917 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +[2918 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +00000040 e6 82 cf 5e 48 73 |...^Hs| +[2919 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[291a 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[291b 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2912 10-14 19:01:55.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[291c 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[291d 10-14 19:01:55.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[291e 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[291f 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2920 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2921 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2922 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2923 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b7 f8 e5 ec 1b d7 32 e6 0b 07 2d 28 3d 53 0f d6 |......2...-(=S..| +00000010 57 42 2f b2 f1 e8 a2 99 4b 72 c1 7c ce 56 a3 41 |WB/.....Kr.|.V.A| +[2924 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d af 63 98 89 12 6c 4c b9 27 b4 5e |0D. M.c...lL.'.^| +00000010 72 3e 2a d9 98 38 f5 13 5e 22 27 26 96 2f 33 a5 |r>*..8..^"'&./3.| +00000020 d2 c0 f7 9a 02 20 3f 6d 10 06 c1 6c 92 6c 01 4d |..... ?m...l.l.M| +00000030 65 22 15 34 86 15 ba 45 14 f8 27 30 df 3f 3b ba |e".4...E..'0.?;.| +00000040 e6 82 cf 5e 48 73 |...^Hs| +[2925 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2926 10-14 19:01:55.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2927 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes +[2928 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2929 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[292a 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[292b 10-14 19:01:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[292c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[292d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 gate 1602702117320268500 evaluation starts +[292e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 signed by 0 principal evaluation starts (used [false]) +[292f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 processing identity 0 with bytes of 115a6c0 +[2930 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 principal matched by identity 0 +[2931 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 60 23 8e 2f 2e 9c c3 53 dd 80 25 c3 de f5 72 |<`#./...S..%...r| +00000010 0f ee 92 30 ff d1 2e ce ce 04 c9 a6 a3 2e 23 e6 |...0..........#.| +[2932 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 39 6a 65 ef 43 f6 6c 6b 65 a3 |0E.!..9je.C.lke.| +00000010 d6 ef e9 ce e7 05 37 d7 ba 32 82 33 e3 7e 20 81 |......7..2.3.~ .| +00000020 f1 98 1d 9b bb 02 20 1a 27 ee dc ac 66 f6 83 a0 |...... .'...f...| +00000030 24 f6 12 42 cb c8 ab a5 21 3c 83 09 6d 66 37 b4 |$..B....!<..mf7.| +00000040 3f 20 a7 51 d8 52 08 |? .Q.R.| +[2933 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 principal evaluation succeeds for identity 0 +[2934 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024de470 gate 1602702117320268500 evaluation succeeds +[2935 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2936 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2937 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2938 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2939 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4026 bytes, seq: 4}, Envelope: 4056 bytes, Signature: 0 bytes to the block puller +[293a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +[293b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[293c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[293d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[293e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[293f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +[2940 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +[2941 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +[2942 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +[2943 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +[2944 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2945 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0036d9f00 env 0xc002a7bd60 txn 0 +[2946 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002a7bd60 +[2947 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +[2948 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2949 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[294a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[294b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[294c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[294d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a4 67 17 85 e2 d3 41 c9 fe b7 3b ab 54 a7 6e 3b |.g....A...;.T.n;| +00000010 7e 56 4a ac 4c e9 f0 70 b4 ff c4 f2 76 20 41 41 |~VJ.L..p....v AA| +[294e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 cf 0f ba d2 c2 ab 87 b0 58 4e |0E.!..........XN| +00000010 d3 44 fb 51 19 62 db 1b 45 7d e4 ab 50 bf 65 5e |.D.Q.b..E}..P.e^| +00000020 4d c4 ef ed b4 02 20 37 f5 c7 4a 05 2c 1c de c2 |M..... 7..J.,...| +00000030 b2 07 6d 34 e5 d2 49 90 2d fe 1f 4f 31 f4 ca 11 |..m4..I.-..O1...| +00000040 2a 75 63 d1 1c 2e ca |*uc....| +[294f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2950 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002709800, header channel_header:"\010\003\032\013\010\243\226\235\374\005\020\214\224\224c\"\017businesschannel*@b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\334\211.\347\"{\313\241\253\373-\351)\333\342\034\0036)mYW^\214" +[2951 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2952 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2953 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2954 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2955 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] +[2956 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2957 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002bbc400 +[2958 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8f78ea8b-b0af-49f0-9adb-0fc74834e8ee] +[2959 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[295a 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8f78ea8b-b0af-49f0-9adb-0fc74834e8ee] +[295b 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +[295c 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7794e5b5-1dc4-4ef0-8c3a-186ed9775e0b] +[295d 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7794e5b5-1dc4-4ef0-8c3a-186ed9775e0b] +[295e 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 gate 1602702117328419700 evaluation starts +[295f 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 signed by 0 principal evaluation starts (used [false]) +[2960 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 processing identity 0 with bytes of 115a6c0 +[2961 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal matched by identity 0 +[2962 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 53 be 02 89 f0 4b 37 15 13 6b 2a a5 16 4a 08 |.S....K7..k*..J.| +00000010 04 f8 95 37 b7 bf f1 ab 1e 1a 22 93 92 07 32 29 |...7......"...2)| +[2963 10-14 19:01:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 d5 0c 55 55 c3 fd 5a a5 f2 b3 |0E.!....UU..Z...| +00000010 99 8e a5 12 7d ef c0 95 f3 db f0 7a 60 f5 58 ff |....}......z`.X.| +00000020 cb d1 69 c7 e5 02 20 1c 97 e9 43 81 3b b8 eb ca |..i... ...C.;...| +00000030 32 54 3c c1 64 76 39 8f 8a ed 8a 1b f5 45 b2 d0 |2T<.dv9......E..| +00000040 e7 4e 10 38 be 67 4d |.N.8.gM| +[2964 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal evaluation succeeds for identity 0 +[2965 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 signed by 1 principal evaluation starts (used [true]) +[2966 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 skipping identity 0 because it has already been used +[2967 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 principal evaluation fails +[2968 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024d2680 gate 1602702117328419700 evaluation succeeds +[2969 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7a6cb042-e2a2-41af-ac7b-8d5d9e4b9478] +[296a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7a6cb042-e2a2-41af-ac7b-8d5d9e4b9478] +[296b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +[296c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 appears to be valid +[296d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002bbc400 +[296e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0036d9f00 env 0xc002a7bd60 txn 0 +[296f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2970 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 9ms +[2971 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2972 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[2973 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +[2974 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2975 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2976 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2977 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +[2978 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2979 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[297f 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2980 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2981 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2982 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2983 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2984 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2985 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2986 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] marked as valid by state validator +[2987 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00347aec0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00347af00)} +[2988 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[2989 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[298a 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[298b 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +[298c 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +[298d 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +[298e 10-14 19:01:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +[298f 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x33, 0x71, 0xd4, 0x53, 0xea, 0xa4, 0x52, 0xeb, 0xc7, 0x1f, 0x3d, 0x6b, 0xee, 0xff, 0xe3, 0x2d, 0x6b, 0x42, 0xb7, 0x57, 0x45, 0x6d, 0xe4, 0xe6, 0xd7, 0x71, 0x6, 0xe0, 0x44, 0x33, 0xe7, 0xb8} txOffsets= +txId=b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378 locPointer=offset=70, bytesLength=2981 +] +[2990 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to txid-index +[2991 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [b42739d30536f7da821e3e26a5955beea8e3ed0ef3ac83210ea232b637f50378] to blockNumTranNum index +[2992 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +[2993 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +[2994 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +[2995 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +[2996 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[2997 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[2998 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[2999 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[299a 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[299b 10-14 19:01:57.34 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[299c 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[299d 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +[299e 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[299f 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +[29a0 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[29a1 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +[29a2 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +[29a3 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[29a4 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 19ms (state_validation=3ms block_and_pvtdata_commit=10ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +[29a5 10-14 19:01:57.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +[29a6 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41782 +[29a7 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002946320 +[29a8 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[29a9 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[29aa 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[29ab 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[29ac 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[29ad 10-14 19:01:57.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b5 0e 85 56 04 98 19 a1 34 b3 a9 d1 50 28 b9 |....V....4...P(.| +00000010 61 f5 e4 28 86 94 d6 55 cf 8f 00 51 a6 30 cb 76 |a..(...U...Q.0.v| +[29ae 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 92 98 cb ca 7a 26 a4 3c 84 86 d3 |0D. .....z&.<...| +00000010 2b df a9 c5 a9 82 4b bb 24 dc 55 96 24 63 35 0c |+.....K.$.U.$c5.| +00000020 45 a2 f0 e5 02 20 12 2b f8 46 f7 de d2 3b cc e1 |E.... .+.F...;..| +00000030 01 50 2d b8 34 ab 41 77 be 77 59 db bc a2 96 de |.P-.4.Aw.wY.....| +00000040 d6 3c 2e 93 9c 7a |.<...z| +[29af 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[29b0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003ce540, header 0xc002946870 +[29b1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[29b2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] processing txid: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f +[29b3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +[29b4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[29b5 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[29b6 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[29b7 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29b8 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[29b9 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 gate 1602702117712708500 evaluation starts +[29ba 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 signed by 0 principal evaluation starts (used [false]) +[29bb 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 processing identity 0 with bytes of 115a6c0 +[29bc 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[29bd 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 principal evaluation fails +[29be 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082eb80 gate 1602702117712708500 evaluation fails +[29bf 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[29c0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[29c1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[29c2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 gate 1602702117714861300 evaluation starts +[29c3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 signed by 0 principal evaluation starts (used [false]) +[29c4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 processing identity 0 with bytes of 115a6c0 +[29c5 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 principal matched by identity 0 +[29c6 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 b5 0e 85 56 04 98 19 a1 34 b3 a9 d1 50 28 b9 |....V....4...P(.| +00000010 61 f5 e4 28 86 94 d6 55 cf 8f 00 51 a6 30 cb 76 |a..(...U...Q.0.v| +[29c7 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 92 98 cb ca 7a 26 a4 3c 84 86 d3 |0D. .....z&.<...| +00000010 2b df a9 c5 a9 82 4b bb 24 dc 55 96 24 63 35 0c |+.....K.$.U.$c5.| +00000020 45 a2 f0 e5 02 20 12 2b f8 46 f7 de d2 3b cc e1 |E.... .+.F...;..| +00000030 01 50 2d b8 34 ab 41 77 be 77 59 db bc a2 96 de |.P-.4.Aw.wY.....| +00000040 d6 3c 2e 93 9c 7a |.<...z| +[29c8 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 principal evaluation succeeds for identity 0 +[29c9 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00082f0f0 gate 1602702117714861300 evaluation succeeds +[29ca 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[29cb 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[29cc 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[29cd 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[29ce 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[29cf 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +[29d0 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Entry chaincode: name:"exp02" +[29d1 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[29d2 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[29d3 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8a364454] Entry chaincode: name:"exp02" +[29d4 10-14 19:01:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[29d5 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[29d6 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] handling GET_STATE from chaincode +[29d7 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] getting state for chaincode exp02, key a, channel businesschannel +[29d8 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[29d9 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Completed GET_STATE. Sending RESPONSE +[29da 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[29db 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [8a364454] notifying Txid:8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, channelID:businesschannel +[29dc 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[29dd 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8a364454] Exit chaincode: name:"exp02" (6ms) +[29de 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[29df 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +[29e0 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Exit +[29e1 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Entry chaincode: name:"exp02" +[29e2 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] escc for chaincode name:"exp02" is escc +[29e3 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, chaincode: exp02} +[29e4 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2049B1969BEAD8CC3A86C47C89C5DA...455254494649434154452D2D2D2D2D0A +[29e5 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FC2E7E90C2B27FFB45DCAC79B451C8AAC5C1947422EB886AF2D4599EB045A218 +[29e6 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f, chaincode: exp02} +[29e7 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8a364454] Exit +[29e8 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8a36445450c402eb6aa78ed964ba96bffb77fb5599aa775339b1168cf11ea17f] +[29e9 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41782 +[29ea 10-14 19:01:57.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41782 grpc.code=OK grpc.call_duration=19.2705ms +[29eb 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41782: read: connection reset by peer +[29ec 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[29ed 10-14 19:01:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[29ee 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29ef 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29f0 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[29f1 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29f3 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29f2 10-14 19:01:57.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29f4 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29f5 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[29f7 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08051A0C0A0565787030321203312E30 +[29f8 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9ADD2CEEA28135628AFF5739C8B492BE67CCDD688CE1AB9BE208E1FD958E4B27 +[29f6 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29f9 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29fa 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[29fc 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[29fd 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29fb 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[29fe 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +[29ff 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +00000040 b1 d2 01 a9 db 7f |......| +[2a00 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[2a01 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[2a02 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a03 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a04 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a05 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a06 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a07 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a08 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a09 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a0a 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 gate 1602702117897859100 evaluation starts +[2a0b 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 signed by 0 principal evaluation starts (used [false]) +[2a0c 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 processing identity 0 with bytes of 115a6c0 +[2a0d 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 principal matched by identity 0 +[2a0e 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[2a0f 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[2a10 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 principal evaluation succeeds for identity 0 +[2a11 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004e8f0 gate 1602702117897859100 evaluation succeeds +[2a12 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a13 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a14 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a15 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a16 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a17 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a18 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a19 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a1a 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a1b 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a1c 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a1d 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a1e 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 gate 1602702117899869700 evaluation starts +[2a1f 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 signed by 0 principal evaluation starts (used [false]) +[2a20 10-14 19:01:57.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 processing identity 0 with bytes of 115a6c0 +[2a21 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 principal matched by identity 0 +[2a22 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[2a23 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[2a24 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 principal evaluation succeeds for identity 0 +[2a25 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fb40 gate 1602702117899869700 evaluation succeeds +[2a26 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a27 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a28 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a29 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a2a 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a2b 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2a2c 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a2d 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +[2a2e 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a2f 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +00000040 b1 d2 01 a9 db 7f |......| +[2a30 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a31 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[2a32 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a33 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a34 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2a35 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[2a36 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a37 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[2a38 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2a39 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a3a 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a3b 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2a3c 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a3d 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a3e 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a3f 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a40 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a41 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a42 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a43 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a44 10-14 19:01:57.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 gate 1602702117904160700 evaluation starts +[2a45 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 signed by 0 principal evaluation starts (used [false]) +[2a46 10-14 19:01:57.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 processing identity 0 with bytes of 115a6c0 +[2a47 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 principal matched by identity 0 +[2a48 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[2a49 10-14 19:01:57.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[2a4a 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 principal evaluation succeeds for identity 0 +[2a4b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001ce0e0 gate 1602702117904160700 evaluation succeeds +[2a4c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a4d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a4e 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a4f 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a50 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a51 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a52 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2a54 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a53 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a55 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a56 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a57 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a58 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a59 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a5a 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a5b 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a5c 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 gate 1602702117939656900 evaluation starts +[2a5d 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 signed by 0 principal evaluation starts (used [false]) +[2a5e 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 processing identity 0 with bytes of 115a6c0 +[2a5f 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 principal matched by identity 0 +[2a60 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[2a61 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[2a62 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 principal evaluation succeeds for identity 0 +[2a63 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001cfea0 gate 1602702117939656900 evaluation succeeds +[2a64 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a65 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a66 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a67 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a68 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a69 10-14 19:01:57.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2a6a 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 00 ee d5 42 09 d6 05 c2 45 a3 92 ec 82 74 b9 |T...B....E....t.| +00000010 a1 93 fe f0 61 06 b6 bd 25 a5 75 1f 6c f2 af e9 |....a...%.u.l...| +[2a6b 10-14 19:01:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 3e 3f 7d 4c 80 0f 41 cf ad 62 40 |0D. k>?}L..A..b@| +00000010 1a 4d c6 62 7d 62 f7 af 6d 7c 4f 21 67 f2 b1 b0 |.M.b}b..m|O!g...| +00000020 67 ba ef 97 02 20 67 98 38 ec b8 a4 71 3b 02 7d |g.... g.8...q;.}| +00000030 53 9d 43 64 d0 00 fa 37 fd bf 19 6f b0 f1 89 ea |S.Cd...7...o....| +00000040 b1 d2 01 a9 db 7f |......| +[2a6c 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8a ac d9 d7 e7 12 f8 bf b1 f7 6d 45 ba c9 bc b2 |..........mE....| +00000010 bf 75 d2 be e9 cd 0f 94 9e cc 33 01 72 73 ff bc |.u........3.rs..| +[2a6e 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 41 a1 fb fc 41 10 f6 f6 79 49 89 |0D. ;A...A...yI.| +00000010 c7 a4 37 67 06 d0 07 d4 df 55 66 48 28 9c ba 3a |..7g.....UfH(..:| +00000020 6b f4 0a c5 02 20 4b d5 67 7e 9c 52 e5 7f 7f ca |k.... K.g~.R....| +00000030 2f 13 49 37 51 67 97 57 a6 15 97 cb c0 a6 fb 3f |/.I7Qg.W.......?| +00000040 21 21 53 21 4c 86 |!!S!L.| +[2a6f 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a70 10-14 19:01:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a71 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a72 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a73 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a74 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a6d 10-14 19:01:57.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a75 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a76 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[2a77 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a78 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2a79 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a7a 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 gate 1602702117977343600 evaluation starts +[2a7b 10-14 19:01:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 signed by 0 principal evaluation starts (used [false]) +[2a7c 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 processing identity 0 with bytes of 115a6c0 +[2a7d 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 principal matched by identity 0 +[2a7e 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a ac 05 8c 9c fa 76 88 9c e4 cd 23 2e 8a 61 c2 |J.....v....#..a.| +00000010 f3 81 28 bd 41 7a 1b fa 31 6c 99 9f 83 3a 2a 5a |..(.Az..1l...:*Z| +[2a7f 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 47 37 5c 99 96 a7 e0 30 b5 09 0a |0D. 1G7\....0...| +00000010 df ab 48 e9 87 73 6c 4f 8a 52 38 75 e8 17 63 04 |..H..slO.R8u..c.| +00000020 2c a0 a0 44 02 20 0c 68 30 24 b6 d8 2d 63 a1 6b |,..D. .h0$..-c.k| +00000030 f1 c5 ea a2 ef d5 1b 96 81 10 17 25 66 fa 82 1b |...........%f...| +00000040 bb 28 82 9b 2c b5 |.(..,.| +[2a80 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 principal evaluation succeeds for identity 0 +[2a81 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a6160 gate 1602702117977343600 evaluation succeeds +[2a82 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a83 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a84 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a85 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a86 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a87 10-14 19:01:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a88 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a89 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a8a 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a8b 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2a8c 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2a8d 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2a8e 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 gate 1602702117991375900 evaluation starts +[2a8f 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 signed by 0 principal evaluation starts (used [false]) +[2a90 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 processing identity 0 with bytes of 115a6c0 +[2a91 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 principal matched by identity 0 +[2a92 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 9c d7 ec ff 7a 4d bc 21 e7 12 bd 52 f2 2b 8d |Z....zM.!...R.+.| +00000010 0a 1e 1d 07 e5 7b d7 ff ba dd c9 7a 2f 24 d4 41 |.....{.....z/$.A| +[2a93 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 ff 72 77 df be 9a 6f 0d 18 f5 |0E.!...rw...o...| +00000010 6b e7 61 0c e1 00 d0 df c2 eb ca 15 21 14 5a 55 |k.a.........!.ZU| +00000020 b8 57 bb 00 62 02 20 29 7f de 02 a4 86 73 01 d6 |.W..b. ).....s..| +00000030 12 ce 45 2d 38 9f 60 e5 26 dc 06 c1 19 f3 6a 94 |..E-8.`.&.....j.| +00000040 ec 77 cf 10 c3 fb 06 |.w.....| +[2a94 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 principal evaluation succeeds for identity 0 +[2a95 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a7410 gate 1602702117991375900 evaluation succeeds +[2a96 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2a97 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2a98 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2a99 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2a9a 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a9b 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +[2a9c 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes +[2a9d 10-14 19:01:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a9e 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41786 +[2a9f 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00278c8c0 +[2aa0 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2aa1 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2aa2 10-14 19:01:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2aa3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2aa4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2aa5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 8c 37 b9 69 af 3c 00 2a 82 e5 74 fd 77 a7 7d |..7.i.<.*..t.w.}| +00000010 31 9b c0 36 67 ba a5 7a 82 c2 b5 72 06 d7 1e 22 |1..6g..z...r..."| +[2aa6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 be f8 41 6b 01 79 19 01 a7 8b |0E.!....Ak.y....| +00000010 28 b8 b2 12 d7 bc 2d 93 d6 55 42 ae 9b 9c ea f0 |(.....-..UB.....| +00000020 c8 ec 62 63 1c 02 20 63 b8 7d be e4 fa 83 49 49 |..bc.. c.}....II| +00000030 a0 c3 06 1a 9b 6d 0e db 9a 33 51 f9 42 97 fd 93 |.....m...3Q.B...| +00000040 5e b4 c7 29 c9 7a 26 |^..).z&| +[2aa7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2aa8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cef50, header 0xc00278ccd0 +[2aa9 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2aaa 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] processing txid: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd +[2aab 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +[2aac 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2aad 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2aae 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2aaf 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ab0 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2ab1 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 gate 1602702118025143800 evaluation starts +[2ab2 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 signed by 0 principal evaluation starts (used [false]) +[2ab3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 processing identity 0 with bytes of 115a6c0 +[2ab4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[2ab5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 principal evaluation fails +[2ab6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003def80 gate 1602702118025143800 evaluation fails +[2ab7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers +[2ab8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2ab9 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2aba 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 gate 1602702118026864500 evaluation starts +[2abb 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 signed by 0 principal evaluation starts (used [false]) +[2abc 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 processing identity 0 with bytes of 115a6c0 +[2abd 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 principal matched by identity 0 +[2abe 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 8c 37 b9 69 af 3c 00 2a 82 e5 74 fd 77 a7 7d |..7.i.<.*..t.w.}| +00000010 31 9b c0 36 67 ba a5 7a 82 c2 b5 72 06 d7 1e 22 |1..6g..z...r..."| +[2abf 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e4 be f8 41 6b 01 79 19 01 a7 8b |0E.!....Ak.y....| +00000010 28 b8 b2 12 d7 bc 2d 93 d6 55 42 ae 9b 9c ea f0 |(.....-..UB.....| +00000020 c8 ec 62 63 1c 02 20 63 b8 7d be e4 fa 83 49 49 |..bc.. c.}....II| +00000030 a0 c3 06 1a 9b 6d 0e db 9a 33 51 f9 42 97 fd 93 |.....m...3Q.B...| +00000040 5e b4 c7 29 c9 7a 26 |^..).z&| +[2ac0 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 principal evaluation succeeds for identity 0 +[2ac1 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003df6a0 gate 1602702118026864500 evaluation succeeds +[2ac2 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2ac3 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2ac4 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2ac5 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2ac6 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2ac7 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +[2ac8 10-14 19:01:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Entry chaincode: name:"exp02" +[2ac9 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2aca 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2acb 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ae925824] Entry chaincode: name:"exp02" +[2acc 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2acd 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2ace 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling GET_STATE from chaincode +[2acf 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] getting state for chaincode exp02, key a, channel businesschannel +[2ad0 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2ad1 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed GET_STATE. Sending RESPONSE +[2ad2 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2ad3 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling GET_STATE from chaincode +[2ad4 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] getting state for chaincode exp02, key b, channel businesschannel +[2ad5 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2ad6 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed GET_STATE. Sending RESPONSE +[2ad7 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2ad8 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling PUT_STATE from chaincode +[2ad9 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed PUT_STATE. Sending RESPONSE +[2ada 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2adb 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] handling PUT_STATE from chaincode +[2adc 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Completed PUT_STATE. Sending RESPONSE +[2add 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2ade 10-14 19:01:58.03 UTC] [%{longpkg}] %{callpath} -> DEBU [ae925824] notifying Txid:ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, channelID:businesschannel +[2adf 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2ae0 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ae925824] Exit chaincode: name:"exp02" (10ms) +[2ae1 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2ae2 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +[2ae3 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Exit +[2ae4 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Entry chaincode: name:"exp02" +[2ae5 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] escc for chaincode name:"exp02" is escc +[2ae6 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, chaincode: exp02} +[2ae7 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20617110B2C32FEB28F85E5353FE28...455254494649434154452D2D2D2D2D0A +[2ae8 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D01B98BD780345588DF8DC7722FFB6D5B5CCE7B3B3E7842FB1624016E54AC9A1 +[2ae9 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, chaincode: exp02} +[2aea 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ae925824] Exit +[2aeb 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +[2aec 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41786 +[2aed 10-14 19:01:58.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41786 grpc.code=OK grpc.call_duration=29.5355ms +[2aee 10-14 19:01:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2aef 10-14 19:01:58.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2af0 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2af1 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2af2 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2af3 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af4 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af5 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af6 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af7 10-14 19:01:58.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af8 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2af9 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2afa 10-14 19:01:58.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2afb 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2afc 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2afd 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2afe 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2aff 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2b00 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b01 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b02 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b03 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b04 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b05 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b06 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b07 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 gate 1602702118184463900 evaluation starts +[2b08 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 signed by 0 principal evaluation starts (used [false]) +[2b09 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 processing identity 0 with bytes of 115a6c0 +[2b0a 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 principal matched by identity 0 +[2b0b 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +[2b0c 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +00000040 d4 6b 8e 16 3c bb |.k..<.| +[2b0d 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 principal evaluation succeeds for identity 0 +[2b0e 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000405a20 gate 1602702118184463900 evaluation succeeds +[2b0f 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b10 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b11 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b12 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b13 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b14 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2b15 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2b16 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2b17 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2b18 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b19 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b1a 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b1b 10-14 19:01:58.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2b1c 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b1d 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b1e 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b1f 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[2b20 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +[2b21 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2b22 10-14 19:01:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b23 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b24 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b25 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2b26 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b27 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b28 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b29 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2a 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2b 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b2c 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2b2d 10-14 19:01:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2e 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2b2f 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b30 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b31 10-14 19:01:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b32 10-14 19:01:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b33 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[2b34 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[2b35 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b36 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b37 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b38 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b39 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b3a 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 gate 1602702118272424800 evaluation starts +[2b3b 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 signed by 0 principal evaluation starts (used [false]) +[2b3c 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 processing identity 0 with bytes of 115a6c0 +[2b3d 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2b3e 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 principal evaluation fails +[2b3f 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444ecb0 gate 1602702118272424800 evaluation fails +[2b40 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2b41 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b42 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2b43 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 gate 1602702118272849600 evaluation starts +[2b44 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 signed by 0 principal evaluation starts (used [false]) +[2b45 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 processing identity 0 with bytes of 115a6c0 +[2b46 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 principal matched by identity 0 +[2b47 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[2b48 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[2b49 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 principal evaluation succeeds for identity 0 +[2b4a 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00444f230 gate 1602702118272849600 evaluation succeeds +[2b4b 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2b4c 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2b4d 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b4e 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b4f 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b50 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b51 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b52 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[2b53 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b54 10-14 19:01:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b55 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b56 10-14 19:01:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b57 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b58 10-14 19:01:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b59 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +[2b5a 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +[2b5b 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b5c 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\221\004c\343`Nhc\360\205" > > , Envelope: 165 bytes, Signature: 0 bytes +[2b5d 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2b5e 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b5f 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b60 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b61 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b62 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b63 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b64 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b65 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 gate 1602702118305576100 evaluation starts +[2b66 10-14 19:01:58.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 signed by 0 principal evaluation starts (used [false]) +[2b67 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 processing identity 0 with bytes of 115a6c0 +[2b68 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 principal matched by identity 0 +[2b69 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +[2b6a 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +00000040 60 4e 68 63 f0 85 |`Nhc..| +[2b6b 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 principal evaluation succeeds for identity 0 +[2b6c 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00461ccf0 gate 1602702118305576100 evaluation succeeds +[2b6d 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b6e 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b6f 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b70 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2b71 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b72 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2b73 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2b74 10-14 19:01:58.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2b75 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2b76 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b77 10-14 19:01:58.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b79 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b7a 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[2b7b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b7c 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b78 10-14 19:01:58.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[2b7d 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[2b7e 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2b7f 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[2b80 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b82 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[2b81 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 13 a6 71 bf 6a 3e d4 d0 9e 7d 36 1c c2 57 0d |...q.j>...}6..W.| +00000010 f8 6d 24 c1 bf 34 46 e7 50 6a 47 93 58 10 35 8d |.m$..4F.PjG.X.5.| +[2b83 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 59 7c 75 f6 8d f7 8a 78 7c 6c |0E.!..Y|u....x|l| +00000010 d0 4c 11 22 d5 dc 9d 7d 90 55 d0 4d 8a c8 f1 79 |.L."...}.U.M...y| +00000020 16 19 6d 3f db 02 20 7a fe f5 17 71 77 37 0a 43 |..m?.. z...qw7.C| +00000030 1b 7f 98 33 9f 3a 56 aa 43 7a 4c 39 c3 f9 17 36 |...3.:V.CzL9...6| +00000040 92 e5 55 2e bc f4 3b |..U...;| +[2b84 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b85 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b86 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b87 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[2b88 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[2b89 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\221\004c\343`Nhc\360\205" > alive: alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +[2b8a 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2b8b 10-14 19:01:58.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b8c 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2b8d 10-14 19:01:58.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2b8e 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2b8f 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b90 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b91 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[2b92 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[2b93 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[2b94 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b95 10-14 19:01:58.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b96 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b97 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2b98 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2b99 10-14 19:01:58.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b9a 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41792 +[2b9b 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002669f90 +[2b9c 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2b9d 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2b9e 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2b9f 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2ba0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ba1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 d7 1d 5e be 7a 23 fe 1d 6f 66 20 22 9f 7d 06 |...^.z#..of ".}.| +00000010 85 29 01 65 b0 fd 8f c4 38 41 63 da 22 f1 9f 2c |.).e....8Ac."..,| +[2ba2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb dd 4b 42 92 9c 9c 43 31 ae |0E.!....KB...C1.| +00000010 a3 5f 3c 6f 6f c5 43 da 24 ee f9 66 87 3a a6 04 |._ DEBU exits successfully +[2ba4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003cfce0, header 0xc0025985a0 +[2ba5 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2ba6 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] processing txid: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37 +[2ba7 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +[2ba8 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2ba9 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2baa 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2bab 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2bac 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2bad 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 gate 1602702118425886400 evaluation starts +[2bae 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 signed by 0 principal evaluation starts (used [false]) +[2baf 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 processing identity 0 with bytes of 115a6c0 +[2bb0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 principal matched by identity 0 +[2bb1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 d7 1d 5e be 7a 23 fe 1d 6f 66 20 22 9f 7d 06 |...^.z#..of ".}.| +00000010 85 29 01 65 b0 fd 8f c4 38 41 63 da 22 f1 9f 2c |.).e....8Ac."..,| +[2bb2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba fb dd 4b 42 92 9c 9c 43 31 ae |0E.!....KB...C1.| +00000010 a3 5f 3c 6f 6f c5 43 da 24 ee f9 66 87 3a a6 04 |._ DEBU 0xc0032e5ad0 principal evaluation succeeds for identity 0 +[2bb4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e5ad0 gate 1602702118425886400 evaluation succeeds +[2bb5 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2bb6 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2bb7 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2bb8 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2bb9 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2bba 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +[2bbb 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Entry chaincode: name:"exp02" +[2bbc 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2bbd 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2bbe 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][00749d6f] Entry chaincode: name:"exp02" +[2bbf 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2bc0 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2bc1 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] handling GET_STATE from chaincode +[2bc2 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] getting state for chaincode exp02, key a, channel businesschannel +[2bc3 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2bc4 10-14 19:01:58.42 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Completed GET_STATE. Sending RESPONSE +[2bc5 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2bc6 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [00749d6f] notifying Txid:00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, channelID:businesschannel +[2bc7 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2bc8 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][00749d6f] Exit chaincode: name:"exp02" (8ms) +[2bc9 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2bca 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +[2bcb 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Exit +[2bcc 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Entry chaincode: name:"exp02" +[2bcd 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] escc for chaincode name:"exp02" is escc +[2bce 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, chaincode: exp02} +[2bcf 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2025D58FB0016627EF4050B096597C...455254494649434154452D2D2D2D2D0A +[2bd0 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 069C1206B38B745054235CED20E9135AD67AD82C2B00F4207093045FE7754F06 +[2bd1 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37, chaincode: exp02} +[2bd2 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][00749d6f] Exit +[2bd3 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [00749d6f2d3cb54384f45ddcbcf81b9899bc2d560f453fe2b0c155a988e27c37] +[2bd4 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41792 +[2bd5 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41792 grpc.code=OK grpc.call_duration=16.234ms +[2bd6 10-14 19:01:58.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2bd7 10-14 19:01:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2bd8 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2bd9 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bda 10-14 19:01:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\025FG]L\260\032\350{\313\275" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2bdb 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2bdc 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +[2bdd 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +00000040 b0 1a e8 7b cb bd |...{..| +[2bde 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2bdf 10-14 19:01:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 af 68 bb 4d bb e7 05 16 df 68 |0E.!...h.M.....h| +00000010 ec 0e 5e 7c 0f 81 9a 16 e0 77 8f e1 c0 44 50 fc |..^|.....w...DP.| +00000020 0c f7 c5 0e 49 02 20 07 84 69 9a a2 d2 06 4c 29 |....I. ..i....L)| +00000030 10 63 2a 57 64 aa a4 2a f2 3c 63 7d 3a bd bc 99 |.c*Wd..*. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2be1 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2be2 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2be3 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2be4 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2be5 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2be6 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2be7 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2be8 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2be9 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bea 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2beb 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[2bec 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\016\025FG]L\260\032\350{\313\275" secret_envelope: > alive:*\331\2308\365\023^\"'&\226/3\245\322\300\367\232\002 ?m\020\006\301l\222l\001Me\"\0254\206\025\272E\024\370'0\337?;\272\346\202\317^Hs" > +[2bed 10-14 19:01:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2bee 10-14 19:01:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bef 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2bf0 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2bf1 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2bf2 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2bf3 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bf4 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2bf5 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2bf6 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2bf7 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2bf8 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bf9 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2bfb 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2bfc 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2bfd 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bfa 10-14 19:01:58.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bfe 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2bff 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2c00 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2c01 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c02 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2c03 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2c04 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2c05 10-14 19:01:58.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c06 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c07 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c08 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2c09 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c0a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c0b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c0c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c0d 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c0e 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c0f 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c10 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c11 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c12 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c13 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c14 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c15 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 gate 1602702118604696700 evaluation starts +[2c16 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 signed by 0 principal evaluation starts (used [false]) +[2c17 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 processing identity 0 with bytes of 115a6c0 +[2c18 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 principal matched by identity 0 +[2c19 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[2c1a 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[2c1c 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 principal evaluation succeeds for identity 0 +[2c1d 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0830 gate 1602702118604696700 evaluation succeeds +[2c1e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c1b 10-14 19:01:58.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2c1f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c21 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c22 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c23 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c24 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c25 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c26 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c27 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c20 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161027 +[2c28 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c2a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c2b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 gate 1602702118612772600 evaluation starts +[2c2c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 signed by 0 principal evaluation starts (used [false]) +[2c2d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 processing identity 0 with bytes of 115a6c0 +[2c2e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 principal matched by identity 0 +[2c2f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[2c30 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[2c31 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 principal evaluation succeeds for identity 0 +[2c32 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1540 gate 1602702118612772600 evaluation succeeds +[2c33 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c34 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c35 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c36 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c37 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c29 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5A6E3BA087CAB241427625DC8E7DBCFA65B011B579389722F0EDC862A540FE5E +[2c38 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2c39 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2c3a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2c3b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c3c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2c3d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c3e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[2c3f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2c40 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[2c41 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c42 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2c43 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c44 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c45 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c46 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c47 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c48 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c49 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c4a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c4b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c4c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c4d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 gate 1602702118615799100 evaluation starts +[2c4e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 signed by 0 principal evaluation starts (used [false]) +[2c4f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 processing identity 0 with bytes of 115a6c0 +[2c50 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 principal matched by identity 0 +[2c51 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[2c52 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[2c53 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 principal evaluation succeeds for identity 0 +[2c54 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033d31f0 gate 1602702118615799100 evaluation succeeds +[2c55 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c56 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c57 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c58 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c59 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5a 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5b 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2c5c 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5d 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5e 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5f 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[2c60 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c61 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c62 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c63 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c64 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c65 10-14 19:01:58.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c66 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2c67 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2c68 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c69 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[2c6a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2c6b 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +[2c6c 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +00000040 b0 1a e8 7b cb bd |...{..| +[2c6d 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c6e 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c6f 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2c70 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c71 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c72 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c73 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c74 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c75 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c76 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c77 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 gate 1602702118658565800 evaluation starts +[2c78 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 signed by 0 principal evaluation starts (used [false]) +[2c79 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 processing identity 0 with bytes of 115a6c0 +[2c7a 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 principal matched by identity 0 +[2c7b 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f b4 f3 fe f7 0c c2 b9 40 54 c6 c5 7b 38 e9 f8 |........@T..{8..| +00000010 75 95 09 4a 4a dd ec 97 5a 5b 24 3f b9 5a d9 b7 |u..JJ...Z[$?.Z..| +[2c7c 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d d7 95 e4 9b 1a c4 2e 00 2c 1d d1 |0D. ]........,..| +00000010 ea 2d a3 d6 d8 c7 12 72 66 e6 bd 2a 78 fd 6c 8c |.-.....rf..*x.l.| +00000020 7d 6a 9d c6 02 20 34 5b 91 74 1b 1e c3 bd 15 66 |}j... 4[.t.....f| +00000030 4a b0 5e 37 2f 70 c1 89 e9 98 dd 07 e1 7a 77 f1 |J.^7/p.......zw.| +00000040 d4 6b 8e 16 3c bb |.k..<.| +[2c7d 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 principal evaluation succeeds for identity 0 +[2c7e 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034032f0 gate 1602702118658565800 evaluation succeeds +[2c7f 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c80 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c81 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c82 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c83 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c84 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c85 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2c86 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +[2c87 10-14 19:01:58.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +00000040 2d c3 a9 7e 8e 17 |-..~..| +[2c88 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c89 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2c8a 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8b 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8c 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2c8d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2c8f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2c90 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +[2c91 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +00000040 2d c3 a9 7e 8e 17 |-..~..| +[2c92 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2c93 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 db 9c 47 d8 ff b2 0b f2 51 0d |0E.!....G.....Q.| +00000010 00 26 42 3d 45 2f f1 70 98 fc b5 4b c7 88 1f e0 |.&B=E/.p...K....| +00000020 fd 04 29 0c a8 02 20 5e b5 34 40 aa b5 8e 5e 71 |..)... ^.4@...^q| +00000030 c4 8d 9c 6f 89 59 4a e4 4d 56 3f a8 0a 41 0a 57 |...o.YJ.MV?..A.W| +00000040 be 69 af c1 73 1c cc |.i..s..| +[2c94 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2c95 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2c96 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2c97 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2c98 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c99 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c9a 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2c9b 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c9c 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2c9d 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c9e 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c9f 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ca0 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ca1 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ca2 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ca3 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ca4 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 gate 1602702118669492100 evaluation starts +[2ca5 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 signed by 0 principal evaluation starts (used [false]) +[2ca6 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 processing identity 0 with bytes of 115a6c0 +[2ca7 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 principal matched by identity 0 +[2ca8 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[2ca9 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[2caa 10-14 19:01:58.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 principal evaluation succeeds for identity 0 +[2cab 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f9210 gate 1602702118669492100 evaluation succeeds +[2cac 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2cad 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2cae 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2caf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2cb0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2cb1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cb2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a 6e 3b a0 87 ca b2 41 42 76 25 dc 8e 7d bc fa |Zn;....ABv%..}..| +00000010 65 b0 11 b5 79 38 97 22 f0 ed c8 62 a5 40 fe 5e |e...y8."...b.@.^| +[2cb3 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 4f f0 79 c1 a7 5b 01 b1 9d af 33 |0D. .O.y..[....3| +00000010 6d c8 45 7c 36 b7 74 56 a2 ce 7a ac f8 dc 1f 5f |m.E|6.tV..z...._| +00000020 6f a4 86 a7 02 20 0b 25 d7 7a e1 27 3b d8 e5 e2 |o.... .%.z.';...| +00000030 44 cc 96 c8 3a 39 ea 86 35 ca d7 d9 70 37 96 6c |D...:9..5...p7.l| +00000040 2d c3 a9 7e 8e 17 |-..~..| +[2cb4 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cb5 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cb6 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cb7 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2cb8 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cb9 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cba 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cbb 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cbc 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cbd 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cbe 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cbf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 gate 1602702118671239100 evaluation starts +[2cc0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 signed by 0 principal evaluation starts (used [false]) +[2cc1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 processing identity 0 with bytes of 115a6c0 +[2cc2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 principal matched by identity 0 +[2cc3 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df 35 96 5b f9 c7 e4 09 75 26 da 86 d5 64 19 39 |.5.[....u&...d.9| +00000010 c4 52 00 a9 e2 10 2f 62 35 8c fe 0f 1e e4 a2 08 |.R..../b5.......| +[2cc4 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a9 1b 57 8e e2 de b5 84 51 98 c5 |0D. ...W.....Q..| +00000010 0c 31 f1 bf 53 25 ff 7f 87 43 bc bc 28 02 29 1d |.1..S%...C..(.).| +00000020 02 bb c9 62 02 20 2c 6c 6d 7e 19 a8 21 d9 a3 28 |...b. ,lm~..!..(| +00000030 57 09 59 b0 b3 87 5c e9 c6 48 d3 3e 91 04 63 e3 |W.Y...\..H.>..c.| +00000040 60 4e 68 63 f0 85 |`Nhc..| +[2cc5 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 principal evaluation succeeds for identity 0 +[2cc6 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00344eea0 gate 1602702118671239100 evaluation succeeds +[2cc7 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2cc8 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2cc9 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2cca 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ccb 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ccc 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ccd 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2cce 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 3a a0 bc 40 8c ea 42 c3 cd ca a4 a5 50 95 87 |P:..@..B.....P..| +00000010 38 ae 68 07 04 bf f7 dd b7 18 2e 3e 9e ae e2 73 |8.h........>...s| +[2ccf 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a a0 11 dd dc 73 c6 4f 94 ec ff 79 |0D. j....s.O...y| +00000010 cd 48 9e 80 f3 84 78 2c 07 ee 6b 1d 5c f3 43 2f |.H....x,..k.\.C/| +00000020 ec 77 13 4f 02 20 5e b1 c7 eb b8 05 ae bc cf a7 |.w.O. ^.........| +00000030 0c d7 52 4a 8c d3 c5 6f 29 3e 0e 15 46 47 5d 4c |..RJ...o)>..FG]L| +00000040 b0 1a e8 7b cb bd |...{..| +[2cd0 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2cd1 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd2 10-14 19:01:58.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd3 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2cd4 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2cd5 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd6 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd7 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd8 10-14 19:01:58.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd9 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2cda 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2cdb 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cdc 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cdd 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cde 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cdf 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ce0 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ce1 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ce2 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 gate 1602702118932130300 evaluation starts +[2ce3 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 signed by 0 principal evaluation starts (used [false]) +[2ce4 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 processing identity 0 with bytes of 115a6c0 +[2ce5 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 principal matched by identity 0 +[2ce6 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[2ce7 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[2ce8 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 principal evaluation succeeds for identity 0 +[2ce9 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003468c30 gate 1602702118932130300 evaluation succeeds +[2cea 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ceb 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2cec 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ced 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2cee 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cef 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf0 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cf1 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cf2 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cf3 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cf4 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cf5 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 gate 1602702118935672700 evaluation starts +[2cf6 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 signed by 0 principal evaluation starts (used [false]) +[2cf7 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 processing identity 0 with bytes of 115a6c0 +[2cf8 10-14 19:01:58.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 principal matched by identity 0 +[2cf9 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[2cfa 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[2cfb 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 principal evaluation succeeds for identity 0 +[2cfc 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003469820 gate 1602702118935672700 evaluation succeeds +[2cfd 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2cfe 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2cff 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d00 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d01 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d02 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2d03 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2d04 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d05 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d06 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d07 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d08 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d09 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d0a 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d0b 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 gate 1602702118947573900 evaluation starts +[2d0c 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 signed by 0 principal evaluation starts (used [false]) +[2d0d 10-14 19:01:58.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 processing identity 0 with bytes of 115a6c0 +[2d0e 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d0f 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d10 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[2d11 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d12 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d13 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2d14 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d15 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2d16 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d17 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 principal matched by identity 0 +[2d18 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[2d19 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[2d1a 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 principal evaluation succeeds for identity 0 +[2d1b 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034989f0 gate 1602702118947573900 evaluation succeeds +[2d1c 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d1d 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d1e 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d1f 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d20 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d21 10-14 19:01:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d22 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2d23 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d24 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d25 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d26 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d27 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d28 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d29 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d2a 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 gate 1602702118965962100 evaluation starts +[2d2b 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 signed by 0 principal evaluation starts (used [false]) +[2d2c 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 processing identity 0 with bytes of 115a6c0 +[2d2d 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 principal matched by identity 0 +[2d2e 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[2d2f 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[2d30 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 principal evaluation succeeds for identity 0 +[2d31 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003499d60 gate 1602702118965962100 evaluation succeeds +[2d32 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d33 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d34 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d35 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d36 10-14 19:01:58.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d37 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes +[2d38 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d39 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2d3a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2d3b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d3c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2d3d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 gate 1602702120141345300 evaluation starts +[2d3e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 signed by 0 principal evaluation starts (used [false]) +[2d3f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 processing identity 0 with bytes of 115a6c0 +[2d40 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 principal matched by identity 0 +[2d41 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 d6 14 1a 1d d6 a3 5b a8 f3 79 8f a1 18 f1 f8 |.......[..y.....| +00000010 fd e7 fb 1d 46 7d 26 5c 74 83 00 1d bc fe 31 a5 |....F}&\t.....1.| +[2d42 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 42 c2 51 32 6b 05 18 86 df 65 2c |0D. .B.Q2k....e,| +00000010 06 82 de 32 c2 91 9c 08 bf ae ca 0c b5 84 82 bf |...2............| +00000020 bc 69 b1 65 02 20 70 35 60 60 26 37 76 b1 37 cf |.i.e. p5``&7v.7.| +00000030 73 f2 6f f3 fe 9a 5a 41 76 e6 30 ee b0 9a 90 41 |s.o...ZAv.0....A| +00000040 4b c3 34 b5 f4 ff |K.4...| +[2d43 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 principal evaluation succeeds for identity 0 +[2d44 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003494ba0 gate 1602702120141345300 evaluation succeeds +[2d45 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2d46 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2d47 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2d48 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2d49 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4022 bytes, seq: 5}, Envelope: 4052 bytes, Signature: 0 bytes to the block puller +[2d4a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +[2d4b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d4c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[2d4d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[2d4e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[2d4f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +[2d50 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +[2d51 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +[2d52 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +[2d53 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +[2d54 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2d55 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0031b1400 env 0xc002492820 txn 0 +[2d56 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002492820 +[2d57 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +[2d58 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2d59 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2d5a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2d5b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2d5c 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2d5d 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7f ae 8f 97 c7 fb 18 ea b6 59 a9 4d 93 fc c5 |(.........Y.M...| +00000010 7a 4f 6d 72 1a e8 52 6e 49 45 6b d3 46 47 36 8c |zOmr..RnIEk.FG6.| +[2d5e 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 36 cb 59 c0 2e 80 ab 1e 14 a2 67 83 |0C..6.Y.......g.| +00000010 d5 c4 4b 58 57 22 22 19 fd 67 84 79 8e b4 40 01 |..KXW""..g.y..@.| +00000020 10 ea 3b 02 20 21 19 8f 11 38 c4 a5 20 92 27 6a |..;. !...8.. .'j| +00000030 4d 8d ae 55 9f d6 2f be b1 10 22 69 cd d4 ad 2f |M..U../..."i.../| +00000040 5c 21 63 9f f2 |\!c..| +[2d5f 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2d60 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002c11800, header channel_header:"\010\003\032\013\010\246\226\235\374\005\020\254\276\211\007\"\017businesschannel*@ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030\330\206\340\005i\265N\336\022\247\255en\313\361\240\354\345\020\233\001\3709\230" +[2d61 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2d62 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2d63 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2d64 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2d65 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] +[2d66 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2d67 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0034f0000 +[2d68 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [2745739e-20f5-48af-85ed-b6a031dec2f1] +[2d69 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2d6a 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [2745739e-20f5-48af-85ed-b6a031dec2f1] +[2d6b 10-14 19:02:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +[2d6c 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c2643954-01af-4dda-af1a-c17b9f307650] +[2d6d 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2643954-01af-4dda-af1a-c17b9f307650] +[2d6f 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 gate 1602702120150437800 evaluation starts +[2d70 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 signed by 0 principal evaluation starts (used [false]) +[2d71 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 processing identity 0 with bytes of 115a6c0 +[2d6e 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d72 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal matched by identity 0 +[2d74 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d73 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 1b 98 bd 78 03 45 58 8d f8 dc 77 22 ff b6 d5 |....x.EX...w"...| +00000010 b5 cc e7 b3 b3 e7 84 2f b1 62 40 16 e5 4a c9 a1 |......./.b@..J..| +[2d75 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d76 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d77 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 e6 f5 4a 44 f9 fd 23 6f 73 f2 db |0D. u..JD..#os..| +00000010 94 10 af 74 b7 7f 02 c5 28 78 73 aa 3b 4b 12 ab |...t....(xs.;K..| +00000020 8a 7a ed 79 02 20 6c 16 1d 7b 22 87 af a0 55 cd |.z.y. l..{"...U.| +00000030 a3 05 bf be 46 84 23 02 55 ec 84 b8 d3 8f d8 ab |....F.#.U.......| +00000040 a7 5a d0 a6 1e 51 |.Z...Q| +[2d78 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d79 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d7a 10-14 19:02:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal evaluation succeeds for identity 0 +[2d7b 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 signed by 1 principal evaluation starts (used [true]) +[2d7c 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 skipping identity 0 because it has already been used +[2d7d 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 principal evaluation fails +[2d7e 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d4660 gate 1602702120150437800 evaluation succeeds +[2d7f 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d557e6f9-1722-4eee-970c-8c6dc6e6270c] +[2d80 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d81 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d82 10-14 19:02:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d84 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d85 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2d86 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d83 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d557e6f9-1722-4eee-970c-8c6dc6e6270c] +[2d87 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d89 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d8a 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d8b 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d8c 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d8d 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d8e 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 gate 1602702120172473500 evaluation starts +[2d8f 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 signed by 0 principal evaluation starts (used [false]) +[2d88 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +[2d90 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd appears to be valid +[2d91 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0034f0000 +[2d92 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0031b1400 env 0xc002492820 txn 0 +[2d93 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2d94 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 34ms +[2d95 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2d96 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[2d97 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +[2d98 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2d99 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2d9a 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2d9b 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +[2d9c 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2d9d 10-14 19:02:00.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 processing identity 0 with bytes of 115a6c0 +[2d9f 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 principal matched by identity 0 +[2da0 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 07 17 97 7e 5c 51 6f d3 98 4f 53 07 ec a7 b2 a5 |...~\Qo..OS.....| +00000010 e5 84 10 de 43 dc 6b 6b 10 0e c7 e4 e6 86 8e 61 |....C.kk.......a| +[2da1 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2da3 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2da2 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 8a a3 fb 0b e8 b7 68 ea 89 bc |0E.!........h...| +00000010 ea 1e 92 78 10 bf d0 11 cb e0 af 5b 73 5b 5c 8e |...x.......[s[\.| +00000020 19 fd 40 49 65 02 20 3f 36 2f 8d 12 82 67 59 3c |..@Ie. ?6/...gY<| +00000030 e8 bc 1a e6 5c e2 b8 4e b3 56 db 6b 92 90 24 58 |....\..N.V.k..$X| +00000040 60 20 09 fe 17 e7 a3 |` .....| +[2da4 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 principal evaluation succeeds for identity 0 +[2da5 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fbc90 gate 1602702120172473500 evaluation succeeds +[2da6 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2da7 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2da8 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2da9 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2daa 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dab 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2dac 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2dad 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2dae 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2daf 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db0 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db1 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d9e 10-14 19:02:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2db2 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2db5 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db3 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2db4 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2db6 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[2db7 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2db8 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[2db9 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2dba 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2dbb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] marked as valid by state validator +[2dbc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc003249580), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0032495c0)} +[2dbd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[2dbe 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[2dbf 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[2dc0 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +[2dc1 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +[2dc2 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +[2dc3 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc4 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc5 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc6 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +[2dc7 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc8 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc9 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dca 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dcb 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2dcc 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dcd 10-14 19:02:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2dce 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dcf 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dd0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0x2c, 0x64, 0x9, 0x9, 0xf5, 0xc, 0x7f, 0xf0, 0xf1, 0xf6, 0xfa, 0x5b, 0xc0, 0x65, 0x2e, 0xd2, 0x8d, 0x2, 0x93, 0x2d, 0xe9, 0x9d, 0x37, 0x4b, 0x82, 0x53, 0x4e, 0x79, 0xfe, 0x17, 0xc7, 0xee} txOffsets= +txId=ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd locPointer=offset=70, bytesLength=2978 +] +[2dd1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to txid-index +[2dd2 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2978] for tx number:[0] ID: [ae9258243674a0c2638347459eae1d3a3cdcbd642208cf0d69e52331e31e03cd] to blockNumTranNum index +[2dd3 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dd4 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dd5 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dd6 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dd7 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97566], isChainEmpty=[false], lastBlockNumber=[5] +[2dd8 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +[2dd9 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2dda 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ddb 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +[2ddc 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +[2ddd 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[2dde 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[2ddf 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[2de0 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[2de1 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[2de2 10-14 19:02:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[2de3 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2de4 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +[2de5 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[2de6 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +[2de7 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +[2de8 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +[2de9 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +[2dea 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +[2deb 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 34ms (state_validation=13ms block_and_pvtdata_commit=13ms state_commit=4ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +[2dec 10-14 19:02:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +[2ded 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2dee 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2def 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2df0 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2df1 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2df2 10-14 19:02:00.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df3 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2df4 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2df5 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2df6 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2df7 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2df8 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2df9 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 gate 1602702120242831200 evaluation starts +[2dfa 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 signed by 0 principal evaluation starts (used [false]) +[2dfb 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 processing identity 0 with bytes of 115a6c0 +[2dfc 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 principal matched by identity 0 +[2dfd 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 ab f1 a0 52 a6 78 1e bf 8e ee 3b fa 45 6f c6 |3...R.x....;.Eo.| +00000010 18 b4 da 0e 58 92 52 5a c7 72 e0 a6 0c c9 40 bc |....X.RZ.r....@.| +[2dfe 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 72 25 4a 02 f1 6c 9b a9 f8 26 06 |0D. jr%J..l...&.| +00000010 00 31 c9 e4 63 cd ce 5d f2 ea 51 54 95 33 b6 77 |.1..c..]..QT.3.w| +00000020 03 7b 95 ca 02 20 59 75 75 f8 14 b0 3a 2f 67 47 |.{... Yuu...:/gG| +00000030 38 7b b5 ea eb 10 c8 4d b6 f1 a7 69 e7 e4 ba 73 |8{.....M...i...s| +00000040 0e 00 dc b7 8b 09 |......| +[2dff 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 principal evaluation succeeds for identity 0 +[2e00 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003598a10 gate 1602702120242831200 evaluation succeeds +[2e01 10-14 19:02:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e02 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e03 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e04 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e05 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e06 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2e07 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2e08 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e09 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e0a 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2e0b 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2e0c 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e0d 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e0e 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e0f 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e10 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e11 10-14 19:02:00.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e12 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e13 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e14 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e16 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e15 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e17 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e18 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e19 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1a 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1b 10-14 19:02:00.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1c 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1d 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e1e 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e1f 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e20 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e21 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e22 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e23 10-14 19:02:00.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e24 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e25 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e26 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e27 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e28 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e29 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2e2a 10-14 19:02:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 38 52 e9 9f f8 2b d8 7a b8 1f 4d 59 e1 f4 32 |n8R...+.z..MY..2| +00000010 d8 55 e8 45 a4 80 b0 18 35 75 0d 0b 4b 24 ad a5 |.U.E....5u..K$..| +[2e2b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 e2 81 c9 2f 58 7b af cd ac 34 |0E.!...../X{...4| +00000010 c0 5f 75 d6 82 0b a4 bb 58 50 7d 21 bf c4 52 98 |._u.....XP}!..R.| +00000020 a2 dc 72 09 f6 02 20 26 6f 2b 4f 92 e5 22 c0 73 |..r... &o+O..".s| +00000030 5e b4 71 4e ad 21 e4 a5 d9 8e 2f ba f4 50 4a a9 |^.qN.!..../..PJ.| +00000040 49 10 40 1e 0d 48 77 |I.@..Hw| +[2e2c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e2d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2e2e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2e2f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2e30 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2e31 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e32 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e33 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e34 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e35 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e36 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e37 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e38 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e39 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e3a 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e3b 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e3c 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e3d 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e3e 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e3f 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2e40 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e41 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e42 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e43 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2e44 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2e45 10-14 19:02:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e46 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2e47 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161028 +[2e48 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4D0BD083D97400305DA2DA7713C20DFB8F1065DE19A1ED422BD0AFC42439CBEF +[2e49 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2e4a 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2e4b 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2e4c 10-14 19:02:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2e4d 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e4e 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e4f 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[2e50 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e51 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e52 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e53 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2e54 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e55 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e56 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e57 10-14 19:02:00.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e58 10-14 19:02:00.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2e59 10-14 19:02:00.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e5a 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41796 +[2e5b 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c6460 +[2e5c 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2e5d 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2e5e 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2e5f 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2e60 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2e61 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 7d 82 b6 54 29 a9 f6 a9 7c 6a f1 ba a7 59 9f |.}..T)...|j...Y.| +00000010 f6 86 78 38 6e 50 fc 42 68 15 48 3e cf c3 ee ab |..x8nP.Bh.H>....| +[2e62 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e2 df 83 d7 b3 ec 00 8f 2b 51 |0E.!..........+Q| +00000010 67 47 43 d2 26 a6 ff 95 7a 7a c4 f0 7f 08 fc 95 |gGC.&...zz......| +00000020 82 71 aa 4a ee 02 20 22 dc aa a0 f1 a1 44 8d b9 |.q.J.. ".....D..| +00000030 d9 54 a0 c9 fa 88 db 4b 53 02 2f bf 23 64 7e 9f |.T.....KS./.#d~.| +00000040 44 e2 94 9a 2c 37 fc |D...,7.| +[2e63 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2e64 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c8930, header 0xc0003c6af0 +[2e65 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2e66 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] processing txid: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813 +[2e67 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +[2e68 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2e69 10-14 19:02:00.67 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2e6a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2e6b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e6c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2e6d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 gate 1602702120680593900 evaluation starts +[2e6e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 signed by 0 principal evaluation starts (used [false]) +[2e6f 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 processing identity 0 with bytes of 115a6c0 +[2e70 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 principal matched by identity 0 +[2e71 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c 7d 82 b6 54 29 a9 f6 a9 7c 6a f1 ba a7 59 9f |.}..T)...|j...Y.| +00000010 f6 86 78 38 6e 50 fc 42 68 15 48 3e cf c3 ee ab |..x8nP.Bh.H>....| +[2e72 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc e2 df 83 d7 b3 ec 00 8f 2b 51 |0E.!..........+Q| +00000010 67 47 43 d2 26 a6 ff 95 7a 7a c4 f0 7f 08 fc 95 |gGC.&...zz......| +00000020 82 71 aa 4a ee 02 20 22 dc aa a0 f1 a1 44 8d b9 |.q.J.. ".....D..| +00000030 d9 54 a0 c9 fa 88 db 4b 53 02 2f bf 23 64 7e 9f |.T.....KS./.#d~.| +00000040 44 e2 94 9a 2c 37 fc |D...,7.| +[2e73 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 principal evaluation succeeds for identity 0 +[2e74 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003613000 gate 1602702120680593900 evaluation succeeds +[2e75 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2e76 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2e77 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2e78 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2e79 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2e7a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +[2e7b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +[2e7c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2e7d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2e7e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +[2e7f 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2e80 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2e81 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] handling GET_STATE from chaincode +[2e82 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] getting state for chaincode exp02, key a, channel businesschannel +[2e83 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2e84 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Completed GET_STATE. Sending RESPONSE +[2e85 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2e86 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [fa1b0f40] notifying Txid:fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, channelID:businesschannel +[2e87 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2e88 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][fa1b0f40] Exit chaincode: name:"exp02" (4ms) +[2e89 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2e8a 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +[2e8b 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Exit +[2e8c 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Entry chaincode: name:"exp02" +[2e8d 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] escc for chaincode name:"exp02" is escc +[2e8e 10-14 19:02:00.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, chaincode: exp02} +[2e8f 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20107E5DEE7A02CA334AC25A05512B...455254494649434154452D2D2D2D2D0A +[2e90 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1AA7175091398B0FFF97A8BE18B0ED2635A8137757CF130CB879FFCE89D4D6F +[2e91 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813, chaincode: exp02} +[2e92 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][fa1b0f40] Exit +[2e93 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa1b0f40c4a3a8f9313c8e267de738513cac5deb86f72b48b521e0268b60f813] +[2e94 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41796 +[2e95 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41796 grpc.code=OK grpc.call_duration=16.0018ms +[2e96 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e97 10-14 19:02:00.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2e98 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41800 +[2e99 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c7860 +[2e9a 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2e9b 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2e9c 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2e9d 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2e9e 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2e9f 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b bd 67 c0 2c a3 88 c1 c8 43 bc 58 02 9c 2d 18 |..g.,....C.X..-.| +00000010 fb 4c ba 1c 6e 4e 98 9d 18 ef 3b 97 2f f5 84 2e |.L..nN....;./...| +[2ea0 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 53 f8 89 6d a3 14 04 1c 0f f1 |0E.!..S..m......| +00000010 85 68 f7 07 23 43 e3 ca 3a 59 a2 cc 7b 45 dd 7a |.h..#C..:Y..{E.z| +00000020 e8 46 9b 74 76 02 20 48 bf 19 77 51 b2 c5 85 71 |.F.tv. H..wQ...q| +00000030 19 1b 9f fc e6 9f 1b 8a 94 28 4c 51 c4 4f 4f 1d |.........(LQ.OO.| +00000040 15 20 8b 0c a0 dc 45 |. ....E| +[2ea1 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ea2 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c8d20, header 0xc0003c7cc0 +[2ea3 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2ea4 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] processing txid: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f +[2ea5 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +[2ea6 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2ea7 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +[2ea8 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +[2ea9 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +[2eaa 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2eab 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +[2eac 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2ead 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2eae 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2eaf 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2eb0 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 gate 1602702121068810900 evaluation starts +[2eb1 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 signed by 0 principal evaluation starts (used [false]) +[2eb2 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 processing identity 0 with bytes of 115a6c0 +[2eb3 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2eb4 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 principal evaluation fails +[2eb5 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367d750 gate 1602702121068810900 evaluation fails +[2eb6 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2eb7 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2eb8 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2eb9 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 gate 1602702121069432700 evaluation starts +[2eba 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 signed by 0 principal evaluation starts (used [false]) +[2ebb 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 processing identity 0 with bytes of 115a6c0 +[2ebc 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 principal matched by identity 0 +[2ebd 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b bd 67 c0 2c a3 88 c1 c8 43 bc 58 02 9c 2d 18 |..g.,....C.X..-.| +00000010 fb 4c ba 1c 6e 4e 98 9d 18 ef 3b 97 2f f5 84 2e |.L..nN....;./...| +[2ebe 10-14 19:02:01.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 53 f8 89 6d a3 14 04 1c 0f f1 |0E.!..S..m......| +00000010 85 68 f7 07 23 43 e3 ca 3a 59 a2 cc 7b 45 dd 7a |.h..#C..:Y..{E.z| +00000020 e8 46 9b 74 76 02 20 48 bf 19 77 51 b2 c5 85 71 |.F.tv. H..wQ...q| +00000030 19 1b 9f fc e6 9f 1b 8a 94 28 4c 51 c4 4f 4f 1d |.........(LQ.OO.| +00000040 15 20 8b 0c a0 dc 45 |. ....E| +[2ebf 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 principal evaluation succeeds for identity 0 +[2ec0 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367dce0 gate 1602702121069432700 evaluation succeeds +[2ec1 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2ec2 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2ec3 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ec4 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ec5 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2ec6 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] handling GET_STATE from chaincode +[2ec7 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] getting state for chaincode lscc, key exp02, channel businesschannel +[2ec8 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2ec9 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Completed GET_STATE. Sending RESPONSE +[2eca 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2ecb 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [3f4b4c68] notifying Txid:3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, channelID:businesschannel +[2ecc 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2ecd 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3f4b4c68] Exit chaincode: name:"lscc" (4ms) +[2ece 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2ecf 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +[2ed0 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Exit +[2ed1 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Entry chaincode: name:"lscc" +[2ed2 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] escc for chaincode name:"lscc" is escc +[2ed3 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, chaincode: lscc} +[2ed4 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20933C9EA551AA952926777E4AAC9E...455254494649434154452D2D2D2D2D0A +[2ed5 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 33C2D840709C1F1BBF006687BC02FC636BA4297F8EDC4327D4F98353234F5246 +[2ed6 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f, chaincode: lscc} +[2ed7 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3f4b4c68] Exit +[2ed8 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3f4b4c68f18f372e1ade35b79ad1115f89dd47bb7e8d3497ca9e778ac56ee13f] +[2ed9 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41800 +[2eda 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41800 grpc.code=OK grpc.call_duration=6.7501ms +[2edb 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41800: read: connection reset by peer +[2edc 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2edd 10-14 19:02:01.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2ede 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41804 +[2edf 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000369770 +[2ee0 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2ee1 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ee2 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ee3 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2ee4 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ee5 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 1f a7 c7 49 e3 82 5c fc c5 cb 3a 5b 7b 9c 07 |....I..\...:[{..| +00000010 05 b5 6a 48 64 0e ac f5 67 fe 5a cf 48 ef 71 fb |..jHd...g.Z.H.q.| +[2ee6 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 26 48 2f bf b7 62 51 c5 36 51 |0E.!..&H/..bQ.6Q| +00000010 9b 94 e7 3e 88 62 8b cd d9 f0 e7 1b a1 1e da 89 |...>.b..........| +00000020 6c 49 8f c6 77 02 20 1e cc 0a 47 d6 54 9d 5f 78 |lI..w. ...G.T._x| +00000030 04 6e c1 20 34 5f b9 ea fa 9c 14 0a b0 ab a5 c0 |.n. 4_..........| +00000040 ed 2c 8f 83 7c 36 31 |.,..|61| +[2ee7 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ee8 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035ba8c0, header 0xc000369c20 +[2ee9 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2eea 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] processing txid: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0 +[2eeb 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +[2eec 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2eed 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +[2eee 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Entry chaincode: name:"lscc" +[2eef 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][201e0cba] Entry chaincode: name:"lscc" +[2ef0 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2ef1 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +[2ef2 10-14 19:02:01.27 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2ef3 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ef4 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ef5 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ef6 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 gate 1602702121280984900 evaluation starts +[2ef7 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 signed by 0 principal evaluation starts (used [false]) +[2ef8 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 processing identity 0 with bytes of 115a6c0 +[2ef9 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2efa 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 principal evaluation fails +[2efb 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751960 gate 1602702121280984900 evaluation fails +[2efc 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2efd 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2efe 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2eff 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 gate 1602702121282923200 evaluation starts +[2f00 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 signed by 0 principal evaluation starts (used [false]) +[2f01 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 processing identity 0 with bytes of 115a6c0 +[2f02 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 principal matched by identity 0 +[2f03 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 1f a7 c7 49 e3 82 5c fc c5 cb 3a 5b 7b 9c 07 |....I..\...:[{..| +00000010 05 b5 6a 48 64 0e ac f5 67 fe 5a cf 48 ef 71 fb |..jHd...g.Z.H.q.| +[2f04 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 26 48 2f bf b7 62 51 c5 36 51 |0E.!..&H/..bQ.6Q| +00000010 9b 94 e7 3e 88 62 8b cd d9 f0 e7 1b a1 1e da 89 |...>.b..........| +00000020 6c 49 8f c6 77 02 20 1e cc 0a 47 d6 54 9d 5f 78 |lI..w. ...G.T._x| +00000030 04 6e c1 20 34 5f b9 ea fa 9c 14 0a b0 ab a5 c0 |.n. 4_..........| +00000040 ed 2c 8f 83 7c 36 31 |.,..|61| +[2f05 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 principal evaluation succeeds for identity 0 +[2f06 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751ed0 gate 1602702121282923200 evaluation succeeds +[2f07 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2f08 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2f09 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f0a 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f0b 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2f0c 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] handling GET_STATE from chaincode +[2f0d 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] getting state for chaincode lscc, key exp02, channel businesschannel +[2f0e 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2f0f 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Completed GET_STATE. Sending RESPONSE +[2f10 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f11 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [201e0cba] notifying Txid:201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, channelID:businesschannel +[2f12 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f13 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][201e0cba] Exit chaincode: name:"lscc" (6ms) +[2f14 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2f15 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +[2f16 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Exit +[2f17 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Entry chaincode: name:"lscc" +[2f18 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] escc for chaincode name:"lscc" is escc +[2f19 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, chaincode: lscc} +[2f1a 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2048BB8AFA84692E17C6AE6D5BD024...455254494649434154452D2D2D2D2D0A +[2f1b 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E5DC156D054B668787C71B8A7BFD48E630740C8364B4BEDE730C472F34066C2 +[2f1c 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0, chaincode: lscc} +[2f1d 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][201e0cba] Exit +[2f1e 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [201e0cbad2bcd965c1c22b4d67f3c901d72409627d8063c7eeebaf101919fcf0] +[2f1f 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41804 +[2f20 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41804 grpc.code=OK grpc.call_duration=11.3586ms +[2f21 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f22 10-14 19:02:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f23 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41808 +[2f24 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00425e050 +[2f25 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f26 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f27 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f28 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2f29 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f2a 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 f0 cf 8d 53 a7 24 24 eb 62 35 9a e0 a0 63 77 |....S.$$.b5...cw| +00000010 92 9f 7b 2e 83 66 32 0e 63 97 ce b7 ab e6 b4 22 |..{..f2.c......"| +[2f2b 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 2c 33 dc 0d 5f c3 f6 4f c8 ca |0E.!..,3.._..O..| +00000010 a3 d0 92 e5 df 62 d3 8f 05 6a ec a0 45 d9 8b cf |.....b...j..E...| +00000020 6f 99 0e bc 9b 02 20 5b 04 c4 27 a1 68 92 63 95 |o..... [..'.h.c.| +00000030 8c f0 3c 6f 09 f8 80 36 62 6d 01 be 8c 29 d7 3b |.. DEBU exits successfully +[2f2d 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035c9180, header 0xc00425e460 +[2f2e 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2f2f 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] processing txid: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504 +[2f30 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +[2f31 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f32 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +[2f33 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Entry chaincode: name:"lscc" +[2f34 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ad484cba] Entry chaincode: name:"lscc" +[2f35 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f36 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +[2f37 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2f38 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2f39 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f3a 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2f3b 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 gate 1602702121449347600 evaluation starts +[2f3c 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 signed by 0 principal evaluation starts (used [false]) +[2f3d 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 processing identity 0 with bytes of 115a6c0 +[2f3e 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2f3f 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 principal evaluation fails +[2f40 10-14 19:02:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878580 gate 1602702121449347600 evaluation fails +[2f41 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2f42 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2f43 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2f44 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 gate 1602702121450331600 evaluation starts +[2f45 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 signed by 0 principal evaluation starts (used [false]) +[2f46 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 processing identity 0 with bytes of 115a6c0 +[2f47 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 principal matched by identity 0 +[2f48 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 f0 cf 8d 53 a7 24 24 eb 62 35 9a e0 a0 63 77 |....S.$$.b5...cw| +00000010 92 9f 7b 2e 83 66 32 0e 63 97 ce b7 ab e6 b4 22 |..{..f2.c......"| +[2f49 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 2c 33 dc 0d 5f c3 f6 4f c8 ca |0E.!..,3.._..O..| +00000010 a3 d0 92 e5 df 62 d3 8f 05 6a ec a0 45 d9 8b cf |.....b...j..E...| +00000020 6f 99 0e bc 9b 02 20 5b 04 c4 27 a1 68 92 63 95 |o..... [..'.h.c.| +00000030 8c f0 3c 6f 09 f8 80 36 62 6d 01 be 8c 29 d7 3b |.. DEBU 0xc003878af0 principal evaluation succeeds for identity 0 +[2f4b 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878af0 gate 1602702121450331600 evaluation succeeds +[2f4c 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2f4d 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2f4e 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2f4f 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2f50 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2f51 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] handling GET_STATE from chaincode +[2f52 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] getting state for chaincode lscc, key exp02, channel businesschannel +[2f53 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2f54 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Completed GET_STATE. Sending RESPONSE +[2f55 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f56 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [ad484cba] notifying Txid:ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, channelID:businesschannel +[2f57 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f58 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ad484cba] Exit chaincode: name:"lscc" (4ms) +[2f59 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2f5a 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +[2f5b 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Exit +[2f5c 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Entry chaincode: name:"lscc" +[2f5d 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] escc for chaincode name:"lscc" is escc +[2f5e 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, chaincode: lscc} +[2f5f 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D840E09DFC84359C28D5392500F0...455254494649434154452D2D2D2D2D0A +[2f60 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4F48D04D900F2C1F247D1164A7E1F6EE6B3C59D02314841DD6A90B2677A5970B +[2f61 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504, chaincode: lscc} +[2f62 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ad484cba] Exit +[2f63 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ad484cbaf95e86d261c0eb98c63a0643b259c3eeb13e1cfc7bd4a5e5b61cc504] +[2f64 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41808 +[2f65 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41808 grpc.code=OK grpc.call_duration=7.6809ms +[2f66 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41808: read: connection reset by peer +[2f67 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f68 10-14 19:02:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f69 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41812 +[2f6a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0041acdc0 +[2f6b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f6c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f6d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f6e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2f6f 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f70 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 2d 93 2c 75 a5 45 0e 03 d1 93 1e d3 de 6e 38 |.-.,u.E.......n8| +00000010 69 ab 2d 9a 56 d5 10 99 32 25 ab 0f 2f 4b b4 79 |i.-.V...2%../K.y| +[2f71 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 16 d0 85 93 6b 28 7b 0f 89 71 50 |0D. .....k({..qP| +00000010 38 6c a2 b9 56 d3 f9 97 3f 54 f0 c8 30 34 66 26 |8l..V...?T..04f&| +00000020 e0 18 4f 88 02 20 78 cf b1 2a 13 e2 25 13 f5 6f |..O.. x..*..%..o| +00000030 a5 d7 c8 c1 c1 f8 28 7a 33 59 d8 0d 07 41 da c5 |......(z3Y...A..| +00000040 c8 88 18 62 6a 39 |...bj9| +[2f72 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2f73 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035bad90, header 0xc0041ad220 +[2f74 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2f75 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] processing txid: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9 +[2f76 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +[2f77 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f78 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +[2f79 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Entry chaincode: name:"lscc" +[2f7a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4c12de32] Entry chaincode: name:"lscc" +[2f7b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f7c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 2d 93 2c 75 a5 45 0e 03 d1 93 1e d3 de 6e 38 |.-.,u.E.......n8| +00000010 69 ab 2d 9a 56 d5 10 99 32 25 ab 0f 2f 4b b4 79 |i.-.V...2%../K.y| +[2f7d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 16 d0 85 93 6b 28 7b 0f 89 71 50 |0D. .....k({..qP| +00000010 38 6c a2 b9 56 d3 f9 97 3f 54 f0 c8 30 34 66 26 |8l..V...?T..04f&| +00000020 e0 18 4f 88 02 20 78 cf b1 2a 13 e2 25 13 f5 6f |..O.. x..*..%..o| +00000030 a5 d7 c8 c1 c1 f8 28 7a 33 59 d8 0d 07 41 da c5 |......(z3Y...A..| +00000040 c8 88 18 62 6a 39 |...bj9| +[2f7e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [4c12de32] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f7f 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [4c12de32] notifying Txid:4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, channelID:businesschannel +[2f80 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f81 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4c12de32] Exit chaincode: name:"lscc" (1ms) +[2f82 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2f83 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +[2f84 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Exit +[2f85 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Entry chaincode: name:"lscc" +[2f86 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] escc for chaincode name:"lscc" is escc +[2f87 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, chaincode: lscc} +[2f88 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A200A05D720D3F1481124B0526841B5...455254494649434154452D2D2D2D2D0A +[2f89 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1F67A3BC0AFC547E8EEFE8F8E9DE904CDE55FC599A58E1289C43F8D1864A9003 +[2f8a 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9, chaincode: lscc} +[2f8b 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4c12de32] Exit +[2f8c 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4c12de323b0d02cd44ef8a779a3465b3ff0f90d76be2e25bc37bf184c47793f9] +[2f8d 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41812 +[2f8e 10-14 19:02:01.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41812 grpc.code=OK grpc.call_duration=4.9326ms +[2f8f 10-14 19:02:01.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f90 10-14 19:02:01.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f91 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41816 +[2f92 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0043cc3c0 +[2f93 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f94 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f95 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f96 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2f97 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f98 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 35 c9 9e 7a 73 b5 c5 ad 53 19 f1 38 3c 38 56 |.5..zs...S..8<8V| +00000010 eb 38 53 a7 32 b9 75 b5 e0 75 a1 0f 59 c3 c6 a5 |.8S.2.u..u..Y...| +[2f99 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 c0 40 49 8e 8a ba d3 1f a6 2e 3c |0D. h.@I.......<| +00000010 4b de 35 e6 b8 e5 86 e8 18 5f 91 a5 04 5d dd 8f |K.5......_...]..| +00000020 f6 af e0 81 02 20 02 d5 29 dc a3 91 71 ad e4 9e |..... ..)...q...| +00000030 96 f0 c5 ad c2 d4 bc 26 5f 6b fe d3 0d 1b d0 f2 |.......&_k......| +00000040 29 de 38 80 37 f5 |).8.7.| +[2f9a 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2f9b 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035bb2d0, header 0xc0043cc7d0 +[2f9c 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2f9d 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] processing txid: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300 +[2f9e 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +[2f9f 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2fa0 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +[2fa1 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +[2fa2 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +[2fa3 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2fa4 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +[2fa5 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[2fa6 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2fa7 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fa8 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2fa9 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 gate 1602702121838662800 evaluation starts +[2faa 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 signed by 0 principal evaluation starts (used [false]) +[2fab 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 processing identity 0 with bytes of 115a6c0 +[2fac 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2fad 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 principal evaluation fails +[2fae 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c4d20 gate 1602702121838662800 evaluation fails +[2faf 10-14 19:02:01.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2fb0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2fb1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2fb2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 gate 1602702121840391500 evaluation starts +[2fb3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 signed by 0 principal evaluation starts (used [false]) +[2fb4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 processing identity 0 with bytes of 115a6c0 +[2fb5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 principal matched by identity 0 +[2fb6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 93 35 c9 9e 7a 73 b5 c5 ad 53 19 f1 38 3c 38 56 |.5..zs...S..8<8V| +00000010 eb 38 53 a7 32 b9 75 b5 e0 75 a1 0f 59 c3 c6 a5 |.8S.2.u..u..Y...| +[2fb7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 c0 40 49 8e 8a ba d3 1f a6 2e 3c |0D. h.@I.......<| +00000010 4b de 35 e6 b8 e5 86 e8 18 5f 91 a5 04 5d dd 8f |K.5......_...]..| +00000020 f6 af e0 81 02 20 02 d5 29 dc a3 91 71 ad e4 9e |..... ..)...q...| +00000030 96 f0 c5 ad c2 d4 bc 26 5f 6b fe d3 0d 1b d0 f2 |.......&_k......| +00000040 29 de 38 80 37 f5 |).8.7.| +[2fb8 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 principal evaluation succeeds for identity 0 +[2fb9 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c5290 gate 1602702121840391500 evaluation succeeds +[2fba 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2fbb 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2fbc 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2fbd 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2fbe 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[2fbf 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] handling GET_STATE_BY_RANGE from chaincode +[2fc0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[2fc1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +[2fc2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +[2fc3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Completed GET_STATE_BY_RANGE. Sending RESPONSE +[2fc4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[2fc5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] handling QUERY_STATE_CLOSE from chaincode +[2fc6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Completed QUERY_STATE_CLOSE. Sending RESPONSE +[2fc7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2fc8 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [4f0a7dcf] notifying Txid:4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, channelID:businesschannel +[2fc9 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2fca 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4f0a7dcf] Exit chaincode: name:"lscc" (9ms) +[2fcb 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2fcc 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +[2fcd 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Exit +[2fce 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Entry chaincode: name:"lscc" +[2fcf 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] escc for chaincode name:"lscc" is escc +[2fd0 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, chaincode: lscc} +[2fd1 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209357F0775E9188B79CEA43AFACD9...455254494649434154452D2D2D2D2D0A +[2fd2 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4A5CF9E8907FE907D7AD5B93B790A6875F9B0E82A54661439F231C13E53EA100 +[2fd3 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300, chaincode: lscc} +[2fd4 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4f0a7dcf] Exit +[2fd5 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4f0a7dcf9a1709379ca17578cf596117c92c4e4f3f4084f4dcb4425618c6e300] +[2fd6 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41816 +[2fd7 10-14 19:02:01.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41816 grpc.code=OK grpc.call_duration=15.0171ms +[2fd8 10-14 19:02:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2fd9 10-14 19:02:01.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2fda 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2fdb 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fdc 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08061A0C0A0565787030321203312E30 +[2fdd 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8CBE76F0D117D61D3FC96A66C22483C42BCBD0BE6D6B024A4DE1F289216F89D8 +[2fde 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fdf 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2fe0 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2fe1 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2fe2 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fe3 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fe4 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2fe5 10-14 19:02:01.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fe6 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2fe7 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2fe8 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fe9 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +[2fea 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +00000040 36 51 a3 22 24 a8 |6Q."$.| +[2feb 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[2fec 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[2fed 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fee 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fef 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[2ff0 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ff1 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ff2 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ff3 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ff4 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ff5 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ff6 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 gate 1602702121893140800 evaluation starts +[2ff7 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 signed by 0 principal evaluation starts (used [false]) +[2ff8 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 processing identity 0 with bytes of 115a6c0 +[2ff9 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 principal matched by identity 0 +[2ffa 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[2ffb 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[2ffc 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 principal evaluation succeeds for identity 0 +[2ffd 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039e39b0 gate 1602702121893140800 evaluation succeeds +[2ffe 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2fff 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3000 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3001 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3002 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3003 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3004 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3005 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3006 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3007 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3008 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3009 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[300a 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[300b 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 gate 1602702121897679100 evaluation starts +[300c 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 signed by 0 principal evaluation starts (used [false]) +[300d 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[300e 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 processing identity 0 with bytes of 115a6c0 +[300f 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 principal matched by identity 0 +[3010 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[3011 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[3012 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[3013 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3014 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3015 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 principal evaluation succeeds for identity 0 +[3016 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0ebb0 gate 1602702121897679100 evaluation succeeds +[3017 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3018 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3019 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[301a 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[301b 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[301c 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[301d 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[301e 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[301f 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3020 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3021 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +[3022 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +00000040 36 51 a3 22 24 a8 |6Q."$.| +[3023 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3024 10-14 19:02:01.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3025 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[3026 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[3027 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3028 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3029 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[302a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[302b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[302c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[302d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[302e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[302f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 gate 1602702121911401200 evaluation starts +[3030 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 signed by 0 principal evaluation starts (used [false]) +[3031 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 processing identity 0 with bytes of 115a6c0 +[3032 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 principal matched by identity 0 +[3033 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[3034 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[3035 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 principal evaluation succeeds for identity 0 +[3036 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a34d30 gate 1602702121911401200 evaluation succeeds +[3037 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3038 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3039 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[303a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[303b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[303c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[303d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[303e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[303f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3040 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3041 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3042 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3043 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 gate 1602702121912462200 evaluation starts +[3044 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 signed by 0 principal evaluation starts (used [false]) +[3045 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 processing identity 0 with bytes of 115a6c0 +[3046 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 principal matched by identity 0 +[3047 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[3048 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[3049 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 principal evaluation succeeds for identity 0 +[304a 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a35f30 gate 1602702121912462200 evaluation succeeds +[304b 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[304c 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[304d 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[304e 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[304f 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3050 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[3051 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3052 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9a dd 2c ee a2 81 35 62 8a ff 57 39 c8 b4 92 be |..,...5b..W9....| +00000010 67 cc dd 68 8c e1 ab 9b e2 08 e1 fd 95 8e 4b 27 |g..h..........K'| +[3053 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 c0 83 04 ad 86 37 33 a0 79 33 d2 |0D. 3.....73.y3.| +00000010 47 39 bf ec b7 55 d6 73 d0 87 82 ff b7 78 c0 df |G9...U.s.....x..| +00000020 f0 31 a5 fb 02 20 7a a4 c8 33 ac 0f 55 a6 bd 79 |.1... z..3..U..y| +00000030 ae f3 95 fc 4a e7 f6 1f 8b 6b de a9 ab 0e 98 0c |....J....k......| +00000040 36 51 a3 22 24 a8 |6Q."$.| +[3054 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bd 12 a6 e6 3d 73 b5 0a be e7 47 9e 98 ba 81 |.....=s....G....| +00000010 c5 e7 c8 93 c5 1f c3 0e 1f f2 c0 07 9f fc 94 49 |...............I| +[3055 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 71 1b be d2 d8 df 17 de 42 4e |0E.!..q.......BN| +00000010 a2 fe 5e 5e aa 31 ca 3a 1d aa a6 13 ee 85 ba ab |..^^.1.:........| +00000020 d2 b1 d6 01 83 02 20 52 ff 77 8f 10 89 79 6c 03 |...... R.w...yl.| +00000030 72 6d 57 19 73 6d 45 75 d5 0f 66 76 7b 86 15 99 |rmW.smEu..fv{...| +00000040 fc d0 10 18 d0 4c 38 |.....L8| +[3056 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3057 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +[3058 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +[3059 10-14 19:02:01.91 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +[305a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[305b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[305c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[305d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[305e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[305f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3060 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3061 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 gate 1602702121923947500 evaluation starts +[3062 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 signed by 0 principal evaluation starts (used [false]) +[3063 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 processing identity 0 with bytes of 115a6c0 +[3064 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 principal matched by identity 0 +[3065 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 2e c3 c3 a2 35 db f1 da df d2 db e0 81 ab 5f |>....5........._| +00000010 93 c3 34 6c f6 5f 14 04 5f de e2 91 7c 70 d2 be |..4l._.._...|p..| +[3066 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 60 80 8b e2 56 fe 60 b6 13 b8 0a |0D. l`...V.`....| +00000010 70 4d 03 a0 1d 38 92 7d 42 db 54 56 10 ca 1c b6 |pM...8.}B.TV....| +00000020 e6 f3 ce a8 02 20 7a 15 85 bf 94 ca ed 0c 39 ef |..... z.......9.| +00000030 dc 0d c1 dd 44 7b df 53 4d 86 a7 e7 8b c2 28 2f |....D{.SM.....(/| +00000040 a8 d1 32 1d 77 d5 |..2.w.| +[3067 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 principal evaluation succeeds for identity 0 +[3068 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7c160 gate 1602702121923947500 evaluation succeeds +[3069 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[306a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[306b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[306c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[306d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[306e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[306f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3070 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3071 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3072 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3073 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3074 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3075 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 gate 1602702121925380200 evaluation starts +[3076 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 signed by 0 principal evaluation starts (used [false]) +[3077 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 processing identity 0 with bytes of 115a6c0 +[3078 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 principal matched by identity 0 +[3079 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 87 5a 79 1f f6 06 c2 a8 41 b5 93 51 fd 25 05 |..Zy.....A..Q.%.| +00000010 6e 33 b4 fa 4c 41 a1 cb db 97 80 d3 70 a2 15 37 |n3..LA......p..7| +[307a 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 25 be 26 e7 a4 ec e2 b0 44 28 51 |0D. 3%.&.....D(Q| +00000010 b4 c9 fd 23 20 09 43 fd 68 84 bf 4c ff a9 5c 19 |...# .C.h..L..\.| +00000020 0a a2 23 a2 02 20 16 04 fc 46 7b d8 8f 49 ed e4 |..#.. ...F{..I..| +00000030 61 8c 74 28 ba a4 0c 9b db 7d 1e cf 4d 5e 37 f2 |a.t(.....}..M^7.| +00000040 ef bb b9 6e 1e d1 |...n..| +[307b 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 principal evaluation succeeds for identity 0 +[307c 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a7d360 gate 1602702121925380200 evaluation succeeds +[307d 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[307e 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[307f 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3080 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3081 10-14 19:02:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3082 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3083 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3084 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3085 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3086 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3087 10-14 19:02:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[3088 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3089 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[308a 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[308b 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[308c 10-14 19:02:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[308d 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[308e 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[308f 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3090 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3091 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3092 10-14 19:02:02.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3093 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3094 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3095 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3096 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3097 10-14 19:02:02.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3098 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3099 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[309a 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[309b 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[309c 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[309d 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[309e 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[309f 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[30a0 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[30a1 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[30a3 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[30a4 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 gate 1602702122170682400 evaluation starts +[30a5 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 signed by 0 principal evaluation starts (used [false]) +[30a6 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 processing identity 0 with bytes of 115a6c0 +[30a2 10-14 19:02:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30a7 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 principal matched by identity 0 +[30a8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +[30a9 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +00000040 c0 0c 0b 4c 59 c0 |...LY.| +[30aa 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 principal evaluation succeeds for identity 0 +[30ab 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae8d60 gate 1602702122170682400 evaluation succeeds +[30ac 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[30ad 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[30ae 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[30af 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[30b0 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30b1 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[30b2 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30b3 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30b4 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[30b5 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b6 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b7 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b8 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[30b9 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ba 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30bb 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30bc 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[30bd 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +[30be 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[30bf 10-14 19:02:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30c0 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[30c1 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[30c2 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[30c3 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c4 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c5 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c6 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c7 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c8 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30c9 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[30ca 10-14 19:02:02.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30cb 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[30cc 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30cd 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ce 10-14 19:02:02.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30cf 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[30d0 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[30d1 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[30d2 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[30d3 10-14 19:02:02.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[30d4 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[30d5 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[30d6 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[30d7 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 gate 1602702122270996700 evaluation starts +[30d8 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 signed by 0 principal evaluation starts (used [false]) +[30d9 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 processing identity 0 with bytes of 115a6c0 +[30da 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[30db 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 principal evaluation fails +[30dc 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b62c30 gate 1602702122270996700 evaluation fails +[30dd 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[30de 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[30df 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[30e0 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 gate 1602702122273575400 evaluation starts +[30e1 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 signed by 0 principal evaluation starts (used [false]) +[30e2 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 processing identity 0 with bytes of 115a6c0 +[30e3 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 principal matched by identity 0 +[30e4 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[30e5 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[30e6 10-14 19:02:02.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 principal evaluation succeeds for identity 0 +[30e7 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b631a0 gate 1602702122273575400 evaluation succeeds +[30e8 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[30e9 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[30ea 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[30eb 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[30ec 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ed 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ee 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ef 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[30f0 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30f1 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30f2 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[30f3 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f4 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[30f5 10-14 19:02:02.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f6 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[30f7 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[30f8 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[30f9 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[30fa 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fb 10-14 19:02:02.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30fc 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30fd 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30fe 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[30ff 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3100 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3101 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3102 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3103 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3104 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3105 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3106 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3107 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3108 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 gate 1602702122318590200 evaluation starts +[3109 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 signed by 0 principal evaluation starts (used [false]) +[310a 10-14 19:02:02.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 processing identity 0 with bytes of 115a6c0 +[310c 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 principal matched by identity 0 +[310b 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[310d 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[310e 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[310f 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3110 10-14 19:02:02.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3111 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3112 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +[3113 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +00000040 e3 6c 82 19 05 b6 19 |.l.....| +[3114 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 principal evaluation succeeds for identity 0 +[3115 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baaa70 gate 1602702122318590200 evaluation succeeds +[3116 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3117 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3118 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3119 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[311a 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[311b 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[311c 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[311d 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[311e 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[311f 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3120 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3121 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3122 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3123 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3124 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3125 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3126 10-14 19:02:02.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3127 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +[3128 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3129 10-14 19:02:02.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[312a 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[312b 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[312c 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[312d 10-14 19:02:02.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[312e 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[312f 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3130 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3131 10-14 19:02:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3132 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41820 +[3133 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003b6d360 +[3134 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3135 10-14 19:02:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3136 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3137 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3138 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3139 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 00 ca 9d d4 41 9b ea 18 19 92 dd 1f 0a 86 92 |s....A..........| +00000010 07 51 fd fc 21 a5 15 e1 38 b8 42 50 9a 3b 91 7d |.Q..!...8.BP.;.}| +[313a 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c6 1b ac 5f b8 10 a6 25 2e f4 66 |0D. 7..._...%..f| +00000010 06 f0 75 b7 7c 9c 53 51 85 86 bd 7d c0 ae 63 41 |..u.|.SQ...}..cA| +00000020 38 50 cf 87 02 20 7b 9d c8 2e c1 d9 7a 6e cd 82 |8P... {.....zn..| +00000030 d7 4b 5e c2 c6 4b 69 a5 12 9d 2b dc 67 1e 64 5c |.K^..Ki...+.g.d\| +00000040 30 9e 48 35 ff 47 |0.H5.G| +[313b 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[313c 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba61c0, header 0xc003b8ca00 +[313d 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[313e 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] processing txid: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8 +[313f 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8] +[3140 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +[3141 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +[3142 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3143 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[3144 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[3145 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3146 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3147 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3148 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3149 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 gate 1602702122485496600 evaluation starts +[314a 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 signed by 0 principal evaluation starts (used [false]) +[314b 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 processing identity 0 with bytes of 115a6c0 +[314c 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[314d 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 principal evaluation fails +[314e 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d410d0 gate 1602702122485496600 evaluation fails +[314f 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3150 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3151 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3152 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 gate 1602702122487282300 evaluation starts +[3153 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 signed by 0 principal evaluation starts (used [false]) +[3154 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 processing identity 0 with bytes of 115a6c0 +[3155 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 principal matched by identity 0 +[3156 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 73 00 ca 9d d4 41 9b ea 18 19 92 dd 1f 0a 86 92 |s....A..........| +00000010 07 51 fd fc 21 a5 15 e1 38 b8 42 50 9a 3b 91 7d |.Q..!...8.BP.;.}| +[3157 10-14 19:02:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c6 1b ac 5f b8 10 a6 25 2e f4 66 |0D. 7..._...%..f| +00000010 06 f0 75 b7 7c 9c 53 51 85 86 bd 7d c0 ae 63 41 |..u.|.SQ...}..cA| +00000020 38 50 cf 87 02 20 7b 9d c8 2e c1 d9 7a 6e cd 82 |8P... {.....zn..| +00000030 d7 4b 5e c2 c6 4b 69 a5 12 9d 2b dc 67 1e 64 5c |.K^..Ki...+.g.d\| +00000040 30 9e 48 35 ff 47 |0.H5.G| +[3159 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 principal evaluation succeeds for identity 0 +[3158 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[315a 10-14 19:02:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d41640 gate 1602702122487282300 evaluation succeeds +[315c 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[315d 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[315e 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[315f 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[315b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3160 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [bc410fe8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3161 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [bc410fe8] notifying Txid:bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, channelID:businesschannel +[3162 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3163 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][bc410fe8] Exit chaincode: name:"qscc" (29ms) +[3164 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Exit +[3165 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Entry chaincode: name:"qscc" +[3166 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] escc for chaincode name:"qscc" is escc +[3167 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, chaincode: qscc} +[3168 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C739031FD250202DF62B9FED1612...455254494649434154452D2D2D2D2D0A +[3169 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A56A9755D3D423656156B827D11FDC93D6349A712DA4177E9D6824817323C0AB +[316a 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: bc410fe83b12ea18561c6eec85b08d901630272fe986d459a24eb0a70f1744d8, chaincode: qscc} +[316b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][bc410fe8] Exit +[316c 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[316d 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[316e 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41820 +[316f 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41820 grpc.code=OK grpc.call_duration=35.001ms +[3170 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +[3171 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +00000040 7e e9 c8 0c cb c1 59 |~.....Y| +[3172 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3173 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 59 4c 76 58 e8 66 d7 19 1b c5 c0 07 |0D. YLvX.f......| +00000010 f2 0a e9 4a e1 b7 a2 c7 fd 4d 7d 64 0d 46 11 0a |...J.....M}d.F..| +00000020 20 7f 62 ed 02 20 1c b1 bf b9 b9 33 49 88 f9 c7 | .b.. .....3I...| +00000030 f2 f8 f9 0e 18 2c bb a4 f5 e9 6f 3a c3 ce 6a 37 |.....,....o:..j7| +00000040 77 27 c8 d4 61 69 |w'..ai| +[3174 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3175 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3176 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3177 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3178 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3179 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[317a 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[317b 10-14 19:02:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[317c 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[317d 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[317e 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[317f 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3180 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3181 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[3182 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\236\0238\261I\002 P\250\026\232<\313'\331hvY@\324\031\307\215dBu\1779N(\337\336~\351\310\014\313\301Y" secret_envelope: > alive:\377\207\305\2038^`\315w)\341\303rG\310Rx\332l\002 ~\350\350j\3059]+6'\242\220\304P\323\013lR\017H\373\0220\000\252M\026\362\273~9\215" > +[3183 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3184 10-14 19:02:02.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3185 10-14 19:02:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3186 10-14 19:02:02.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3187 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3188 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[318a 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3189 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[318b 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[318c 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[318d 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[318e 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[318f 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3190 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3191 10-14 19:02:02.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3192 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3193 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3194 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3195 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3196 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3197 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3198 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3199 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[319a 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[319b 10-14 19:02:02.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[319c 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[319d 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[319e 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[319f 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31a0 10-14 19:02:02.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31a1 10-14 19:02:02.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a2 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[31a3 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161029 +[31a4 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3BF5B338CFDEA13682574C842C53C4C98873E1D76CDEE341F9B3BAD88DDF0A62 +[31a5 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[31a6 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[31a7 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[31a8 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31a9 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[31aa 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[31ab 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31ac 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[31ad 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[31ae 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[31b0 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[31b2 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b1 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31af 10-14 19:02:02.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[31b4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[31b5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31b6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[31b7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31b8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31b9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31ba 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31bb 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31bc 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 gate 1602702122635775600 evaluation starts +[31bd 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 signed by 0 principal evaluation starts (used [false]) +[31be 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 processing identity 0 with bytes of 115a6c0 +[31bf 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 principal matched by identity 0 +[31c0 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[31c1 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[31c2 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 principal evaluation succeeds for identity 0 +[31c3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2f80 gate 1602702122635775600 evaluation succeeds +[31c4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[31c5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[31c6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[31c7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[31c8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31c9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31ca 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31cb 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31cc 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31cd 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31ce 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31cf 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 gate 1602702122638678500 evaluation starts +[31d0 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 signed by 0 principal evaluation starts (used [false]) +[31d1 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 processing identity 0 with bytes of 115a6c0 +[31d2 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 principal matched by identity 0 +[31d3 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[31d4 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[31d5 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 principal evaluation succeeds for identity 0 +[31d6 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3b70 gate 1602702122638678500 evaluation succeeds +[31d7 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[31d8 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[31d9 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[31da 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[31db 10-14 19:02:02.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31dc 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31dd 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31de 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[31df 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31e0 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31e1 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[31e2 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e3 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[31e4 10-14 19:02:02.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e5 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[31e6 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[31e7 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e8 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[31e9 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[31ea 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31eb 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[31ec 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31ed 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31ee 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31ef 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31f0 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31f1 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 gate 1602702122662408300 evaluation starts +[31f2 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 signed by 0 principal evaluation starts (used [false]) +[31f3 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 processing identity 0 with bytes of 115a6c0 +[31f4 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 principal matched by identity 0 +[31f5 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 97 38 37 4b d8 bc e8 8a 1c aa 8a 9e 51 06 72 |..87K........Q.r| +00000010 4a 87 54 07 37 d1 76 27 71 ab ee 69 f1 91 70 fd |J.T.7.v'q..i..p.| +[31f6 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 5d 53 97 0c c1 60 43 b0 14 d5 e8 |0D. .]S...`C....| +00000010 99 54 81 9d 55 36 a4 fd 1e 7d 8f 5c e0 74 13 69 |.T..U6...}.\.t.i| +00000020 ab 0c 43 3b 02 20 02 5b 0a 97 c5 11 06 72 12 b2 |..C;. .[.....r..| +00000030 2c a7 be dd af 94 f8 2b 49 6e c8 5c 2d 97 4f 64 |,......+In.\-.Od| +00000040 c0 0c 0b 4c 59 c0 |...LY.| +[31f7 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 principal evaluation succeeds for identity 0 +[31f8 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df43b0 gate 1602702122662408300 evaluation succeeds +[31f9 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[31fa 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[31fb 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[31fc 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[31fd 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31fe 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31ff 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3200 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +[3201 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +00000040 fd 69 ae 22 60 96 a0 |.i."`..| +[3202 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3203 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3204 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3205 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3206 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +[3207 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +00000040 7e e9 c8 0c cb c1 59 |~.....Y| +[3208 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3209 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[320a 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[320b 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[320c 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[320d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[320e 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[320f 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3210 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3211 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3212 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3213 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3214 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 gate 1602702122669129700 evaluation starts +[3215 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 signed by 0 principal evaluation starts (used [false]) +[3216 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 processing identity 0 with bytes of 115a6c0 +[3217 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 principal matched by identity 0 +[3218 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3219 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[321a 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 principal evaluation succeeds for identity 0 +[321b 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003de35c0 gate 1602702122669129700 evaluation succeeds +[321c 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[321d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[321e 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[321f 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3220 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3221 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3222 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[3223 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[3224 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3225 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +[3226 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +00000040 fd 69 ae 22 60 96 a0 |.i."`..| +[3227 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3228 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 ac 69 ad 00 62 65 42 55 a5 5c |0E.!...i..beBU.\| +00000010 ab d9 20 6b bd f2 ea 49 27 5b 28 98 c6 ad f1 bc |.. k...I'[(.....| +00000020 86 7b c9 99 88 02 20 3b 16 57 20 2f 90 37 db 96 |.{.... ;.W /.7..| +00000030 fb 7a 69 78 8f 03 da 48 5e 8b 25 d4 dd b6 db ec |.zix...H^.%.....| +00000040 14 5d d2 5a c0 f6 39 |.].Z..9| +[3229 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[322a 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[322b 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[322c 10-14 19:02:02.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[322d 10-14 19:02:02.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[322e 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[322f 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[3230 10-14 19:02:02.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3231 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[3232 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3233 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3234 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3235 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3236 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3237 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3238 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3239 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[323a 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 gate 1602702122692571500 evaluation starts +[323b 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 signed by 0 principal evaluation starts (used [false]) +[323c 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 processing identity 0 with bytes of 115a6c0 +[323d 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 principal matched by identity 0 +[323e 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ee bc c8 5d 8f bf ae 89 dd 15 7c 27 f1 8c df 50 |...]......|'...P| +00000010 f1 53 89 1a 02 3f 45 20 cd e5 29 20 54 c3 0f 09 |.S...?E ..) T...| +[323f 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 32 4e c9 2a 79 a3 00 59 a5 |0E.!..02N.*y..Y.| +00000010 a7 15 6b b0 d5 fc 1c 92 71 7f c6 29 99 1a 82 3d |..k.....q..)...=| +00000020 ce c2 86 6f a3 02 20 5a 76 94 82 3f d3 4f 91 56 |...o.. Zv..?.O.V| +00000030 c3 a9 be 55 06 37 8e 99 eb 96 10 17 e1 fe a8 44 |...U.7.........D| +00000040 e3 6c 82 19 05 b6 19 |.l.....| +[3240 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 principal evaluation succeeds for identity 0 +[3241 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e1ffb0 gate 1602702122692571500 evaluation succeeds +[3242 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3243 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3244 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3245 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3246 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3247 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3248 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3249 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bd 80 f4 ef df 2e c1 4e d0 1f 7e 97 43 b9 70 eb |.......N..~.C.p.| +00000010 fd 1c 8b d7 30 6e 9d ef 57 06 a0 88 82 e5 ac 40 |....0n..W......@| +[324a 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 e1 2b 6f 3d f7 ca a1 3a 38 82 |0E.!...+o=...:8.| +00000010 86 09 7a a4 ff 54 6e dd 71 57 5c 3f a5 16 29 3e |..z..Tn.qW\?..)>| +00000020 9e 13 38 b1 49 02 20 50 a8 16 9a 3c cb 27 d9 68 |..8.I. P...<.'.h| +00000030 76 59 40 d4 19 c7 8d 64 42 75 7f 39 4e 28 df de |vY@....dBu.9N(..| +00000040 7e e9 c8 0c cb c1 59 |~.....Y| +[324b 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[324c 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[324d 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[324e 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b f5 b3 38 cf de a1 36 82 57 4c 84 2c 53 c4 c9 |;..8...6.WL.,S..| +00000010 88 73 e1 d7 6c de e3 41 f9 b3 ba d8 8d df 0a 62 |.s..l..A.......b| +[324f 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 9a 49 bf 59 7b 8b ff b8 38 3a |0E.!...I.Y{...8:| +00000010 c9 59 37 08 24 ba 6d 11 94 04 98 25 40 75 9f 88 |.Y7.$.m....%@u..| +00000020 58 17 e8 03 8b 02 20 3a 2a 63 85 b4 95 4c e6 34 |X..... :*c...L.4| +00000030 8d eb a2 e9 c3 0d 50 77 9b 8e df a4 36 3f e4 44 |......Pw....6?.D| +00000040 fd 69 ae 22 60 96 a0 |.i."`..| +[3250 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3251 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3252 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3253 10-14 19:02:02.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3254 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3255 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3256 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3257 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3258 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3259 10-14 19:02:02.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[325a 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[325b 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[325c 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 gate 1602702122720959700 evaluation starts +[325d 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 signed by 0 principal evaluation starts (used [false]) +[325e 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 processing identity 0 with bytes of 115a6c0 +[325f 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 principal matched by identity 0 +[3260 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3261 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3262 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 principal evaluation succeeds for identity 0 +[3263 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e52620 gate 1602702122720959700 evaluation succeeds +[3264 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3265 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3266 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3267 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3268 10-14 19:02:02.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3269 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41824 +[326a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e80410 +[326b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[326c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[326d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[326e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[326f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3270 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 9b fe 70 46 18 c7 f5 d0 26 bb 7a 72 c9 62 3e |...pF....&.zr.b>| +00000010 20 1e dc ff c6 af 8f df 93 fd 09 9d b0 02 51 47 | .............QG| +[3271 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 47 c8 38 2f de f5 99 a5 80 a9 |0E.!..G.8/......| +00000010 bc 16 9f 78 e1 93 56 91 f7 78 8c dd fb d5 44 9a |...x..V..x....D.| +00000020 be f3 0b 35 3b 02 20 68 f3 a8 4c 36 c2 39 4e 48 |...5;. h..L6.9NH| +00000030 5d b2 38 76 a9 29 2c 77 65 6e 0a 97 01 f2 f4 6e |].8v.),wen.....n| +00000040 a5 d4 7a a8 b9 d4 9e |..z....| +[3272 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3273 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba7180, header 0xc003e80820 +[3274 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[3275 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] processing txid: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0 +[3276 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0] +[3277 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Entry chaincode: name:"qscc" +[3278 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][df854b7b] Entry chaincode: name:"qscc" +[3279 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[327a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[327b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +[327c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[327d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[327e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[327f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3280 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 gate 1602702122815814800 evaluation starts +[3281 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 signed by 0 principal evaluation starts (used [false]) +[3282 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 processing identity 0 with bytes of 115a6c0 +[3283 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3284 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 principal evaluation fails +[3285 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea4470 gate 1602702122815814800 evaluation fails +[3286 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3287 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3288 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3289 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 gate 1602702122816546100 evaluation starts +[328a 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 signed by 0 principal evaluation starts (used [false]) +[328b 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 processing identity 0 with bytes of 115a6c0 +[328c 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 principal matched by identity 0 +[328d 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 9b fe 70 46 18 c7 f5 d0 26 bb 7a 72 c9 62 3e |...pF....&.zr.b>| +00000010 20 1e dc ff c6 af 8f df 93 fd 09 9d b0 02 51 47 | .............QG| +[328e 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 47 c8 38 2f de f5 99 a5 80 a9 |0E.!..G.8/......| +00000010 bc 16 9f 78 e1 93 56 91 f7 78 8c dd fb d5 44 9a |...x..V..x....D.| +00000020 be f3 0b 35 3b 02 20 68 f3 a8 4c 36 c2 39 4e 48 |...5;. h..L6.9NH| +00000030 5d b2 38 76 a9 29 2c 77 65 6e 0a 97 01 f2 f4 6e |].8v.),wen.....n| +00000040 a5 d4 7a a8 b9 d4 9e |..z....| +[328f 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 principal evaluation succeeds for identity 0 +[3290 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea49e0 gate 1602702122816546100 evaluation succeeds +[3291 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3292 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3293 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3294 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3295 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +[3296 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56677] +[3297 10-14 19:02:02.81 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40889], Going to peek [8] bytes +[3298 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28207], placementInfo={fileNum=[0], startOffset=[56677], bytesOffset=[56680]} +[3299 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [df854b7b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[329a 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [df854b7b] notifying Txid:df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, channelID:businesschannel +[329b 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[329c 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][df854b7b] Exit chaincode: name:"qscc" (6ms) +[329d 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Exit +[329e 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Entry chaincode: name:"qscc" +[329f 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] escc for chaincode name:"qscc" is escc +[32a0 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, chaincode: qscc} +[32a1 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20CEC4298E3D18F84D48694F976F84...455254494649434154452D2D2D2D2D0A +[32a2 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3B7030D12C9F433B937FEF86033263FC5681A977CAAE2A3C7040CB362E3F4D +[32a3 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: df854b7b04f7fdf6f4f98144ceeb3a8d83e7316f6ef21d99177dc8b688ae41c0, chaincode: qscc} +[32a4 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][df854b7b] Exit +[32a5 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41824 +[32a6 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41824 grpc.code=OK grpc.call_duration=9.8185ms +[32a7 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41824: read: connection reset by peer +[32a8 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[32a9 10-14 19:02:02.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[32aa 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32ab 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[32ac 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32ad 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32ae 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32af 10-14 19:02:02.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32b0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[32b1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[32b2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32b4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32b5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32b6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32b7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32b8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32b9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 gate 1602702122932037700 evaluation starts +[32ba 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 signed by 0 principal evaluation starts (used [false]) +[32bb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 processing identity 0 with bytes of 115a6c0 +[32bc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 principal matched by identity 0 +[32bd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[32be 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[32bf 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 principal evaluation succeeds for identity 0 +[32c0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ae90 gate 1602702122932037700 evaluation succeeds +[32c1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32c2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32c3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32c4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32c5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32c6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32c7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32c8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32c9 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32ca 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32cb 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32cc 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 gate 1602702122933269400 evaluation starts +[32cd 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 signed by 0 principal evaluation starts (used [false]) +[32ce 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 processing identity 0 with bytes of 115a6c0 +[32cf 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 principal matched by identity 0 +[32d0 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[32d1 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[32d2 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 principal evaluation succeeds for identity 0 +[32d3 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1ba80 gate 1602702122933269400 evaluation succeeds +[32d4 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32d5 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32d6 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32d7 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32d8 10-14 19:02:02.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32d9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[32da 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32db 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32dc 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32dd 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32de 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32df 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32e0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32e1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 gate 1602702122947694200 evaluation starts +[32e2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 signed by 0 principal evaluation starts (used [false]) +[32e3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 processing identity 0 with bytes of 115a6c0 +[32e4 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 principal matched by identity 0 +[32e5 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[32e6 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[32e7 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 principal evaluation succeeds for identity 0 +[32e8 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4ad50 gate 1602702122947694200 evaluation succeeds +[32e9 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32ea 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32eb 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32ec 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32ed 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32ee 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[32ef 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[32f0 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f1 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32f2 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32f3 10-14 19:02:02.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32f4 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32f5 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32f6 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32f7 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 gate 1602702122953923100 evaluation starts +[32f8 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 signed by 0 principal evaluation starts (used [false]) +[32f9 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 processing identity 0 with bytes of 115a6c0 +[32fa 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 principal matched by identity 0 +[32fb 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[32fc 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[32fd 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 principal evaluation succeeds for identity 0 +[32fe 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f660b0 gate 1602702122953923100 evaluation succeeds +[32ff 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3300 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3301 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3302 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3303 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3304 10-14 19:02:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3305 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3306 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3307 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[3308 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3309 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330a 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[330b 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[330c 10-14 19:02:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[330d 10-14 19:02:02.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[330e 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41828 +[330f 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f434a0 +[3310 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3311 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3312 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3313 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3314 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3315 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 f3 9e 8c 57 7f 0b 92 96 74 19 90 a4 10 61 |.X...W....t....a| +00000010 04 4f 9e 33 77 d7 0c a2 74 7d 9a a4 f4 08 08 5f |.O.3w...t}....._| +[3316 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ec 24 98 22 d6 3a a7 1d 68 cf |0E.!...$.".:..h.| +00000010 36 94 46 da 67 ff c9 a2 60 e7 da 5b 21 5b d3 c1 |6.F.g...`..[![..| +00000020 e2 3c 4d b7 a4 02 20 22 67 dd c2 ce f0 e9 30 6c |./.O`| +[3317 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3318 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ba7b90, header 0xc003f438b0 +[3319 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[331a 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] processing txid: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9 +[331b 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9] +[331c 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +[331d 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +[331e 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[331f 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +[3320 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +[3321 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3322 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3323 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3324 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3325 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 gate 1602702123228929300 evaluation starts +[3326 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 signed by 0 principal evaluation starts (used [false]) +[3327 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 processing identity 0 with bytes of 115a6c0 +[3328 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3329 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 principal evaluation fails +[332a 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6750 gate 1602702123228929300 evaluation fails +[332b 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[332c 10-14 19:02:03.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[332d 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[332e 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 gate 1602702123230237400 evaluation starts +[332f 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 signed by 0 principal evaluation starts (used [false]) +[3330 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 processing identity 0 with bytes of 115a6c0 +[3331 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 principal matched by identity 0 +[3332 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 58 f3 9e 8c 57 7f 0b 92 96 74 19 90 a4 10 61 |.X...W....t....a| +00000010 04 4f 9e 33 77 d7 0c a2 74 7d 9a a4 f4 08 08 5f |.O.3w...t}....._| +[3333 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 ec 24 98 22 d6 3a a7 1d 68 cf |0E.!...$.".:..h.| +00000010 36 94 46 da 67 ff c9 a2 60 e7 da 5b 21 5b d3 c1 |6.F.g...`..[![..| +00000020 e2 3c 4d b7 a4 02 20 22 67 dd c2 ce f0 e9 30 6c |./.O`| +[3334 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 principal evaluation succeeds for identity 0 +[3335 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc6cc0 gate 1602702123230237400 evaluation succeeds +[3336 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3337 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3338 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3339 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[333a 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [19e4f3ec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[333b 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [19e4f3ec] notifying Txid:19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, channelID:businesschannel +[333c 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[333d 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][19e4f3ec] Exit chaincode: name:"cscc" (5ms) +[333e 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Exit +[333f 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Entry chaincode: name:"cscc" +[3340 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] escc for chaincode name:"cscc" is escc +[3341 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, chaincode: cscc} +[3342 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209B13B827CE682E953E823537732C...455254494649434154452D2D2D2D2D0A +[3343 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DBD7C2AA459050B6276F2DDB664FB3CA96E64BA2CED4B336B0A91C0E24CBC37D +[3344 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 19e4f3ec0e3f760a49fd094ba4651aab755720e4ea7d5c14ec538bec99381ae9, chaincode: cscc} +[3345 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][19e4f3ec] Exit +[3346 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41828 +[3347 10-14 19:02:03.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41828 grpc.code=OK grpc.call_duration=10.5658ms +[3348 10-14 19:02:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3349 10-14 19:02:03.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[334a 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[334b 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 99 e5 16 c0 b6 a7 30 ba e0 7b 03 fa 77 ff b6 |.......0..{..w..| +00000010 d4 6d 1a a0 97 92 d4 a5 a8 e1 df 87 f9 36 1f 65 |.m...........6.e| +[334c 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 17 cd 66 f8 52 61 da 42 08 ff |0E.!....f.Ra.B..| +00000010 06 ec 70 dd b3 6d 90 37 85 5c c4 50 cc 2c 03 93 |..p..m.7.\.P.,..| +00000020 96 30 c3 ae b8 02 20 44 e8 6d 2c fa c0 f6 d7 1f |.0.... D.m,.....| +00000030 44 33 90 9b 20 9e 47 1c 6c f4 80 7d c9 ce 50 44 |D3.. .G.l..}..PD| +00000040 4f 16 ae 81 4c 33 18 |O...L3.| +[334d 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[334e 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[334f 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3350 10-14 19:02:03.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[3351 10-14 19:02:03.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[3352 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41832 +[3353 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00401c4b0 +[3354 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3355 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3356 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3357 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3358 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3359 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 84 4d 4f d0 64 75 23 7a 02 e5 cf 4d 63 66 3c |~.MO.du#z...Mcf<| +00000010 7d bc fd e0 e1 f5 54 ec ba 6f b6 98 06 02 92 ba |}.....T..o......| +[335a 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 8a 65 88 88 37 f0 70 af e4 1b |0E.!...e..7.p...| +00000010 d4 fe f0 0b c0 08 1f 51 66 0a 5b c8 5e 39 59 ed |.......Qf.[.^9Y.| +00000020 08 16 ca 30 89 02 20 5b 29 8f 13 bd 4d 7e 22 3b |...0.. [)...M~";| +00000030 b1 52 df c0 59 1d 0a 15 2b a5 ed 45 c4 cc 27 45 |.R..Y...+..E..'E| +00000040 2d 32 d2 e7 2d 66 87 |-2..-f.| +[335b 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[335c 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b33570, header 0xc00401c8c0 +[335d 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[335e 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] processing txid: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f +[335f 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f] +[3360 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Entry chaincode: name:"cscc" +[3361 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][797d8626] Entry chaincode: name:"cscc" +[3362 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3363 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[3364 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 84 4d 4f d0 64 75 23 7a 02 e5 cf 4d 63 66 3c |~.MO.du#z...Mcf<| +00000010 7d bc fd e0 e1 f5 54 ec ba 6f b6 98 06 02 92 ba |}.....T..o......| +[3365 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 8a 65 88 88 37 f0 70 af e4 1b |0E.!...e..7.p...| +00000010 d4 fe f0 0b c0 08 1f 51 66 0a 5b c8 5e 39 59 ed |.......Qf.[.^9Y.| +00000020 08 16 ca 30 89 02 20 5b 29 8f 13 bd 4d 7e 22 3b |...0.. [)...M~";| +00000030 b1 52 df c0 59 1d 0a 15 2b a5 ed 45 c4 cc 27 45 |.R..Y...+..E..'E| +00000040 2d 32 d2 e7 2d 66 87 |-2..-f.| +[3366 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [797d8626] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3367 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [797d8626] notifying Txid:797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, channelID:businesschannel +[3368 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3369 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][797d8626] Exit chaincode: name:"cscc" (2ms) +[336a 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Exit +[336b 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Entry chaincode: name:"cscc" +[336c 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] escc for chaincode name:"cscc" is escc +[336d 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, chaincode: cscc} +[336e 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20BEE8ADF2FF752E4D6566B16C3A19...455254494649434154452D2D2D2D2D0A +[336f 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF99719379F896B3059FDE13B273656F210D7FE4429DC9A7D2DC2315CA8BEB92 +[3370 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 797d86264029ec1848a1a01e1e615a40cd0ef99a50a6170c8da4e500966fb06f, chaincode: cscc} +[3371 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][797d8626] Exit +[3372 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41832 +[3373 10-14 19:02:03.42 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41832 grpc.code=OK grpc.call_duration=6.8033ms +[3375 10-14 19:02:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3374 10-14 19:02:03.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3376 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3377 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3378 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3379 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[337a 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[337b 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[337c 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[337d 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[337e 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[337f 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3380 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3381 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3382 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 gate 1602702125138986900 evaluation starts +[3383 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 signed by 0 principal evaluation starts (used [false]) +[3384 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 processing identity 0 with bytes of 115a6c0 +[3385 10-14 19:02:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 principal matched by identity 0 +[3386 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6e 6b 36 9b 71 2f 1b 65 7a 2b f4 d6 38 6b 23 dc |nk6.q/.ez+..8k#.| +00000010 46 a8 8a 9e a4 86 45 19 f4 31 ff 20 67 93 1f b5 |F.....E..1. g...| +[3387 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 6e ae 66 be f3 57 67 41 9f dc |0E.!..n.f..WgA..| +00000010 db 1e 45 ea 52 e6 03 4c 95 81 b9 f4 9c b5 e5 78 |..E.R..L.......x| +00000020 b1 c8 8c a5 82 02 20 7c 38 52 21 70 4b 1b aa 76 |...... |8R!pK..v| +00000030 70 98 64 6b e6 4a 2b e5 1b 35 6d bc 68 ab 50 e0 |p.dk.J+..5m.h.P.| +00000040 63 8c 10 5b 2e ac aa |c..[...| +[3388 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 principal evaluation succeeds for identity 0 +[338a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d7e0 gate 1602702125138986900 evaluation succeeds +[338b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[338c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[338d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[338e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[338f 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3390 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3391 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3392 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3393 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3394 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3395 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3396 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3389 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3397 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3398 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3399 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[339a 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[339b 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[339c 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[339d 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[339e 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[339f 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a0 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a1 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a2 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a3 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a4 10-14 19:02:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a5 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[33a6 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a7 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a8 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[33a9 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33aa 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ab 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33ac 10-14 19:02:05.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ad 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33ae 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33af 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33b0 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[33b1 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33b2 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[33b3 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[33b4 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[33b5 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[33b6 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33b7 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[33b8 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 gate 1602702125241123200 evaluation starts +[33b9 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 signed by 0 principal evaluation starts (used [false]) +[33ba 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 processing identity 0 with bytes of 115a6c0 +[33bb 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 principal matched by identity 0 +[33bc 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 1d 94 e2 48 42 c2 93 2c df 23 85 5e d7 83 03 |....HB..,.#.^...| +00000010 ac b7 05 c8 b6 46 0d d2 75 70 31 72 2d a8 2e 4e |.....F..up1r-..N| +[33bd 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 42 f8 aa e1 63 7f d3 62 e1 a2 |0E.!..B...c..b..| +00000010 6d 3b 0c 6d 74 33 cc 8d a9 6a dd 8d f3 cf be 39 |m;.mt3...j.....9| +00000020 29 ea 13 6a cb 02 20 7b 32 eb 95 30 bc 09 72 d1 |)..j.. {2..0..r.| +00000030 2e e5 0d 3c fa 39 33 12 b2 8c 41 47 13 8f 52 c3 |...<.93...AG..R.| +00000040 72 f5 d9 a6 fa f4 d5 |r......| +[33be 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 principal evaluation succeeds for identity 0 +[33bf 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040be000 gate 1602702125241123200 evaluation succeeds +[33c0 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33c1 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33c2 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33c3 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33c4 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33c5 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33c6 10-14 19:02:05.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33c7 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33c8 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[33c9 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[33ca 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[33cb 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[33cc 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33cd 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ce 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33cf 10-14 19:02:05.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33d1 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d0 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d2 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33d3 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d4 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33d5 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33d6 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33d7 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33d8 10-14 19:02:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33d9 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33da 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33db 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33dc 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[33dd 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33de 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33df 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[33e0 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33e1 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e2 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[33e3 10-14 19:02:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e4 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33e5 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33e6 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33e7 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[33e8 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 64 a2 b3 bc d2 13 51 a9 fc fb a5 d7 d2 30 9d |.d.....Q......0.| +00000010 b6 6c 21 97 6d 75 3a fa 54 ac 47 87 cf c6 42 e1 |.l!.mu:.T.G...B.| +[33e9 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 17 37 fb 44 6e 58 59 96 f5 fb e2 |0D. 0.7.DnXY....| +00000010 8a ed 02 27 14 24 b9 29 41 14 36 8f 79 48 7a 48 |...'.$.)A.6.yHzH| +00000020 a4 a7 eb 25 02 20 49 51 26 17 90 4a 3d 68 e1 70 |...%. IQ&..J=h.p| +00000030 ad cb 9a 47 03 f8 56 cd 9c 8f 5e 39 44 4b 78 b5 |...G..V...^9DKx.| +00000040 1b 00 74 8b 03 87 |..t...| +[33ea 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33eb 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[33ec 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[33ed 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[33ee 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[33ef 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f0 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f1 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f2 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33f3 10-14 19:02:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33f4 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33f5 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[33f6 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33f7 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[33f8 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33fa 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33f9 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33fb 10-14 19:02:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33fc 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33fd 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[33fe 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33ff 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3400 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3401 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3402 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3403 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3404 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3405 10-14 19:02:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3406 10-14 19:02:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[3407 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3408 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102A +[3409 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5C06A203ABC27F0B33BA43254D7EE77AE4A383570B6BC4DD0422F580B02D4FBC +[340a 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[340b 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[340c 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[340d 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[340e 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[340f 10-14 19:02:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3410 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[3411 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3412 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3413 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3414 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3416 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3417 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3415 10-14 19:02:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3418 10-14 19:02:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3419 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[341a 10-14 19:02:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[341b 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[341c 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[341d 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[341e 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[341f 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3420 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 06 a2 03 ab c2 7f 0b 33 ba 43 25 4d 7e e7 7a |\.......3.C%M~.z| +00000010 e4 a3 83 57 0b 6b c4 dd 04 22 f5 80 b0 2d 4f bc |...W.k..."...-O.| +[3421 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 45 4e 56 91 0e 21 36 3c 3b 89 7c |0D. BENV..!6<;.|| +00000010 ed 7a 1c 09 c5 d2 8b 2b 86 38 22 2a 69 87 29 e5 |.z.....+.8"*i.).| +00000020 7c b4 c2 46 02 20 58 b9 ff 90 f7 79 c4 66 69 c0 ||..F. X....y.fi.| +00000030 54 5c 35 47 ab 91 59 e9 27 93 88 1c 56 f4 3b 21 |T\5G..Y.'...V.;!| +00000040 87 e5 70 ef 9d 45 |..p..E| +[3422 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3423 10-14 19:02:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3424 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3425 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3426 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3427 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3428 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3429 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[342a 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[342b 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[342c 10-14 19:02:05.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[342d 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[342e 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[342f 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3430 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3431 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3432 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3433 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3434 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3435 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3436 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3437 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3438 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3439 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[343a 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[343b 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[343c 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[343d 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 gate 1602702125898326500 evaluation starts +[343e 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 signed by 0 principal evaluation starts (used [false]) +[343f 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 processing identity 0 with bytes of 115a6c0 +[3440 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 principal matched by identity 0 +[3441 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3442 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3443 10-14 19:02:05.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 principal evaluation succeeds for identity 0 +[3444 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041494d0 gate 1602702125898326500 evaluation succeeds +[3445 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3446 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3447 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3448 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3449 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[344a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[344b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[344c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[344d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[344e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[344f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3450 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3451 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 gate 1602702125901939300 evaluation starts +[3452 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 signed by 0 principal evaluation starts (used [false]) +[3453 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 processing identity 0 with bytes of 115a6c0 +[3454 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 principal matched by identity 0 +[3455 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3456 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3457 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 principal evaluation succeeds for identity 0 +[3458 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041706d0 gate 1602702125901939300 evaluation succeeds +[3459 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[345a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[345b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[345c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[345d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[345e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[345f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3460 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3461 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3462 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3463 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3464 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3465 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3466 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3467 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3468 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3469 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[346a 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[346b 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 gate 1602702125907179200 evaluation starts +[346c 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 signed by 0 principal evaluation starts (used [false]) +[346d 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 processing identity 0 with bytes of 115a6c0 +[346e 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 principal matched by identity 0 +[346f 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3470 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3471 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 principal evaluation succeeds for identity 0 +[3472 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a850 gate 1602702125907179200 evaluation succeeds +[3473 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3474 10-14 19:02:05.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3475 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3476 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3477 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3478 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3479 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[347a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[347b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[347c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[347d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[347e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[347f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 gate 1602702125912814200 evaluation starts +[3480 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 signed by 0 principal evaluation starts (used [false]) +[3481 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 processing identity 0 with bytes of 115a6c0 +[3482 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 principal matched by identity 0 +[3483 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3484 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3485 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 principal evaluation succeeds for identity 0 +[3486 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418ba50 gate 1602702125912814200 evaluation succeeds +[3487 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3488 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3489 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[348a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[348b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[348c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[348d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[348e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[348f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3490 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3491 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3492 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3493 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3494 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3495 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3496 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3497 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3498 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3499 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[349a 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 gate 1602702125918595500 evaluation starts +[349b 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 signed by 0 principal evaluation starts (used [false]) +[349c 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 processing identity 0 with bytes of 115a6c0 +[349d 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 principal matched by identity 0 +[349e 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[349f 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[34a0 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 principal evaluation succeeds for identity 0 +[34a1 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abc80 gate 1602702125918595500 evaluation succeeds +[34a2 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[34a3 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34a4 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34a5 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34a6 10-14 19:02:05.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34a7 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34a8 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34a9 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34aa 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34ab 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34ac 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34ad 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34ae 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 gate 1602702125921617000 evaluation starts +[34af 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 signed by 0 principal evaluation starts (used [false]) +[34b0 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 processing identity 0 with bytes of 115a6c0 +[34b1 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 principal matched by identity 0 +[34b2 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[34b3 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[34b4 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 principal evaluation succeeds for identity 0 +[34b5 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c4e80 gate 1602702125921617000 evaluation succeeds +[34b6 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[34b7 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34b8 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34b9 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34ba 10-14 19:02:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34bb 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34bc 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34bd 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[34be 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34bf 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34c0 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[34c1 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[34c2 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c3 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[34c4 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[34c5 10-14 19:02:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34c6 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34c7 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34c8 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[34c9 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34ca 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cb 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cc 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cd 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34ce 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34cf 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[34d0 10-14 19:02:06.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34d1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34d2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34d3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34d4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[34d5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[34d6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34d7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[34d8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[34d9 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[34da 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34db 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34dc 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34dd 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 gate 1602702126184805400 evaluation starts +[34de 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 signed by 0 principal evaluation starts (used [false]) +[34df 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 processing identity 0 with bytes of 115a6c0 +[34e0 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 principal matched by identity 0 +[34e1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +[34e2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +00000040 21 82 24 ce c5 a0 |!.$...| +[34e3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 principal evaluation succeeds for identity 0 +[34e4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004137da0 gate 1602702126184805400 evaluation succeeds +[34e5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[34e6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34e7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34e8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34e9 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[34ea 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[34eb 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[34ec 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[34ed 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[34ee 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34ef 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34f0 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34f1 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[34f2 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34f3 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34f4 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34f5 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[34f6 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[34f7 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[34f8 10-14 19:02:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[34f9 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34fa 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34fb 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[34fc 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34fd 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34fe 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[34ff 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3500 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3501 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3502 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3503 10-14 19:02:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3504 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3505 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3506 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3507 10-14 19:02:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3508 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3509 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[350a 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[350b 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[350c 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[350d 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[350e 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[350f 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3510 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3511 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3512 10-14 19:02:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3513 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3514 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 gate 1602702126310994100 evaluation starts +[3515 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 signed by 0 principal evaluation starts (used [false]) +[3516 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 processing identity 0 with bytes of 115a6c0 +[3517 10-14 19:02:06.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 principal matched by identity 0 +[3518 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +[3519 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc0041f0bb0 principal evaluation succeeds for identity 0 +[351b 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041f0bb0 gate 1602702126310994100 evaluation succeeds +[351c 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[351d 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[351e 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[351f 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3520 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3521 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3522 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3523 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3524 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3525 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3526 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3527 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3528 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3529 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352a 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[352b 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[352c 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[352d 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[352e 10-14 19:02:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[352f 10-14 19:02:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3530 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3531 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3532 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3533 10-14 19:02:06.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3534 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3535 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3536 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3537 10-14 19:02:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3538 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes +[3539 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[353a 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > > , Envelope: 270 bytes, Signature: 0 bytes +[353b 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[353c 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +[353d 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +00000040 95 9d 30 8f b6 76 |..0..v| +[353e 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[353f 10-14 19:02:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d a5 3e 21 87 48 c2 48 9b 37 a1 9a |0D. ..>!.H.H.7..| +00000010 9c f9 1c 3f c5 cd 69 34 c2 2a ba ff b4 cd c7 fb |...?..i4.*......| +00000020 0a 93 a2 e7 02 20 0e f9 b1 89 f2 44 28 bd d4 8a |..... .....D(...| +00000030 22 09 29 cb 73 52 63 22 c6 89 15 93 d0 6b 39 1f |".).sRc".....k9.| +00000040 11 16 8c 23 b8 68 |...#.h| +[3540 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3541 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3542 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3543 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3544 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3545 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3546 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3547 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3548 10-14 19:02:06.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3549 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[354a 10-14 19:02:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[354b 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[354c 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:!\207H\302H\2337\241\232\234\371\034?\305\315i4\302*\272\377\264\315\307\373\n\223\242\347\002 \016\371\261\211\362D(\275\324\212\"\t)\313sRc\"\306\211\025\223\320k9\037\021\026\214#\270h" > > alive: +[354d 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[354e 10-14 19:02:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[354f 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3550 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3551 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3552 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3553 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3554 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3555 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3556 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3557 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3558 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3559 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[355a 10-14 19:02:06.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[355b 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[355c 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[355d 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[355e 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[355f 10-14 19:02:06.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3560 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3561 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3562 10-14 19:02:06.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3563 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3564 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3565 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3566 10-14 19:02:06.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3567 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3568 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3569 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[356a 10-14 19:02:06.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102B +[356b 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 879073F988B1A501800E65B2AC778038410BA4A41B1A2063301AFBA27F13D588 +[356c 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[356d 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[356e 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[356f 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[3570 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3571 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3572 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3573 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[3574 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +[3575 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3576 10-14 19:02:06.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3577 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[3578 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:y\217J\300\270\206\002X\241b\214\210U\250m\376\240D\353\224\366\036" > > , Envelope: 166 bytes, Signature: 0 bytes +[3579 10-14 19:02:06.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357a 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[357b 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[357c 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[357d 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[357e 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[357f 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +[3580 10-14 19:02:06.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +00000040 95 9d 30 8f b6 76 |..0..v| +[3581 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3582 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3583 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3584 10-14 19:02:06.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3585 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3587 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3586 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3588 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[358a 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3589 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[358b 10-14 19:02:06.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[358c 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[358d 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[358e 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 gate 1602702126682776700 evaluation starts +[358f 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 signed by 0 principal evaluation starts (used [false]) +[3590 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 processing identity 0 with bytes of 115a6c0 +[3591 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 principal matched by identity 0 +[3592 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 9d e5 a2 fd b3 ca 7a c9 e1 6b 52 45 7d 84 44 |.......z..kRE}.D| +00000010 3b 04 a3 a8 16 ce 1c 88 82 51 56 19 dd 28 47 4f |;........QV..(GO| +[3593 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f fd 6f dc 85 5c 48 47 fc b3 34 85 |0D. ..o..\HG..4.| +00000010 18 82 27 83 65 4d e2 1e 14 3f 56 16 92 df da 4c |..'.eM...?V....L| +00000020 6e ff 12 84 02 20 1e 8f f1 3f 46 c1 ab 58 f7 ba |n.... ...?F..X..| +00000030 2a 71 16 0d 50 7f 2f 3a 9a 6d 5b a5 f3 b5 17 d2 |*q..P./:.m[.....| +00000040 21 82 24 ce c5 a0 |!.$...| +[3594 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 principal evaluation succeeds for identity 0 +[3595 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004296b10 gate 1602702126682776700 evaluation succeeds +[3596 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3597 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3598 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3599 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[359a 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[359b 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[359c 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[359d 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +[359e 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +00000040 fe a0 44 eb 94 f6 1e |..D....| +[359f 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[35a0 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[35a1 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35a2 10-14 19:02:06.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35a3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[35a4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[35a5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35a6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[35a7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[35a8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35a9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[35aa 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[35ab 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[35ac 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[35ad 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[35ae 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[35af 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 gate 1602702126706502900 evaluation starts +[35b0 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 signed by 0 principal evaluation starts (used [false]) +[35b1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 processing identity 0 with bytes of 115a6c0 +[35b2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 principal matched by identity 0 +[35b3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec fc af 05 e9 61 b5 14 81 bb 0a 85 00 7b ed ba |.....a.......{..| +00000010 ce 49 f8 35 05 e2 1b 61 4c 45 3b 6b b6 60 22 58 |.I.5...aLE;k.`"X| +[35b4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 25 13 5b fc b3 35 0b 9a 42 54 b0 |0D. .%.[..5..BT.| +00000010 43 c7 be 5e 79 a3 86 92 62 1a d2 a4 15 e6 2c b4 |C..^y...b.....,.| +00000020 a5 c6 f2 f5 02 20 52 8a 17 58 0b 7c 50 08 06 91 |..... R..X.|P...| +00000030 54 78 19 3c 76 d6 49 4f 5e b2 6b 64 8f 96 fa cd |Tx. DEBU 0xc004269a00 principal evaluation succeeds for identity 0 +[35b6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004269a00 gate 1602702126706502900 evaluation succeeds +[35b7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[35b8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[35b9 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[35ba 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[35bb 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[35bc 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35bd 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[35be 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 65 b7 fe 10 08 c5 1c 52 74 9c f0 23 20 2b 1f |.e......Rt..# +.| +00000010 a4 bb 8a c4 d7 4d c7 db 20 0e 61 72 29 af 98 ad |.....M.. .ar)...| +[35bf 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e e8 b3 ef e6 0a a8 23 01 85 9e 55 |0D. ^......#...U| +00000010 87 5b 43 5a 41 de e6 e0 e5 c0 c7 8a ad 48 fb db |.[CZA........H..| +00000020 9c 1a 0f 83 02 20 00 bc 71 7c 2c 30 2e 3a 8b a0 |..... ..q|,0.:..| +00000030 44 d2 f4 72 c3 6c 1f 2b 07 5d 91 9d 09 b8 55 42 |D..r.l.+.]....UB| +00000040 95 9d 30 8f b6 76 |..0..v| +[35c0 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[35c1 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35c2 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[35c3 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +[35c4 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +00000040 fe a0 44 eb 94 f6 1e |..D....| +[35c5 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[35c6 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[35c7 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35c8 10-14 19:02:06.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35c9 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[35ca 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35cb 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[35cc 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[35cd 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 87 90 73 f9 88 b1 a5 01 80 0e 65 b2 ac 77 80 38 |..s.......e..w.8| +00000010 41 0b a4 a4 1b 1a 20 63 30 1a fb a2 7f 13 d5 88 |A..... c0.......| +[35ce 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 06 84 2b 21 fd ed 9b 3b d1 f2 |0E.!....+!...;..| +00000010 93 f7 15 57 c0 6b ba 10 a9 a2 cf 75 96 36 40 66 |...W.k.....u.6@f| +00000020 63 5a 2a b7 a8 02 20 04 8d 53 53 48 3a 82 4c a3 |cZ*... ..SSH:.L.| +00000030 3e 79 8f 4a c0 b8 86 02 58 a1 62 8c 88 55 a8 6d |>y.J....X.b..U.m| +00000040 fe a0 44 eb 94 f6 1e |..D....| +[35cf 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[35d0 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 57 e8 fc 01 ef e6 02 22 0c 81 7c |0D. 0W......"..|| +00000010 f5 1c 83 94 ac e5 b0 4c c0 0b e7 c2 dd 22 e7 09 |.......L....."..| +00000020 76 ea 9a a6 02 20 3c 23 52 78 cf ce b2 8f fb a2 |v.... <#Rx......| +00000030 8a 3a 5a 99 48 46 ca 76 52 18 7e 06 bd 79 93 25 |.:Z.HF.vR.~..y.%| +00000040 3d 20 2a 7c 68 06 |= *|h.| +[35d1 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[35d2 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[35d3 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35d4 10-14 19:02:06.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35d5 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[35d6 10-14 19:02:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[35d7 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35d8 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35d9 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35da 10-14 19:02:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35db 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[35dc 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[35dd 10-14 19:02:08.34 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[35de 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[35df 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 4f 71 f5 94 f7 a0 ad 68 8e 46 da df 09 0a 25 |.Oq.....h.F....%| +00000010 c8 60 68 89 dc ac 4d f2 91 7e 48 a5 ff 82 df 2c |.`h...M..~H....,| +[35e0 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 0f 69 5a f8 b0 ec 8a af 14 b5 40 |0D. ..iZ.......@| +00000010 4a 67 19 56 e4 44 59 54 c7 03 df e6 e8 1c e1 7e |Jg.V.DYT.......~| +00000020 e4 f6 c2 f8 02 20 6b dd 9c f5 6c b4 28 f1 c9 20 |..... k...l.(.. | +00000030 2b 22 bd 09 2c c9 3c 46 bb f9 18 4c 65 37 48 4b |+"..,. DEBU Exiting +[35e2 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35e3 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35e4 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[35e5 10-14 19:02:08.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[35e6 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35e7 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35e8 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[35e9 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[35ea 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35eb 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[35ec 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35ed 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[35ee 10-14 19:02:09.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35ef 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[35f0 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[35f1 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[35f2 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[35f3 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[35f4 10-14 19:02:09.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[35f5 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35f6 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35f7 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[35f8 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[35f9 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[35fa 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[35fb 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[35fc 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[35fd 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[35fe 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 gate 1602702129902313200 evaluation starts +[35ff 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 signed by 0 principal evaluation starts (used [false]) +[3600 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 processing identity 0 with bytes of 115a6c0 +[3601 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 principal matched by identity 0 +[3602 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3603 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3604 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 principal evaluation succeeds for identity 0 +[3605 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042f3a50 gate 1602702129902313200 evaluation succeeds +[3606 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3607 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3608 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3609 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[360a 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[360b 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[360c 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[360d 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[360e 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[360f 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3610 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3611 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3612 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 gate 1602702129904603400 evaluation starts +[3613 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 signed by 0 principal evaluation starts (used [false]) +[3614 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 processing identity 0 with bytes of 115a6c0 +[3615 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 principal matched by identity 0 +[3616 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3617 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3618 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 principal evaluation succeeds for identity 0 +[3619 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431ac50 gate 1602702129904603400 evaluation succeeds +[361a 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[361b 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[361c 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[361d 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[361e 10-14 19:02:09.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[361f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3620 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3621 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3622 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3623 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3624 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3625 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3626 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3627 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3628 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3629 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[362a 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[362b 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[362c 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[362d 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 gate 1602702129914338300 evaluation starts +[362e 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 signed by 0 principal evaluation starts (used [false]) +[362f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 processing identity 0 with bytes of 115a6c0 +[3630 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 principal matched by identity 0 +[3631 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3632 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3633 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 principal evaluation succeeds for identity 0 +[3634 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433ce80 gate 1602702129914338300 evaluation succeeds +[3635 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3636 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3637 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3638 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3639 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[363a 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[363b 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[363c 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[363d 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[363e 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[363f 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3640 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3641 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 gate 1602702129919183600 evaluation starts +[3642 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 signed by 0 principal evaluation starts (used [false]) +[3643 10-14 19:02:09.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 processing identity 0 with bytes of 115a6c0 +[3644 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 principal matched by identity 0 +[3645 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3646 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3647 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 principal evaluation succeeds for identity 0 +[3648 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435c080 gate 1602702129919183600 evaluation succeeds +[3649 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[364a 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[364b 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[364c 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[364d 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364e 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[364f 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3650 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3651 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3652 10-14 19:02:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3653 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3654 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3655 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3656 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3657 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3658 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3659 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[365a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[365b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[365c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 gate 1602702129932321500 evaluation starts +[365d 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 signed by 0 principal evaluation starts (used [false]) +[365e 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 processing identity 0 with bytes of 115a6c0 +[365f 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 principal matched by identity 0 +[3660 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3661 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3662 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 principal evaluation succeeds for identity 0 +[3663 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043742b0 gate 1602702129932321500 evaluation succeeds +[3664 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3665 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3666 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3667 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3668 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3669 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[366a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[366b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[366c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[366d 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[366e 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[366f 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3670 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 gate 1602702129934297700 evaluation starts +[3671 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 signed by 0 principal evaluation starts (used [false]) +[3672 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 processing identity 0 with bytes of 115a6c0 +[3673 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 principal matched by identity 0 +[3674 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3675 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3676 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 principal evaluation succeeds for identity 0 +[3677 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043754b0 gate 1602702129934297700 evaluation succeeds +[3678 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3679 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[367a 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[367b 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[367c 10-14 19:02:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[367d 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367e 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367f 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3680 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3681 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3682 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3683 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3684 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3685 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3686 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3687 10-14 19:02:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3688 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3689 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[368a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[368b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[368c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[368d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[368e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[368f 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3690 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3691 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3692 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3693 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3694 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3695 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3696 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3697 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3698 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3699 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[369a 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[369b 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[369c 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[369d 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[369e 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[369f 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 gate 1602702130145529700 evaluation starts +[36a0 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 signed by 0 principal evaluation starts (used [false]) +[36a1 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 processing identity 0 with bytes of 115a6c0 +[36a2 10-14 19:02:10.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 principal matched by identity 0 +[36a3 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 5d 3c c2 cc e2 10 84 6a ae 1f 66 b0 4f 61 38 |.]<.....j..f.Oa8| +00000010 0c 28 75 de f3 cc 5d 1a c4 b8 09 71 1c cf 80 7a |.(u...]....q...z| +[36a4 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b3 01 ac b8 85 1e 71 e6 7a b2 |0E.!........q.z.| +00000010 50 e4 29 5c f1 cc 96 05 12 c0 11 82 f7 38 ee 08 |P.)\.........8..| +00000020 e1 b9 19 33 9f 02 20 43 94 8b 01 e7 df 5e 71 36 |...3.. C.....^q6| +00000030 8a 22 fd 4d 18 5f 45 e0 96 d2 7d b4 c6 d4 92 50 |.".M._E...}....P| +00000040 78 69 8c d9 43 3d d4 |xi..C=.| +[36a5 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 principal evaluation succeeds for identity 0 +[36a6 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043aa000 gate 1602702130145529700 evaluation succeeds +[36a7 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36a8 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36a9 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36aa 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36ab 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36ac 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[36ad 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[36ae 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[36af 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[36b0 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b1 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b2 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b3 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36b4 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36b5 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b6 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36b7 10-14 19:02:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36b8 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36b9 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ba 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36bb 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36bc 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36bd 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36be 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36bf 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c0 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c1 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c2 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c3 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[36c4 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c5 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[36c6 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36c7 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c8 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36c9 10-14 19:02:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ca 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +[36cb 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +[36cc 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36cd 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:xI\225\315Xl\232\233^\223\362E" > > , Envelope: 166 bytes, Signature: 0 bytes +[36ce 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[36cf 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d0 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36d1 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36d2 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36d3 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36d4 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36d5 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36d6 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 gate 1602702130188139800 evaluation starts +[36d7 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 signed by 0 principal evaluation starts (used [false]) +[36d8 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 processing identity 0 with bytes of 115a6c0 +[36d9 10-14 19:02:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 principal matched by identity 0 +[36da 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +[36db 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +[36dc 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 principal evaluation succeeds for identity 0 +[36dd 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043abd70 gate 1602702130188139800 evaluation succeeds +[36de 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36df 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36e0 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36e1 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36e2 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36e3 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[36e4 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[36e5 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[36e6 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[36e7 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e8 10-14 19:02:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36e9 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ea 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[36eb 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ec 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ed 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ee 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[36ef 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[36f0 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36f1 10-14 19:02:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +[36f2 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36f3 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36f4 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36f5 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36f6 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[36f7 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36f8 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36f9 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36fa 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36fb 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36fc 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36fd 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36fe 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 gate 1602702130243979300 evaluation starts +[36ff 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 signed by 0 principal evaluation starts (used [false]) +[3700 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 processing identity 0 with bytes of 115a6c0 +[3701 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 principal matched by identity 0 +[3702 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8e 9f ac 79 45 4e 68 5c 24 72 a5 a8 2c 9c 4a c6 |...yENh\$r..,.J.| +00000010 d0 20 86 ca 47 fa ea 7e 9c 43 0b e3 1f 46 a6 a3 |. ..G..~.C...F..| +[3703 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ec f8 74 d7 fc e8 83 63 55 9a c4 |0D. P..t....cU..| +00000010 9a b8 39 29 d1 0b bf cb 15 65 d2 e0 b1 c7 4c bf |..9).....e....L.| +00000020 a1 71 58 b0 02 20 42 b3 6d 3b 29 3a 64 5b 24 cf |.qX.. B.m;):d[$.| +00000030 94 e9 37 32 c6 33 c0 72 e0 55 87 25 b9 0c cd 71 |..72.3.r.U.%...q| +00000040 7d 19 0a 64 f7 c9 |}..d..| +[3704 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 principal evaluation succeeds for identity 0 +[3705 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e5ad0 gate 1602702130243979300 evaluation succeeds +[3706 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3707 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3708 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3709 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[370a 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[370b 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[370c 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[370d 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[370e 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[370f 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3710 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3711 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3712 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3713 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3714 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3715 10-14 19:02:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3716 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3717 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3718 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3719 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371a 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371b 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371c 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371d 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371e 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371f 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3720 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3721 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3722 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3723 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3724 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3725 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3726 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3727 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3728 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3729 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[372c 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[372d 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[372e 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[372a 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[372f 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[372b 10-14 19:02:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3730 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3731 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3732 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3733 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3734 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3735 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3736 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3737 10-14 19:02:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3738 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3739 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[373a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[373b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[373c 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[373d 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[373e 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[373f 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3740 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3741 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3742 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3743 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3744 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 gate 1602702130314635500 evaluation starts +[3745 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 signed by 0 principal evaluation starts (used [false]) +[3746 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 processing identity 0 with bytes of 115a6c0 +[3747 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 principal matched by identity 0 +[3748 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +[3749 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +00000040 58 a9 ac 57 01 0e ce |X..W...| +[374a 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 principal evaluation succeeds for identity 0 +[374b 10-14 19:02:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c900 gate 1602702130314635500 evaluation succeeds +[374c 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[374d 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[374e 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[374f 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3750 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3751 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3752 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3753 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3754 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3755 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3756 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3757 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3758 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3759 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[375a 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[375b 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[375c 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[375d 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:xI\225\315Xl\232\233^\223\362E" > alive: alive: +[375e 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[375f 10-14 19:02:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3760 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3761 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3762 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3763 10-14 19:02:10.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3764 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3765 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3766 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3767 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3768 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3769 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 e0 96 01 24 0a 44 d8 43 d6 45 e4 d8 bc 00 1f |....$.D.C.E.....| +00000010 97 d8 77 cb 20 dc 01 ee 7d 9b bd 67 df 19 cd dd |..w. ...}..g....| +[376a 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 d9 34 ad ac c8 1b 6c 67 ab 1a |0E.!...4....lg..| +00000010 98 48 8b 7a 08 f8 8c 25 50 ce d2 14 3b 0b 3a b0 |.H.z...%P...;.:.| +00000020 03 a3 0d 12 dc 02 20 48 e7 23 f3 5d e0 ea 88 03 |...... H.#.]....| +00000030 f3 be 38 9e ab 2c ef 54 33 0f d3 f2 54 60 04 60 |..8..,.T3...T`.`| +00000040 7a 74 2c cc 42 42 79 |zt,.BBy| +[376b 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[376c 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[376d 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[376e 10-14 19:02:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[376f 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3770 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3771 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3772 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3773 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3774 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3775 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3776 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3777 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3778 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3779 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[377a 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[377b 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[377c 10-14 19:02:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[377d 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[377e 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[377f 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3780 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3781 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3782 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3783 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3784 10-14 19:02:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3785 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3786 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3787 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3788 10-14 19:02:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3789 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[378a 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[378b 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[378c 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[378d 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +00000040 52 05 ce 66 95 2e |R..f..| +[378f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3790 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c8 4f 1a ce 76 e2 e2 e4 cb 16 7d |0E.!..O..v.....}| +00000010 b7 b6 b7 23 7d d4 82 13 6d 80 69 be 8b a0 db 7f |...#}...m.i.....| +00000020 c7 00 06 87 92 02 20 5c bf 0b af 8e db e5 f9 87 |...... \........| +00000030 40 7c cf 27 4f 1d 25 1b e4 22 d3 ff 01 b7 81 0b |@|.'O.%.."......| +00000040 df 41 46 2a 13 26 9e |.AF*.&.| +[3791 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3792 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3793 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3794 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3795 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3796 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3797 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3798 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3799 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[379a 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379b 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379c 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[379d 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[379e 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[379f 10-14 19:02:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a0 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[37a1 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[37a2 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[37a3 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[37a4 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[37a5 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[37a6 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[37a7 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a8 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[37a9 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37aa 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[37ab 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ac 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[37ad 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102C +[37ae 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1CAB21DAC8D81F4E729A2EDC15C70092A2C02B81F2ABFB3CCB03D6BACE458B77 +[37af 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[37b0 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[37b1 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[37b2 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[37b3 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37b4 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37b5 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37b6 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37b7 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37b8 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37b9 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[37ba 10-14 19:02:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37bb 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[37bc 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[37bd 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37be 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bf 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37c0 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37c1 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[37c2 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37c3 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[37c4 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[37c5 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37c6 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c7 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37c8 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c9 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37ca 10-14 19:02:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37cb 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37cc 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37cd 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37ce 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37cf 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37d0 10-14 19:02:10.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37d1 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37d2 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37d3 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37d4 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[37d5 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c ab 21 da c8 d8 1f 4e 72 9a 2e dc 15 c7 00 92 |..!....Nr.......| +00000010 a2 c0 2b 81 f2 ab fb 3c cb 03 d6 ba ce 45 8b 77 |..+....<.....E.w| +[37d6 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a1 00 4f 74 45 5d c1 d7 a8 7e 53 |0E.!...OtE]...~S| +00000010 23 8e d4 39 88 35 b5 bf bc d3 ea a3 7a bd 2b 60 |#..9.5......z.+`| +00000020 81 0a d8 b3 31 02 20 0d 91 f4 94 02 61 14 eb 32 |....1. .....a..2| +00000030 92 92 0d 3b 35 ea be 7c 92 55 1b d4 b9 f5 bf de |...;5..|.U......| +00000040 19 bf d6 15 e7 c6 f7 |.......| +[37d7 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[37d8 10-14 19:02:10.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37d9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[37da 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102D +[37db 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F1AA1E1CFC3DCAD916A39CC740FEBB7332D538B66C82A6DE15964548078C3FD3 +[37dc 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[37dd 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[37de 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[37df 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[37e0 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37e1 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[37e2 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37e3 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[37e4 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[37e5 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e6 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[37e7 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37e8 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[37e9 10-14 19:02:10.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ea 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[37eb 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[37ec 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ed 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[37ee 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[37ef 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f0 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37f1 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37f2 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37f3 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37f4 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37f5 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37f6 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 gate 1602702130641376500 evaluation starts +[37f7 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 signed by 0 principal evaluation starts (used [false]) +[37f8 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 processing identity 0 with bytes of 115a6c0 +[37f9 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 principal matched by identity 0 +[37fa 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e 90 0c 0d 1d 1d 26 94 1d 18 a0 1c 47 5a 24 0a |~.....&.....GZ$.| +00000010 1c 44 3b 90 6c 28 e9 70 7f c3 6a c4 b4 83 69 a9 |.D;.l(.p..j...i.| +[37fb 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b9 ed 2b 16 8f f8 86 77 75 e0 b7 |0E.!...+....wu..| +00000010 4c 2b 17 50 e0 07 c0 ab 61 e1 24 45 ce 5b a1 6b |L+.P....a.$E.[.k| +00000020 22 bc 92 40 16 02 20 31 6a 24 43 26 7b ac db 87 |"..@.. 1j$C&{...| +00000030 bd 99 8b c9 2f 2e 9f 8e e0 bf 3e 78 49 95 cd 58 |..../.....>xI..X| +00000040 6c 9a 9b 5e 93 f2 45 |l..^..E| +[37fc 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[37fd 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[37fe 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 principal evaluation succeeds for identity 0 +[37ff 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cddb0 gate 1602702130641376500 evaluation succeeds +[3800 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3801 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3802 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3803 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3804 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3805 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3806 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3807 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +[3808 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +00000040 50 32 87 1f 30 da |P2..0.| +[3809 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[380a 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[380b 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[380c 10-14 19:02:10.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[380d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +00000040 52 05 ce 66 95 2e |R..f..| +[380f 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3810 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3811 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3813 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3814 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3812 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3815 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3816 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +[3817 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +00000040 50 32 87 1f 30 da |P2..0.| +[3818 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3819 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3f 01 7f be 54 a1 0f fd 37 d8 94 b5 |0D. ?...T...7...| +00000010 2a 7f a5 f1 ed 40 11 b7 dc 8f 57 fd 48 6b 09 62 |*....@....W.Hk.b| +00000020 5f b6 d0 7e 02 20 20 7b c6 27 30 03 ea 54 58 2a |_..~. {.'0..TX*| +00000030 cf 14 71 42 3f a9 4a 06 6f 62 50 78 76 f6 c8 30 |..qB?.J.obPxv..0| +00000040 0e 0b 7b 8e 50 b5 |..{.P.| +[381a 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[381b 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[381c 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381e 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381f 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3820 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3821 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3822 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3823 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3824 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3825 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3826 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3827 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3828 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 gate 1602702130659649300 evaluation starts +[3829 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 signed by 0 principal evaluation starts (used [false]) +[382a 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 processing identity 0 with bytes of 115a6c0 +[382b 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 principal matched by identity 0 +[382c 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 63 56 c3 b8 f6 90 42 45 e9 6d 78 9a e8 63 4b |-cV....BE.mx..cK| +00000010 6e b4 c7 64 9c aa c2 62 c7 87 c8 f9 99 be 1a 01 |n..d...b........| +[382d 10-14 19:02:10.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 74 e8 e6 2d 21 4e 9a 98 e9 79 |0E.!..t..-!N...y| +00000010 d4 68 50 96 24 3f 45 46 f6 0c b5 98 da 06 64 de |.hP.$?EF......d.| +00000020 6e 3f b8 e8 a0 02 20 6f 0f e4 cc f8 ed f9 31 96 |n?.... o......1.| +00000030 ad 26 7b 42 6b b3 85 d3 66 f7 df 47 50 de 4f 66 |.&{Bk...f..GP.Of| +00000040 58 a9 ac 57 01 0e ce |X..W...| +[382e 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 principal evaluation succeeds for identity 0 +[382f 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00451f6f0 gate 1602702130659649300 evaluation succeeds +[3830 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3831 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3832 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3833 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3834 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3835 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3836 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3837 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fe ec 04 2f 43 87 3c 54 80 fd 5b 66 c1 c9 1e 2c |.../C. DEBU Verify: sig = 00000000 30 44 02 20 5c d0 b1 83 3d 11 59 ab 64 8b 12 fc |0D. \...=.Y.d...| +00000010 bc e9 c8 91 66 8f a2 37 a1 48 b3 17 a7 2f 2d 56 |....f..7.H.../-V| +00000020 11 b4 71 a4 02 20 68 99 b4 f8 58 bb d3 36 06 7e |..q.. h...X..6.~| +00000030 0e 37 7e 7d 3b aa 0d 93 e6 47 d3 64 74 21 3c e7 |.7~};....G.dt!<.| +00000040 52 05 ce 66 95 2e |R..f..| +[3839 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[383a 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[383b 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[383c 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 aa 1e 1c fc 3d ca d9 16 a3 9c c7 40 fe bb 73 |.....=......@..s| +00000010 32 d5 38 b6 6c 82 a6 de 15 96 45 48 07 8c 3f d3 |2.8.l.....EH..?.| +[383d 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 80 ea 13 cb 54 37 72 cd e0 7f 08 |0D. .....T7r....| +00000010 21 83 61 e1 43 6e bc a3 a4 a1 7f b7 e5 74 5d 1f |!.a.Cn.......t].| +00000020 1d d4 c8 5a 02 20 4a e1 78 4c 77 fe 93 bf 2d 32 |...Z. J.xLw...-2| +00000030 ba 14 d3 27 51 aa 48 36 61 31 66 62 69 ad 0f 7e |...'Q.H6a1fbi..~| +00000040 50 32 87 1f 30 da |P2..0.| +[383e 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[383f 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3840 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3841 10-14 19:02:10.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3842 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3843 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3844 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3845 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3846 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3847 10-14 19:02:10.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3848 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[3849 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 94 ec ae 06 3c e9 1f b6 df 07 c6 73 56 2d 57 59 |....<......sV-WY| +00000010 5b 5b c0 18 02 76 7d c3 e5 4a ea 7a 95 0e 41 41 |[[...v}..J.z..AA| +[384a 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 3b 86 3d 6a 5e d2 50 0a 63 75 9d |0D. .;.=j^.P.cu.| +00000010 5c fb dd ca 50 98 d5 be ba e3 3c e8 28 d7 64 46 |\...P.....<.(.dF| +00000020 f0 79 fa 64 02 20 1d 0c 89 2f 99 51 50 f0 79 5a |.y.d. .../.QP.yZ| +00000030 e5 43 ac e9 a7 ff 90 92 f5 0b a9 df 69 86 46 fb |.C..........i.F.| +00000040 57 27 80 e6 76 ce |W'..v.| +[384b 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[384c 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384d 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384e 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[384f 10-14 19:02:13.35 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[3850 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3851 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3852 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3853 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3854 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3855 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3856 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3857 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3858 10-14 19:02:13.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3859 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[385a 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[385b 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[385c 10-14 19:02:13.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[385d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[385e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[385f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3860 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3861 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3862 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3863 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3864 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3865 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3866 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3867 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3868 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3869 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 gate 1602702133903254500 evaluation starts +[386a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 signed by 0 principal evaluation starts (used [false]) +[386b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 processing identity 0 with bytes of 115a6c0 +[386c 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 principal matched by identity 0 +[386d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[386e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[386f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 principal evaluation succeeds for identity 0 +[3870 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00457d290 gate 1602702133903254500 evaluation succeeds +[3871 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3872 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3873 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3874 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3875 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3876 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3877 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3878 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3879 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[387a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[387b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[387c 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[387d 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 gate 1602702133906138500 evaluation starts +[387e 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 signed by 0 principal evaluation starts (used [false]) +[387f 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 processing identity 0 with bytes of 115a6c0 +[3880 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 principal matched by identity 0 +[3881 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3882 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3883 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 principal evaluation succeeds for identity 0 +[3884 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00459c490 gate 1602702133906138500 evaluation succeeds +[3885 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3886 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3887 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3888 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3889 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[388a 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[388b 10-14 19:02:13.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[388c 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[388d 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[388e 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[388f 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3890 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3891 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3892 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3893 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3894 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3895 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3896 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3897 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3898 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 gate 1602702133913831500 evaluation starts +[3899 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 signed by 0 principal evaluation starts (used [false]) +[389a 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 processing identity 0 with bytes of 115a6c0 +[389b 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 principal matched by identity 0 +[389c 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[389d 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[389e 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 principal evaluation succeeds for identity 0 +[389f 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bc6c0 gate 1602702133913831500 evaluation succeeds +[38a0 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38a1 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38a2 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38a3 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38a4 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38a5 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38a6 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38a7 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38a8 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38a9 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38aa 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38ab 10-14 19:02:13.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38ac 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 gate 1602702133920232400 evaluation starts +[38ad 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 signed by 0 principal evaluation starts (used [false]) +[38ae 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 processing identity 0 with bytes of 115a6c0 +[38af 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 principal matched by identity 0 +[38b0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[38b1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[38b2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 principal evaluation succeeds for identity 0 +[38b3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bd8c0 gate 1602702133920232400 evaluation succeeds +[38b4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38b5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38b6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38b7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38b8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[38ba 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[38bb 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[38bc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[38bd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[38be 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38bf 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38c0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38c1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38c2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38c3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38c4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38c5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38c6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 gate 1602702133924794000 evaluation starts +[38c7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 signed by 0 principal evaluation starts (used [false]) +[38c8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 processing identity 0 with bytes of 115a6c0 +[38c9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 principal matched by identity 0 +[38ca 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[38cb 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[38cc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 principal evaluation succeeds for identity 0 +[38cd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9a40 gate 1602702133924794000 evaluation succeeds +[38ce 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38cf 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38d0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38d1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38d2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38d3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38d4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38d5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38d6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38d7 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38d8 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38d9 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38da 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 gate 1602702133927104100 evaluation starts +[38db 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 signed by 0 principal evaluation starts (used [false]) +[38dc 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 processing identity 0 with bytes of 115a6c0 +[38dd 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 principal matched by identity 0 +[38de 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[38df 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[38e0 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 principal evaluation succeeds for identity 0 +[38e1 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fcc40 gate 1602702133927104100 evaluation succeeds +[38e2 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38e3 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38e4 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38e5 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38e6 10-14 19:02:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38e7 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38e8 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38e9 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[38ea 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38eb 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38ec 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[38ed 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[38ee 10-14 19:02:13.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ef 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[38f0 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[38f1 10-14 19:02:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38f2 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[38f3 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[38f4 10-14 19:02:14.12 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[38f5 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38f6 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38f7 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38f8 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38f9 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38fa 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38fb 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[38fc 10-14 19:02:14.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38fd 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[38fe 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[38ff 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3900 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3901 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3902 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3903 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3904 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3905 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3906 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3907 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3908 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3909 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 gate 1602702134182537200 evaluation starts +[390a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 signed by 0 principal evaluation starts (used [false]) +[390b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 processing identity 0 with bytes of 115a6c0 +[390c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 principal matched by identity 0 +[390d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +[390e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +00000040 df a6 74 15 19 4b c3 |..t..K.| +[390f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 principal evaluation succeeds for identity 0 +[3910 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004640c60 gate 1602702134182537200 evaluation succeeds +[3911 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3912 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3913 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3914 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3915 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3916 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3917 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3918 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3919 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[391a 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391b 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391c 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391d 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[391e 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[391f 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3920 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3921 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[3922 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3923 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[3924 10-14 19:02:14.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3925 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3926 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3927 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3928 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3929 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392a 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392b 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392c 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392d 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392e 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[392f 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3930 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3931 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3932 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3933 10-14 19:02:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3934 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +[3935 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +[3936 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3937 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > > , Envelope: 166 bytes, Signature: 0 bytes +[3938 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3939 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[393a 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[393b 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[393c 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[393d 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[393e 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[393f 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3940 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 gate 1602702134317281500 evaluation starts +[3941 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 signed by 0 principal evaluation starts (used [false]) +[3942 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 processing identity 0 with bytes of 115a6c0 +[3943 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 principal matched by identity 0 +[3944 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +[3945 10-14 19:02:14.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +00000040 09 a8 87 8a be a4 58 |......X| +[3946 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 principal evaluation succeeds for identity 0 +[3947 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00467c980 gate 1602702134317281500 evaluation succeeds +[3948 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3949 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[394a 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[394b 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[394c 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[394d 10-14 19:02:14.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[394e 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[394f 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3950 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3951 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3952 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3953 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3954 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3955 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3956 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3957 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3958 10-14 19:02:14.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[3959 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\002 \177\"@\240\266i!v\335\273\241\333\365\263\327\036\244]\213\246\2638}_i\t\250\207\212\276\244X" > alive: +[395a 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[395b 10-14 19:02:14.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[395c 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[395d 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[395e 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[395f 10-14 19:02:14.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3960 10-14 19:02:14.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3961 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3962 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3963 10-14 19:02:14.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3964 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3965 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3966 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3967 10-14 19:02:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3968 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +[3969 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +00000040 9e f4 98 25 6e 7a fd |...%nz.| +[396a 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[396b 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 35 18 69 f4 15 ff f0 ee 8b 57 91 |0D. .5.i......W.| +00000010 4f c7 7e 97 f5 12 da 4b dd 14 e9 a7 de cf f1 d9 |O.~....K........| +00000020 eb 9c b2 13 02 20 32 10 01 49 3a 33 e9 4e 00 b2 |..... 2..I:3.N..| +00000030 f3 b6 6e af 78 cc 38 e6 9a 94 33 ef 01 35 0c 20 |..n.x.8...3..5. | +00000040 c8 6d 79 f8 15 f9 |.my...| +[396c 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[396d 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[396e 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[396f 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3970 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[3971 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3972 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3973 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3974 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3975 10-14 19:02:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3976 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3977 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[3978 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3979 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[397a 10-14 19:02:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:Fo\250\t\372d:c\271.$\026\211\206\007\236\364\205\276\303\333\313\221hy|1\002\234G\002 7\363\272\222\375\311P\"\237\3714\347#\372\237z\033P?\240=\303nT\026\236\364\230%nz\375" secret_envelope: > alive: +[397b 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[397c 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[397d 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[397e 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[397f 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3980 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3982 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3981 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3983 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3984 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3985 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3986 10-14 19:02:14.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3987 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3988 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3989 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[398a 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[398b 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[398c 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[398d 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[398e 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[398f 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3990 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3991 10-14 19:02:14.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3992 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3993 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3994 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3995 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3996 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3997 10-14 19:02:14.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3998 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3999 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102E +[399a 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D8639C09C2598EEA7413FF50A9826FEF415E799032A18E31FDF9CA97F6C70E8D +[399b 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[399c 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[399d 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[399e 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[399f 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39a0 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[39a1 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39a2 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[39a3 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[39a4 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39a5 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 w%p\366\333\035\237\253\010\025\202!\026\322\315\014\253\317\003,z\362\272\264&ef\305\346k\3233" > > > , Envelope: 271 bytes, Signature: 0 bytes +[39a6 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39a7 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[39a8 10-14 19:02:14.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39a9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[39aa 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[39ab 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ac 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[39ad 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[39ae 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39af 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39b0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39b1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39b2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39b3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39b4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39b5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 gate 1602702134645390900 evaluation starts +[39b6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 signed by 0 principal evaluation starts (used [false]) +[39b7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 processing identity 0 with bytes of 115a6c0 +[39b8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 principal matched by identity 0 +[39b9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 1a 82 b7 01 bb 26 cf 46 f1 08 50 f5 08 c5 40 |^.....&.F..P...@| +00000010 ed 48 a3 76 a6 31 e1 39 71 17 25 87 e5 34 b0 21 |.H.v.1.9q.%..4.!| +[39ba 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ea 6c b4 dd 1e 35 f1 77 3d e3 |0E.!...l...5.w=.| +00000010 f8 40 fd fc 87 a0 b0 d4 1d 65 ba b4 9b 58 6f 1b |.@.......e...Xo.| +00000020 36 86 66 1a f2 02 20 44 9e 02 e6 b1 40 48 12 ac |6.f... D....@H..| +00000030 63 f0 db 49 f2 0b 68 c5 cc 35 33 33 15 b0 19 95 |c..I..h..533....| +00000040 df a6 74 15 19 4b c3 |..t..K.| +[39bb 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 principal evaluation succeeds for identity 0 +[39bc 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f47a0 gate 1602702134645390900 evaluation succeeds +[39bd 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39be 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39bf 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39c0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39c1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39c2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[39c4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +[39c5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +00000040 f1 97 46 30 66 62 ed |..F0fb.| +[39c6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39c7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39c8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c9 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[39ca 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +[39cb 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +00000040 9e f4 98 25 6e 7a fd |...%nz.| +[39cc 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39cd 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ce 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39cf 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[39d0 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[39d1 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39d2 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[39d3 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[39d4 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39d5 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39d6 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39d7 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39d8 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39d9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[39da 10-14 19:02:14.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39db 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39dc 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 gate 1602702134652666400 evaluation starts +[39dd 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 signed by 0 principal evaluation starts (used [false]) +[39de 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 processing identity 0 with bytes of 115a6c0 +[39df 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 principal matched by identity 0 +[39e0 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc 68 ee 31 a4 f1 ae 61 74 03 c4 f8 15 80 40 6a |.h.1...at.....@j| +00000010 3a 53 16 49 48 55 f6 af 93 38 90 0e 30 3e a9 0f |:S.IHU...8..0>..| +[39e1 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 24 3a 56 89 d8 b9 c3 1c 56 6a |0E.!..$:V.....Vj| +00000010 91 e7 eb 9e 20 f9 9c 1d 72 9c 71 eb ba 62 f4 e2 |.... ...r.q..b..| +00000020 65 aa 00 44 3e 02 20 7f 22 40 a0 b6 69 21 76 dd |e..D>. ."@..i!v.| +00000030 bb a1 db f5 b3 d7 1e a4 5d 8b a6 b3 38 7d 5f 69 |........]...8}_i| +00000040 09 a8 87 8a be a4 58 |......X| +[39e2 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 principal evaluation succeeds for identity 0 +[39e3 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004707140 gate 1602702134652666400 evaluation succeeds +[39e4 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39e5 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39e6 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39e7 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39e8 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39e9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ea 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[39eb 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 bd 56 84 c0 91 61 bb 00 fc 0d 3a 43 e8 38 05 |..V...a....:C.8.| +00000010 a2 46 c7 55 83 99 e3 a0 d5 f0 c5 23 ca 36 e5 4a |.F.U.......#.6.J| +[39ec 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 3e 46 6f a8 09 fa 64 3a 63 b9 |0E.!..>Fo...d:c.| +00000010 2e 24 16 89 86 07 9e f4 85 be c3 db cb 91 68 79 |.$............hy| +00000020 7c 31 02 9c 47 02 20 37 f3 ba 92 fd c9 50 22 9f ||1..G. 7.....P".| +00000030 f9 34 e7 23 fa 9f 7a 1b 50 3f a0 3d c3 6e 54 16 |.4.#..z.P?.=.nT.| +00000040 9e f4 98 25 6e 7a fd |...%nz.| +[39ed 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39ee 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ef 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[39f0 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +[39f1 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +00000040 f1 97 46 30 66 62 ed |..F0fb.| +[39f2 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39f3 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39f4 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39f5 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39f6 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[39f7 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[39f8 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 63 9c 09 c2 59 8e ea 74 13 ff 50 a9 82 6f ef |.c...Y..t..P..o.| +00000010 41 5e 79 90 32 a1 8e 31 fd f9 ca 97 f6 c7 0e 8d |A^y.2..1........| +[39f9 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 88 dc 8b f5 cf 8e 19 d4 6c 3d |0E.!..........l=| +00000010 cf 98 4a 1e 66 b6 c8 a5 36 67 ed dc 9f 44 32 2a |..J.f...6g...D2*| +00000020 a7 d6 23 37 52 02 20 74 ac 62 ab cd b1 48 e1 82 |..#7R. t.b...H..| +00000030 bd f1 70 b7 d8 be 9d b1 b0 00 41 63 c6 99 71 0e |..p.......Ac..q.| +00000040 f1 97 46 30 66 62 ed |..F0fb.| +[39fa 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[39fb 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 27 7c 94 2e 63 38 23 34 2d 55 68 |0D. &'|..c8#4-Uh| +00000010 72 d8 9e ac 27 48 86 9a c3 5a 04 78 34 84 a1 08 |r...'H...Z.x4...| +00000020 66 75 b8 3e 02 20 77 25 70 f6 db 1d 9f ab 08 15 |fu.>. w%p.......| +00000030 82 21 16 d2 cd 0c ab cf 03 2c 7a f2 ba b4 26 65 |.!.......,z...&e| +00000040 66 c5 e6 6b d3 33 |f..k.3| +[39fc 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[39fd 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[39fe 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ff 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a00 10-14 19:02:14.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a01 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3a02 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3a03 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a04 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a05 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a06 10-14 19:02:14.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a07 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a08 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a09 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a0a 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a0b 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3a0c 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0d 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a0e 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a0f 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a10 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a11 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a12 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a13 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 gate 1602702135148137600 evaluation starts +[3a14 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 signed by 0 principal evaluation starts (used [false]) +[3a15 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 processing identity 0 with bytes of 115a6c0 +[3a16 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 principal matched by identity 0 +[3a17 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 82 54 dd a3 45 86 1d 4f f3 56 2e eb 28 87 aa |S.T..E..O.V..(..| +00000010 92 cc 18 d7 a4 1d f1 a6 7c e5 1e c2 76 42 3b 86 |........|...vB;.| +[3a18 10-14 19:02:15.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 bb 34 42 61 48 0e fd 06 c9 cf |0E.!...4BaH.....| +00000010 b8 c9 59 3c 07 5a 2e 18 2c c8 ce c7 b2 26 88 eb |..Y<.Z..,....&..| +00000020 20 e0 53 80 61 02 20 21 f1 84 0b 8c 2e 63 df 4e | .S.a. !.....c.N| +00000030 d4 40 a4 45 c5 f8 9d bf 83 62 ee c3 92 33 ec e8 |.@.E.....b...3..| +00000040 e7 85 99 c8 97 03 d4 |.......| +[3a19 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 principal evaluation succeeds for identity 0 +[3a1a 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474ad00 gate 1602702135148137600 evaluation succeeds +[3a1b 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a1c 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a1d 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a1e 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a1f 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a20 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3a21 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a22 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a23 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3a24 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a25 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a26 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a27 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a28 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a29 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2a 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2b 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2c 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2d 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a2e 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a2f 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a30 10-14 19:02:15.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a31 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a32 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a33 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a34 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a35 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a36 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a37 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a38 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a39 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3a 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a3b 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3c 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a3d 10-14 19:02:15.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a3f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a40 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a41 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a42 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3a43 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a44 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a45 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a46 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a47 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a48 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a49 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a4a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 gate 1602702135241425600 evaluation starts +[3a4b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 signed by 0 principal evaluation starts (used [false]) +[3a4c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 processing identity 0 with bytes of 115a6c0 +[3a4d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 principal matched by identity 0 +[3a4e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 2c ae 75 56 83 98 80 d0 bb d1 b4 0a 55 59 d7 |1,.uV........UY.| +00000010 bd b1 41 b1 d0 62 c7 69 a3 41 f9 a2 1e 9d 82 93 |..A..b.i.A......| +[3a4f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 98 ed b9 86 ae e1 66 89 52 03 |0E.!........f.R.| +00000010 de 32 8e 15 87 10 7c 65 c2 7c eb f0 a2 8c 50 6b |.2....|e.|....Pk| +00000020 d9 4c ad 94 3e 02 20 07 b7 a5 a9 93 25 1b c9 41 |.L..>. .....%..A| +00000030 b8 15 62 46 e8 44 12 a5 b0 f1 8f 59 3e f7 ad d6 |..bF.D.....Y>...| +00000040 4f 69 f0 8d 3b d0 aa |Oi..;..| +[3a50 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 principal evaluation succeeds for identity 0 +[3a51 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c1f0 gate 1602702135241425600 evaluation succeeds +[3a52 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a53 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a54 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a55 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a56 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a57 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3a58 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a59 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a5a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3a5b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a5f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a60 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a61 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a62 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a63 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a64 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a65 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a66 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a67 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a68 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a69 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a6a 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a6b 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a6c 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a6d 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a6e 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a6f 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a70 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a71 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a72 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a73 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a74 10-14 19:02:15.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a75 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a76 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a77 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a78 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3a79 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 f7 53 cb 14 25 7b a3 a7 6b 37 e8 19 a1 a3 93 |G.S..%{..k7.....| +00000010 be fb 11 4b 98 78 f7 e6 fb 1b 9f b1 a6 1b 68 b2 |...K.x........h.| +[3a7a 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 e6 ae b2 bb 9b ff db 19 46 8c |0E.!..........F.| +00000010 eb 5a ee de 03 6c 24 3f 8d 92 59 67 37 a6 d6 9e |.Z...l$?..Yg7...| +00000020 1a 97 ee c5 1c 02 20 20 4f c5 9d 88 70 dc 47 ca |...... O...p.G.| +00000030 c6 9b cf 6d 80 2d da f9 e0 29 f5 67 2a 43 fc ee |...m.-...).g*C..| +00000040 95 27 a7 29 f9 e3 a7 |.'.)...| +[3a7b 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a7c 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3a7d 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a7e 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a7f 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3a80 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a81 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a82 10-14 19:02:15.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a83 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a84 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a85 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a86 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a87 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a88 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a89 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a8a 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a8b 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a8c 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a8d 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a8e 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a8f 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a90 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a91 10-14 19:02:15.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a92 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a93 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a94 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a95 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a96 10-14 19:02:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a97 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a98 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16102F +[3a99 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08AAE7D48DFDE78A71308E0C0B4FE7ED4E7975E7058D85208F3BF5CCC1B2AAFB +[3a9a 10-14 19:02:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a9b 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3a9c 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3a9d 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3a9e 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a9f 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa0 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa1 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3aa2 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3aa3 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3aa4 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3aa5 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3aa6 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3aa7 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aa8 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aa9 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3aaa 10-14 19:02:15.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3aab 10-14 19:02:16.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:52186 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes +[3aac 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3aad 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[3aae 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[3aaf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ab0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[3ab1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 gate 1602702136431690200 evaluation starts +[3ab2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 signed by 0 principal evaluation starts (used [false]) +[3ab3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 processing identity 0 with bytes of 115a6c0 +[3ab4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 principal matched by identity 0 +[3ab5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 50 1f 2e e7 76 f5 a9 11 7a fe a4 7e f4 c7 a9 |.P...v...z..~...| +00000010 f1 58 d6 02 80 14 cd 2e 63 80 da f9 b5 af 7b 79 |.X......c.....{y| +[3ab6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 46 c6 88 8d e7 a1 94 8b ef 79 |0E.!..F........y| +00000010 56 b0 df 5f af f1 64 26 2d 54 98 d1 74 bc 02 dd |V.._..d&-T..t...| +00000020 f2 01 49 9e f2 02 20 72 4e df 95 74 87 86 7e 1f |..I... rN..t..~.| +00000030 af e7 75 b3 66 23 d2 1c 9b 78 0b ac a8 25 74 d8 |..u.f#...x...%t.| +00000040 c4 e8 8f bf dc 56 9c |.....V.| +[3ab7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 principal evaluation succeeds for identity 0 +[3ab8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047699b0 gate 1602702136431690200 evaluation succeeds +[3ab9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[3aba 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[3abb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[3abc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[3abd 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41193 bytes, seq: 6}, Envelope: 41226 bytes, Signature: 0 bytes to the block puller +[3abe 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +[3abf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ac0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +[3ac1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[3ac2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[3ac3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +[3ac4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +[3ac5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +[3ac6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +[3ac7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +[3ac8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[3ac9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00463d100 env 0xc004731ae0 txn 0 +[3aca 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004731ae0 +[3acb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +[3acc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[3acd 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3ace 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3acf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ad0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[3ad1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[3ad2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[3ad3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[3ad4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3ad5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c6 10 65 bf 29 00 e3 2b 47 a4 a7 71 86 2d 3a fa |..e.)..+G..q.-:.| +00000010 07 02 9f 7e 99 b4 81 05 b1 74 05 b1 9f 90 46 1f |...~.....t....F.| +[3ad6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 55 b5 e8 00 34 85 26 3f c8 b5 |0E.!..U...4.&?..| +00000010 dd f7 5f 52 3f d4 d6 8a a6 d2 dd a0 a6 7b 1b b9 |.._R?........{..| +00000020 ce ef 6d 96 e9 02 20 7e f2 77 6a 23 22 55 e5 23 |..m... ~.wj#"U.#| +00000030 cb dd 21 83 67 1a 73 29 cb db 3b 44 2d 64 e5 25 |..!.g.s)..;D-d.%| +00000040 4d 58 92 4e a4 4a df |MX.N.J.| +[3ad7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3ad8 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc004866000, header channel_header:"\010\001\032\006\010\270\226\235\374\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030~WDr\350\037l&\021(\1778PD(\260\306\020\245\215\266\002\200*" +[3ad9 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[3ada 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adb 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adc 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3add 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ade 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adf 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ae0 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3ae1 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3ae2 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3ae3 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3ae4 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3ae5 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3ae6 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3ae7 10-14 19:02:16.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3ae8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3ae9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3aea 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3aeb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3aec 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3aed 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3aee 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3aef 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3af0 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3af1 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[3af2 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[3af3 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[3af4 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[3af5 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3af6 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3af7 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3af8 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3af9 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3afa 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3afb 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3afc 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +[3afd 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +[3afe 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +[3aff 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +[3b00 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +[3b01 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +[3b02 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +[3b03 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +[3b04 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3b05 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3b06 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[3b07 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3b08 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3b09 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3b0a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[3b0b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3b0c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +[3b0d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b0e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[3b0f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[3b10 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 gate 1602702136443053800 evaluation starts +[3b11 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 signed by 0 principal evaluation starts (used [false false false]) +[3b12 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 processing identity 0 with bytes of 115a6c0 +[3b13 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3b14 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 processing identity 1 with bytes of 115a6c0 +[3b15 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[3b16 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[3b17 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3b18 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3b19 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[3b1a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3b1b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 principal matched by identity 1 +[3b1c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 b0 75 4b d9 20 11 1b ff dd f0 77 21 4e 4b d1 |I.uK. .....w!NK.| +00000010 dd 05 e0 ee 19 62 98 26 00 fe 42 10 66 84 64 d8 |.....b.&..B.f.d.| +[3b1d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 d2 f5 fe f2 df 63 c0 51 65 fb |0E.!.......c.Qe.| +00000010 19 82 45 84 17 2b 36 4f ac a0 ee 18 39 8c 68 e9 |..E..+6O....9.h.| +00000020 97 97 6e f6 69 02 20 65 75 b9 33 a7 f4 f5 44 ee |..n.i. eu.3...D.| +00000030 8e ec 57 69 64 4a 1f b4 72 82 c7 2b 85 6c ef f6 |..WidJ..r..+.l..| +00000040 3e 72 c3 c7 24 c8 e9 |>r..$..| +[3b1e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 principal evaluation succeeds for identity 1 +[3b1f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ca450 gate 1602702136443053800 evaluation succeeds +[3b20 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[3b21 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[3b22 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[3b23 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[3b24 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 gate 1602702136444682300 evaluation starts +[3b25 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 signed by 0 principal evaluation starts (used [false false false]) +[3b26 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 processing identity 0 with bytes of 115a6c0 +[3b27 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 principal matched by identity 0 +[3b28 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb c9 38 68 80 6d c9 fd f7 54 32 07 61 36 a0 9e |..8h.m...T2.a6..| +00000010 73 a6 5e a1 60 1c a3 1c 6f 38 da 45 65 35 bf 6f |s.^.`...o8.Ee5.o| +[3b29 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e f6 a7 29 2e 21 e3 df 82 69 15 03 |0D. ...).!...i..| +00000010 14 f5 df 72 6a 70 18 e1 ec f3 7d 51 5b 33 6d 0b |...rjp....}Q[3m.| +00000020 9f 94 50 99 02 20 56 70 98 86 b2 98 c6 fb 95 0c |..P.. Vp........| +00000030 61 b1 af 9f 0b 42 3e f9 f5 7e ae 2f e4 69 cd 86 |a....B>..~./.i..| +00000040 44 52 2f 24 7d 8c |DR/$}.| +[3b2a 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 principal evaluation succeeds for identity 0 +[3b2b 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cad80 gate 1602702136444682300 evaluation succeeds +[3b2c 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[3b2d 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[3b2e 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +[3b2f 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +[3b30 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +[3b31 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b32 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b33 10-14 19:02:16.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b34 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b35 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b36 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b37 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b38 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[3b39 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b3a 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b3b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[3b3c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[3b3d 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +[3b3e 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +[3b3f 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[3b40 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b41 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b42 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b43 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b44 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[3b45 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b46 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b47 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3b48 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3b49 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3b4a 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[3b4b 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[3b4c 10-14 19:02:16.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[3b4d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[3b4e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[3b4f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3b50 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[3b51 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[3b52 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3b53 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3b54 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3b55 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3b56 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3b57 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[3b58 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[3b59 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3b5a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3b5b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[3b5c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[3b5d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3b5e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3b5f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3b60 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3b61 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +[3b62 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +[3b63 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3b64 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3b65 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +[3b66 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- +[3b67 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3b68 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3b69 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3b6a 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3b6b 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[3b6c 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[3b6d 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3b6e 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3b6f 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[3b70 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[3b71 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[3b72 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[3b73 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[3b74 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[3b75 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[3b76 10-14 19:02:16.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[3b77 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3b78 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[3b79 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[3b7a 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3b7b 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3b7c 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[3b7d 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3b7e 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3b7f 10-14 19:02:16.47 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[3b80 10-14 19:02:16.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[3b81 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +[3b82 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +[3b83 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[3b84 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[3b85 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[3b86 10-14 19:02:16.49 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[3b87 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[3b88 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[3b89 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +[3b8a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +[3b8b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +[3b8c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +[3b8d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[3b8e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[3b8f 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[3b90 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3b91 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[3b92 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[3b93 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[3b94 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3b95 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[3b96 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[3b97 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[3b98 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[3b99 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[3b9a 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[3b9b 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[3b9c 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[3b9d 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[3b9e 10-14 19:02:16.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[3b9f 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[3ba0 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3ba1 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[3ba2 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[3ba3 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[3ba4 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[3ba5 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[3ba6 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[3ba7 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[3ba8 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[3ba9 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[3baa 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[3bac 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[3bab 10-14 19:02:16.51 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.516Z grpc.peer_address=172.18.0.7:45926 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=204.8µs +[3bad 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[3bae 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[3baf 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[3bb0 10-14 19:02:16.52 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[3bb1 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3bb2 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3bb3 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3bb4 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3bb5 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[3bb6 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[3bb7 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[3bb8 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[3bb9 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[3bba 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3bbb 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[3bbc 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[3bbd 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[3bbe 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[3bbf 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[3bc0 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3bc1 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3bc2 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[3bc3 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[3bc4 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[3bc5 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[3bc6 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3bc7 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3bc8 10-14 19:02:16.54 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3bc9 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3bca 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3bcb 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3bcc 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3bcd 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[3bce 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[3bcf 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[3bd0 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[3bd1 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[3bd2 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[3bd3 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[3bd4 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[3bd5 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[3bd6 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[3bd7 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[3bd9 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3bda 10-14 19:02:16.55 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3bdb 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3bdc 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +[3bdd 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[3bde 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3bdf 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[3bd8 10-14 19:02:16.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3be0 10-14 19:02:16.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[3be1 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[3be2 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[3be3 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3be4 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3be5 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[3be7 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[3be8 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[3be6 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45926 +[3be9 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[3bea 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[3beb 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[3bec 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[3bed 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[3bee 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[3bef 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[3bf0 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +[3bf1 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[3bf2 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[3bf3 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[3bf4 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bf5 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bf6 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bf7 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bf8 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bf9 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 gate 1602702136577054800 evaluation starts +[3bfa 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45926 +[3bfb 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bfc 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 signed by 0 principal evaluation starts (used [false]) +[3bfd 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 processing identity 0 with bytes of 115a6c0 +[3bfe 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3bff 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 principal evaluation fails +[3c00 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c01 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c1ce0 gate 1602702136577054800 evaluation fails +[3c02 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c03 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3c04 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c05 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3c06 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c07 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 gate 1602702136577325500 evaluation starts +[3c08 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 signed by 0 principal evaluation starts (used [false]) +[3c09 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c0a 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 processing identity 0 with bytes of 115a6c0 +[3c0b 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 principal matched by identity 0 +[3c0c 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c0d 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c0e 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c0f 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c10 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c11 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c12 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3c13 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3c14 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 principal evaluation succeeds for identity 0 +[3c15 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46250 gate 1602702136577325500 evaluation succeeds +[3c16 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3c17 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3c18 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c19 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c1a 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c1b 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c1c 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c1d 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c1e 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c1f 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c20 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 gate 1602702136585093400 evaluation starts +[3c21 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 signed by 0 principal evaluation starts (used [false]) +[3c22 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 processing identity 0 with bytes of 115a6c0 +[3c23 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 principal matched by identity 0 +[3c24 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3c25 10-14 19:02:16.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 gate 1602702136577639000 evaluation starts +[3c26 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 signed by 0 principal evaluation starts (used [false]) +[3c27 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 processing identity 0 with bytes of 115a6c0 +[3c28 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 principal matched by identity 0 +[3c29 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3c2a 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d4 e6 d6 f1 cb ff 31 43 35 80 4c |0D. w......1C5.L| +00000010 c2 25 bc 5f 05 bb b9 04 3e 13 d4 78 51 03 70 65 |.%._....>..xQ.pe| +00000020 4f 16 68 27 02 20 0c 80 e8 10 bc 31 3d 8f cf 38 |O.h'. .....1=..8| +00000030 4a 2a 61 b2 4c 19 76 5b 8b b0 9d d1 0e b2 90 bb |J*a.L.v[........| +00000040 02 0f 14 7a fb 78 |...z.x| +[3c2b 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 principal evaluation succeeds for identity 0 +[3c2c 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a219d0 gate 1602702136577639000 evaluation succeeds +[3c2d 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c2e 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c2f 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c32 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c33 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45926 +[3c30 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.587Z grpc.peer_address=172.18.0.6:48868 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=102.3µs +[3c31 10-14 19:02:16.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3c34 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45926 +[3c35 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 principal evaluation succeeds for identity 0 +[3c36 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a46d90 gate 1602702136585093400 evaluation succeeds +[3c37 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3c38 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c39 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[3c3a 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3c3b 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3c3c 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3c3d 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:48868 +[3c3e 10-14 19:02:16.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c3f 10-14 19:02:16.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c40 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c41 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c42 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c43 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c44 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c45 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c46 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c47 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c48 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 gate 1602702136615666300 evaluation starts +[3c49 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 signed by 0 principal evaluation starts (used [false]) +[3c4a 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 processing identity 0 with bytes of 115a6c0 +[3c4b 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 principal matched by identity 0 +[3c4c 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3c4d 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3c4e 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 principal evaluation succeeds for identity 0 +[3c4f 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a62960 gate 1602702136615666300 evaluation succeeds +[3c50 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c51 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c52 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c53 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c54 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +[3c55 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +[3c56 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[3c57 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[3c58 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +[3c59 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[3c5a 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c5b 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[3c5c 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.614Z grpc.peer_address=172.18.0.8:52342 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.1µs +[3c5d 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:48868 +[3c5e 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c5f 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c60 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c61 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c62 10-14 19:02:16.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c63 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c64 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c65 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c66 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c67 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c68 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c69 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 gate 1602702136631255000 evaluation starts +[3c6a 10-14 19:02:16.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 signed by 0 principal evaluation starts (used [false]) +[3c6e 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 processing identity 0 with bytes of 115a6c0 +[3c6f 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 principal matched by identity 0 +[3c70 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[3c71 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d5 61 69 b0 c4 3d b0 b0 53 51 14 |0D. x.ai..=..SQ.| +00000010 8e 7f bb 91 59 b3 e7 43 7f 59 38 bc 53 81 38 f4 |....Y..C.Y8.S.8.| +00000020 bb b7 19 49 02 20 08 02 fb 63 30 14 af b9 24 00 |...I. ...c0...$.| +00000030 94 9e 4d 3b b6 5a 91 5e 8d 16 25 7d 3d 89 43 d1 |..M;.Z.^..%}=.C.| +00000040 16 40 68 52 b3 7e |.@hR.~| +[3c72 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 principal evaluation succeeds for identity 0 +[3c73 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7a80 gate 1602702136631255000 evaluation succeeds +[3c74 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c75 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c76 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c77 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c78 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48868 +[3c79 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48868 +[3c6b 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3c7a 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3c7b 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3c7c 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:52342 +[3c7d 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:52342 +[3c7e 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3c7f 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3c80 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[3c81 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e fa e5 ea b4 ff aa c9 5a a2 dc |0E.!.........Z..| +00000010 65 f0 cf 19 a1 d8 3c ff 6d ff f1 ca e0 2c cc 7a |e.....<.m....,.z| +00000020 2d c6 ee 9b d1 02 20 6c 93 1d 6c af 42 33 9f 76 |-..... l..l.B3.v| +00000030 81 2f a5 3a 73 88 1e d5 91 f6 83 c6 c3 2c 57 ec |./.:s........,W.| +00000040 dd bd 75 0f 29 1b e7 |..u.)..| +[3c82 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:52342 +[3c83 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:52342 +[3c84 10-14 19:02:16.66 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3c85 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[3c8a 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3c8c 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004adbda0, CONNECTING +[3c8d 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52186 disconnected +[3c8e 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:52186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m7.9592484s +[3c8f 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3c8b 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[3c86 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3c87 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45926 disconnected +[3c90 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.527Z grpc.peer_address=172.18.0.7:45926 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=141.3622ms +[3c91 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3c92 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:52342 disconnected +[3c93 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.641Z grpc.peer_address=172.18.0.8:52342 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=32.0552ms +[3c94 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[3c6c 10-14 19:02:16.65 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c89 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c6d 10-14 19:02:16.61 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +[3c95 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3c88 10-14 19:02:16.67 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c96 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c97 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3c98 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c99 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c9a 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c9b 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[3c9c 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3c9d 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:48868 disconnected +[3c9e 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-10-14T19:02:26.605Z grpc.peer_address=172.18.0.6:48868 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=87.5522ms +[3c9f 10-14 19:02:16.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3ca0 10-14 19:02:16.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004adbda0, READY +[3ca1 10-14 19:02:16.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3ca2 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[3ca3 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[3ca4 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +[3ca5 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[3ca6 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[3ca7 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[3ca8 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00463d100 env 0xc004731ae0 txn 0 +[3ca9 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[3caa 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 290ms +[3cab 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[3cac 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[3cad 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.714Z grpc.peer_address=172.18.0.7:45938 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.1664ms +[3cae 10-14 19:02:16.72 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[3caf 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +[3cb1 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[3cb0 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3cb2 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[3cb4 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[3cb5 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +[3cb6 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3cb7 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[3cb8 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[3cb9 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[3cb3 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3cba 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3cbc 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[3cbd 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[3cbb 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3cbe 10-14 19:02:16.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +[3cbf 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[3cc0 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3cc1 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[3cc2 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +[3cc3 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004c345c0)} +[3cc4 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[3cc5 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[3cc6 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[3cc7 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +[3cc8 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +[3cc9 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +[3cca 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +[3ccb 10-14 19:02:16.74 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xfa, 0xcc, 0xf2, 0x5b, 0x3e, 0xf4, 0x71, 0x95, 0x3d, 0x7e, 0xb6, 0x1b, 0xd9, 0xaf, 0xa3, 0xba, 0x46, 0x63, 0x51, 0x10, 0x7e, 0xaa, 0xd3, 0xce, 0xee, 0xd2, 0x5d, 0xdd, 0x3e, 0x68, 0x5d, 0x1d} txOffsets= +txId=81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5 locPointer=offset=71, bytesLength=40147 +] +[3ccc 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to txid-index +[3ccd 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97637, bytesLength=40147] for tx number:[0] ID: [81327d4faf5b97d2ff232ed6e9acba196413de0e3fd282c22b10ce173f93b7a5] to blockNumTranNum index +[3cce 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ccf 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3cd0 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3cd1 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:45938 +[3cd2 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138781], isChainEmpty=[false], lastBlockNumber=[6] +[3cd3 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +[3cd4 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +[3cd5 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +[3cd6 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[3cd7 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[3cd8 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[3cd9 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[3cda 10-14 19:02:16.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[3cdb 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +[3cdc 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cdd 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cde 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[3cdf 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3ce0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3ce1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ce2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ce3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ce4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ce5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ce6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ce7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ce8 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ce9 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3cea 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ceb 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 gate 1602702136764794100 evaluation starts +[3cec 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 signed by 0 principal evaluation starts (used [false]) +[3ced 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 processing identity 0 with bytes of 115a6c0 +[3cee 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3cef 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 principal evaluation fails +[3cf0 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d35020 gate 1602702136764794100 evaluation fails +[3cf1 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3cf2 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3cf3 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3cf4 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 gate 1602702136768049400 evaluation starts +[3cf5 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 signed by 0 principal evaluation starts (used [false]) +[3cf6 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 processing identity 0 with bytes of 115a6c0 +[3cf7 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3cf8 10-14 19:02:16.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3cf9 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3cfa 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 principal matched by identity 0 +[3cfb 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3cfc 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 52 2f 6a c4 5d 56 b5 13 b8 19 e4 |0D. .R/j.]V.....| +00000010 05 79 cd 71 56 a6 ac cd c1 0d 8c b6 a3 88 03 b4 |.y.qV...........| +00000020 a8 71 fb 42 02 20 3a 1f 69 23 fa 6f 1d c2 7d ab |.q.B. :.i#.o..}.| +00000030 5e ba 09 65 cc 6b ba 02 b4 d1 a6 e9 2b e4 6f 5a |^..e.k......+.oZ| +00000040 ef ef da 1c 17 24 |.....$| +[3cfd 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[3cfe 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +[3cff 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +[3d00 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +[3d01 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[3d03 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +[3d04 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +[3d02 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 principal evaluation succeeds for identity 0 +[3d05 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d355b0 gate 1602702136768049400 evaluation succeeds +[3d06 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d07 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[3d0a 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45938 +[3d08 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d09 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3d0b 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d0c 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d0d 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[3d0e 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d0f 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3d10 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161034 +[3d11 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2283B40489F22EB1A73ADDFCDBF34647C62BB326FFD2ECD2657D3F04D49774AB +[3d12 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3d13 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3d14 10-14 19:02:16.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3d15 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d16 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +[3d17 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:1358466996781394193 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[3d18 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3d19 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3d1a 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3d1b 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[3d1c 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3d1d 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d9c0c0, CONNECTING +[3d1e 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +[3d1f 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 55ms (state_validation=11ms block_and_pvtdata_commit=14ms state_commit=16ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +[3d20 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +[3d21 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3d22 10-14 19:02:16.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d23 10-14 19:02:16.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004d9c0c0, READY +[3d24 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3d25 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3d26 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3d27 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +[3d28 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d29 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d2a 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d2b 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d2c 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d2d 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d2e 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d2f 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d30 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d31 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d32 10-14 19:02:16.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 gate 1602702136809608000 evaluation starts +[3d33 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 signed by 0 principal evaluation starts (used [false]) +[3d34 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 processing identity 0 with bytes of 115a6c0 +[3d35 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d36 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 principal evaluation fails +[3d38 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dad700 gate 1602702136809608000 evaluation fails +[3d39 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d37 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:7051 +[3d3a 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d3b 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d3c 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d3d 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d3e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d3f 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d40 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d41 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d42 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d43 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d44 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d45 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 gate 1602702136817562900 evaluation starts +[3d46 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 signed by 0 principal evaluation starts (used [false]) +[3d47 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 processing identity 0 with bytes of 115a6c0 +[3d48 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d49 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 principal evaluation fails +[3d4a 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e06dc0 gate 1602702136817562900 evaluation fails +[3d4b 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d4c 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d4d 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d4e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 gate 1602702136819808700 evaluation starts +[3d4f 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 signed by 0 principal evaluation starts (used [false]) +[3d50 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 processing identity 0 with bytes of 115a6c0 +[3d51 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 principal matched by identity 0 +[3d52 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3d53 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 46 c3 a5 2c bf 02 23 b1 a7 73 b7 |0D. .F..,..#..s.| +00000010 2a f5 cb 5b 65 04 e9 96 da 30 14 e8 41 ac 93 5b |*..[e....0..A..[| +00000020 3f 09 97 ea 02 20 0c 93 59 0f 84 75 5d c7 82 af |?.... ..Y..u]...| +00000030 83 da a0 70 8e 99 65 03 17 c9 f3 d9 9c 00 01 6b |...p..e........k| +00000040 5a ae af f7 cb ee |Z.....| +[3d54 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 principal evaluation succeeds for identity 0 +[3d55 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e07330 gate 1602702136819808700 evaluation succeeds +[3d56 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d57 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d58 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d59 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d5a 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +[3d5b 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d5c 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3d5d 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d5e 10-14 19:02:16.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d5f 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d60 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 gate 1602702136825951800 evaluation starts +[3d61 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 signed by 0 principal evaluation starts (used [false]) +[3d62 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 processing identity 0 with bytes of 115a6c0 +[3d63 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 principal matched by identity 0 +[3d64 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3d65 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 dd 1b 06 b7 df 3b ae 0f 36 79 91 |0E.!......;..6y.| +00000010 0d ce ef 87 c8 6a 45 39 2f 9c 0a 28 91 f5 8c 11 |.....jE9/..(....| +00000020 47 7b da c7 4f 02 20 7a d3 b1 f2 64 c9 a7 f3 cb |G{..O. z...d....| +00000030 e1 b8 ac 8b 86 22 eb 11 bf 85 3a 6a 8f d2 17 ab |....."....:j....| +00000040 6b 0d 6f 94 9e 2b 2b |k.o..++| +[3d66 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 principal evaluation succeeds for identity 0 +[3d67 10-14 19:02:16.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dadc70 gate 1602702136825951800 evaluation succeeds +[3d68 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d69 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d6a 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d6b 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d6c 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45938 +[3d6d 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45938 +[3d6e 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3d6f 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[3d70 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3d71 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:45938 disconnected +[3d72 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45938 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.2222ms +[3d73 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3d74 10-14 19:02:16.83 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3d75 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-10-14T19:02:18.853Z grpc.peer_address=172.18.0.7:45944 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=100.7µs +[3d76 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3d77 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3d78 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3d79 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:45944 +[3d7a 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.7:45944 +[3d7b 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d7c 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d7d 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d7e 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d7f 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3d80 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3d81 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d82 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d83 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d84 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d85 10-14 19:02:16.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3d86 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 gate 1602702136860002900 evaluation starts +[3d87 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 signed by 0 principal evaluation starts (used [false]) +[3d88 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 processing identity 0 with bytes of 115a6c0 +[3d89 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3d8a 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 principal evaluation fails +[3d8b 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e66450 gate 1602702136860002900 evaluation fails +[3d8c 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3d8d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3d8e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d8f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 gate 1602702136860979300 evaluation starts +[3d90 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 signed by 0 principal evaluation starts (used [false]) +[3d91 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 processing identity 0 with bytes of 115a6c0 +[3d92 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 principal matched by identity 0 +[3d93 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3d94 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 59 b5 d2 3e 60 fe 60 58 99 ca |0E.!..Y..>`.`X..| +00000010 26 7d a6 28 67 f0 21 b7 62 b8 6c dd 78 fd 21 3e |&}.(g.!.b.l.x.!>| +00000020 3f a0 40 d7 19 02 20 69 fb 6a 0f ee c6 7a 00 f4 |?.@... i.j...z..| +00000030 a5 59 32 68 c5 ed 96 04 d5 17 40 ea 1b b4 8f d3 |.Y2h......@.....| +00000040 c8 e0 6b 92 32 a3 50 |..k.2.P| +[3d95 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 principal evaluation succeeds for identity 0 +[3d96 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e669c0 gate 1602702136860979300 evaluation succeeds +[3d97 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3d98 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3d99 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3d9a 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3d9b 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:45944 +[3d9c 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:45944 +[3d9d 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3d9e 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d9f 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 1358466996781394193, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3da0 10-14 19:02:16.86 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3da1 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 cb f5 e7 c9 85 46 ed 5b 04 91 2b ec 81 ce a3 |1.....F.[..+....| +00000010 87 fe 2f f7 b4 bb e2 80 10 52 bb cc 4c 10 96 5e |../......R..L..^| +[3da2 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 57 c5 77 16 fb 74 95 27 77 69 94 02 |0D. W.w..t.'wi..| +00000010 d6 c8 0d e1 eb 89 0a 0f 6f 03 22 67 13 20 77 06 |........o."g. w.| +00000020 32 aa 17 ec 02 20 14 ef 68 cf 56 ed 26 fd ff 63 |2.... ..h.V.&..c| +00000030 99 c7 10 f3 2c e1 4e 00 6e a2 48 c4 62 c0 65 d4 |....,.N.n.H.b.e.| +00000040 19 3c b2 fe e4 20 |.<... | +[3da3 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3da4 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3da5 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3da6 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3da7 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3da8 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3da9 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3daa 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3dab 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 83 b4 04 89 f2 2e b1 a7 3a dd fc db f3 46 47 |"........:....FG| +00000010 c6 2b b3 26 ff d2 ec d2 65 7d 3f 04 d4 97 74 ab |.+.&....e}?...t.| +[3dac 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 d0 5b 66 88 33 8f 4d 7e dc d7 3c |0D. ..[f.3.M~..<| +00000010 fc 47 a2 e4 61 45 b5 ad 14 0f d9 5b 83 3b c3 d6 |.G..aE.....[.;..| +00000020 79 d5 a6 de 02 20 71 5d c8 14 40 b5 f1 9f 61 63 |y.... q]..@...ac| +00000030 a3 dc 76 bb b5 b2 f2 4d d4 8d 7b 13 b0 10 14 f3 |..v....M..{.....| +00000040 f5 cd 77 64 bc fe |..wd..| +[3dad 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3dae 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3daf 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3db0 10-14 19:02:16.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3db1 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db3 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db4 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db5 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[3db2 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3db6 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408F4C78CDD8AA1FC9E16...08071A0C0A0565787030321203312E30 +[3db7 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3C3EE8CFAEA39A579EB891757DA25320A31239218AFD2D9AC0DBFDE72D691CAD +[3db8 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3db9 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dba 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3dbb 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dbc 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dbd 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3dc0 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3dbe 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3dc1 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3dc2 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[3dc3 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3dc4 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004eb5ba0, CONNECTING +[3dbf 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3dc5 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc6 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3dc7 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3dc8 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3dc9 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3dca 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3dcb 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3dce 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[3dcc 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dcd 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dcf 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3dd0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dd1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dd3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[3dd4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dd5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dd6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3dd2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3dd7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3dd8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3dd9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3dda 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ddb 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ddc 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 gate 1602702137905610300 evaluation starts +[3ddd 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 signed by 0 principal evaluation starts (used [false]) +[3dde 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 processing identity 0 with bytes of 115a6c0 +[3ddf 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3de0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 principal evaluation fails +[3de1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f284d0 gate 1602702137905610300 evaluation fails +[3de2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3de3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3de4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3de5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 gate 1602702137907609300 evaluation starts +[3de6 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 signed by 0 principal evaluation starts (used [false]) +[3de7 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 processing identity 0 with bytes of 115a6c0 +[3de8 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 principal matched by identity 0 +[3de9 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3dea 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3deb 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 principal evaluation succeeds for identity 0 +[3dec 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f28a40 gate 1602702137907609300 evaluation succeeds +[3ded 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3dee 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3def 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3df0 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3df1 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df2 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df3 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3df4 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3df5 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3df6 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3df7 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3df8 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3df9 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3dfa 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3dfb 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 gate 1602702137910919900 evaluation starts +[3dfc 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 signed by 0 principal evaluation starts (used [false]) +[3dfe 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 processing identity 0 with bytes of 115a6c0 +[3dff 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3e00 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 principal evaluation fails +[3e01 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f29e30 gate 1602702137910919900 evaluation fails +[3e02 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3e03 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e04 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e05 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 gate 1602702137913338100 evaluation starts +[3e06 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 signed by 0 principal evaluation starts (used [false]) +[3e07 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 processing identity 0 with bytes of 115a6c0 +[3e08 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3e09 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3e0a 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3e0b 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 principal matched by identity 0 +[3e0c 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3e0d 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004eb5ba0, READY +[3e0e 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3e0f 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 principal evaluation succeeds for identity 0 +[3e10 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f483c0 gate 1602702137913338100 evaluation succeeds +[3e11 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e12 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e13 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e14 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e15 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dfd 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004f082c0, CONNECTING +[3e16 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3e17 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e18 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3e19 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e1a 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3e1b 10-14 19:02:17.88 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3e1c 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004f082c0, READY +[3e1d 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e1e 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3e1f 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3e20 10-14 19:02:17.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +[3e21 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +[3e22 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[3e23 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 1f 39 73 9c ac d4 cc 33 ae 9b 5d 45 c6 |0C..9s....3..]E.| +00000010 c5 cd 6a 0e 08 83 a0 f8 d1 f3 40 d5 23 f7 55 f2 |..j.......@.#.U.| +00000020 0c 74 1f 02 20 1f 0c bc b3 1b 4b b3 89 25 28 dc |.t.. .....K..%(.| +00000030 fe 8a bd b7 a3 92 91 16 fd 7e 3d 21 d6 ca f1 a9 |.........~=!....| +00000040 2d 33 7c b0 bc |-3|..| +[3e24 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[3e25 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e26 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3e27 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e28 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e29 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +[3e2a 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A\nn80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2\nz+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E\nAwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.6:7051 +[3e2b 10-14 19:02:17.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e2c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e2d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e2e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e2f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e30 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e31 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e32 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e33 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e34 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e35 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3e36 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 gate 1602702137912353700 evaluation starts +[3e37 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 signed by 0 principal evaluation starts (used [false]) +[3e38 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 processing identity 0 with bytes of 115a6c0 +[3e39 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3e3a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 principal evaluation fails +[3e3b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd84d0 gate 1602702137912353700 evaluation fails +[3e3c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3e3d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e3e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e3f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 gate 1602702137913254400 evaluation starts +[3e40 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 signed by 0 principal evaluation starts (used [false]) +[3e41 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 processing identity 0 with bytes of 115a6c0 +[3e42 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 principal matched by identity 0 +[3e43 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[3e44 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 44 cc 77 89 a1 f2 81 23 ab 1a 00 |0D. HD.w....#...| +00000010 9e 53 7e 9d 97 e3 bc 07 6d 66 3f 97 b8 7d 93 cd |.S~.....mf?..}..| +00000020 0f 45 b1 73 02 20 30 2d 36 10 c2 70 2a e2 c1 86 |.E.s. 0-6..p*...| +00000030 24 c4 9a 2f a9 19 e4 ce c0 10 88 54 ca 5a b4 f2 |$../.......T.Z..| +00000040 cf 3e 55 d4 5b be |.>U.[.| +[3e45 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 principal evaluation succeeds for identity 0 +[3e46 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fd8a40 gate 1602702137913254400 evaluation succeeds +[3e47 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e48 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e49 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e4a 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e4b 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[3e4c 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4d 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3e4e 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e4f 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e50 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3e51 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3e52 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3e53 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3e54 10-14 19:02:17.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3e55 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3e56 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3e57 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e58 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e59 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e5a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e5b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e5c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e5d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e5e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3e5f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 gate 1602702137938818800 evaluation starts +[3e60 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 signed by 0 principal evaluation starts (used [false]) +[3e61 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 processing identity 0 with bytes of 115a6c0 +[3e62 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3e63 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 principal evaluation fails +[3e64 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f49ea0 gate 1602702137938818800 evaluation fails +[3e65 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3e66 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e67 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e68 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 gate 1602702137939158700 evaluation starts +[3e69 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 signed by 0 principal evaluation starts (used [false]) +[3e6a 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 processing identity 0 with bytes of 115a6c0 +[3e6b 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 principal matched by identity 0 +[3e6c 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3e6d 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3e6e 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 principal evaluation succeeds for identity 0 +[3e6f 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffa410 gate 1602702137939158700 evaluation succeeds +[3e70 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e71 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e72 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e73 10-14 19:02:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e74 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e75 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e76 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e77 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e78 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e79 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e7a 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e7b 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3e7c 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 gate 1602702137946736800 evaluation starts +[3e7d 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 signed by 0 principal evaluation starts (used [false]) +[3e7e 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 processing identity 0 with bytes of 115a6c0 +[3e7f 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3e80 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 principal evaluation fails +[3e81 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffb610 gate 1602702137946736800 evaluation fails +[3e82 10-14 19:02:17.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3e83 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3e84 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e85 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 gate 1602702137950756200 evaluation starts +[3e86 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 signed by 0 principal evaluation starts (used [false]) +[3e87 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 processing identity 0 with bytes of 115a6c0 +[3e88 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 principal matched by identity 0 +[3e89 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3e8a 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3e8b 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 principal evaluation succeeds for identity 0 +[3e8c 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ffbb80 gate 1602702137950756200 evaluation succeeds +[3e8d 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e8e 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e8f 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e90 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e91 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e92 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e93 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e94 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3e95 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e96 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e97 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3e98 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3e99 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e9a 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3e9b 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e9d 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3e9c 10-14 19:02:17.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8c be 76 f0 d1 17 d6 1d 3f c9 6a 66 c2 24 83 c4 |..v.....?.jf.$..| +00000010 2b cb d0 be 6d 6b 02 4a 4d e1 f2 89 21 6f 89 d8 |+...mk.JM...!o..| +[3e9e 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 38 31 78 b1 e5 24 89 44 7f 5f |0E.!..81x..$.D._| +00000010 3b b2 86 61 6e c7 50 2a 68 2b 63 ee 52 41 94 7c |;..an.P*h+c.RA.|| +00000020 fd 4e 45 23 41 02 20 00 d8 cd 40 42 77 db 6b 18 |.NE#A. ...@Bw.k.| +00000030 26 df 8e c2 5b c4 78 62 ae d3 5b 0d a1 c9 63 88 |&...[.xb..[...c.| +00000040 2d df 38 1a 14 c5 2d |-.8...-| +[3e9f 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c f4 88 84 18 d1 ce 84 75 0b 76 fc 4e 97 ea 94 |........u.v.N...| +00000010 3d 56 49 99 bf a6 7f 5c 53 cc 43 d8 26 7a da dd |=VI....\S.C.&z..| +[3ea0 10-14 19:02:17.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 52 d3 cb 1a bc 8f be 06 7e 33 |0E.!..R.......~3| +00000010 77 de 41 ea 48 4c 29 14 14 ef 58 05 28 81 b4 b9 |w.A.HL)...X.(...| +00000020 a1 52 fb 89 cc 02 20 7b a7 12 83 57 e4 80 83 6b |.R.... {...W...k| +00000030 3e 6a 8c d7 4b 79 88 0e a5 f1 8b 7d 49 4d b9 3f |>j..Ky.....}IM.?| +00000040 2a e4 27 d5 14 02 6b |*.'...k| +[3ea1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ea2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ea3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ea4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ea5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ea6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ea7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ea8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ea9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 gate 1602702137974297200 evaluation starts +[3eaa 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 signed by 0 principal evaluation starts (used [false]) +[3eab 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 processing identity 0 with bytes of 115a6c0 +[3eac 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ead 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 principal evaluation fails +[3eae 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501ddc0 gate 1602702137974297200 evaluation fails +[3eaf 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3eb0 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3eb1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3eb2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 gate 1602702137975831900 evaluation starts +[3eb3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 signed by 0 principal evaluation starts (used [false]) +[3eb4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 processing identity 0 with bytes of 115a6c0 +[3eb5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 principal matched by identity 0 +[3eb6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 bc d2 9f 9c 60 43 c2 49 a4 9c 55 c6 c5 2a 91 |.....`C.I..U..*.| +00000010 0f 86 8f 36 fc 87 97 fa 5f 22 1e 4b a7 cd c4 25 |...6...._".K...%| +[3eb7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d3 58 ea d7 a5 ec 37 b8 63 d1 cb |0D. 3.X....7.c..| +00000010 1d df 5f e5 33 73 05 9d 61 94 e5 82 a5 97 e9 3b |.._.3s..a......;| +00000020 de aa 5a 93 02 20 4d 77 f5 fd d2 84 54 65 eb ad |..Z.. Mw....Te..| +00000030 95 0a 20 ee 90 d7 f1 b1 ab c9 87 fd fe 2e d5 ec |.. .............| +00000040 3a 97 fa 76 08 75 |:..v.u| +[3eb8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 principal evaluation succeeds for identity 0 +[3eb9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503a330 gate 1602702137975831900 evaluation succeeds +[3eba 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ebb 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ebc 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ebd 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ebe 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ebf 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ec0 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ec1 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ec2 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ec3 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ec4 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ec5 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ec6 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 gate 1602702137979566100 evaluation starts +[3ec7 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 signed by 0 principal evaluation starts (used [false]) +[3ec8 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 processing identity 0 with bytes of 115a6c0 +[3ec9 10-14 19:02:17.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3eca 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 principal evaluation fails +[3ecb 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503b530 gate 1602702137979566100 evaluation fails +[3ecc 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ecd 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ece 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ecf 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 gate 1602702137980753700 evaluation starts +[3ed0 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 signed by 0 principal evaluation starts (used [false]) +[3ed1 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 processing identity 0 with bytes of 115a6c0 +[3ed2 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 principal matched by identity 0 +[3ed3 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 55 25 26 0f eb 27 74 c7 b1 34 ee 90 bb 10 1f |1U%&..'t..4.....| +00000010 5f c1 09 1f 06 7e e6 c4 dd 74 43 c9 2a 30 a7 8e |_....~...tC.*0..| +[3ed4 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d8 bf b8 fc 90 32 23 fb 27 cd d5 |0E.!......2#.'..| +00000010 74 1c 59 ed 14 8a b1 15 e7 f8 e7 ac 09 6b d0 55 |t.Y..........k.U| +00000020 91 f9 35 4b e3 02 20 5f bf 61 44 9e 1b 8f f1 72 |..5K.. _.aD....r| +00000030 3e 25 d3 3c ff d4 85 39 8a 1d f6 53 ac 81 c5 56 |>%.<...9...S...V| +00000040 2b 05 28 f4 f6 3b 84 |+.(..;.| +[3ed5 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 principal evaluation succeeds for identity 0 +[3ed6 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00503baa0 gate 1602702137980753700 evaluation succeeds +[3ed7 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ed8 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ed9 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3eda 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3edb 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3edc 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3edd 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[3ede 10-14 19:02:17.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3edf 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3ee0 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3ee1 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee2 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee3 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee4 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee5 10-14 19:02:18.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee6 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ee7 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3ee8 10-14 19:02:18.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ee9 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3eea 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3eeb 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3eec 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3eed 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3eee 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3eef 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ef0 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ef1 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3ef2 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3ef3 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ef4 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 gate 1602702138158144300 evaluation starts +[3ef5 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 signed by 0 principal evaluation starts (used [false]) +[3ef6 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 processing identity 0 with bytes of 115a6c0 +[3ef7 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ef8 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 principal evaluation fails +[3ef9 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050557b0 gate 1602702138158144300 evaluation fails +[3efa 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3efb 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3efc 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3efd 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 gate 1602702138158771200 evaluation starts +[3efe 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 signed by 0 principal evaluation starts (used [false]) +[3eff 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 processing identity 0 with bytes of 115a6c0 +[3f00 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 principal matched by identity 0 +[3f01 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +[3f02 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +[3f03 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 principal evaluation succeeds for identity 0 +[3f04 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005055d20 gate 1602702138158771200 evaluation succeeds +[3f05 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f06 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f07 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f08 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f09 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3f0a 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3f0b 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f0c 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f0d 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3f0e 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f0f 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f10 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f11 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[3f12 10-14 19:02:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f13 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f14 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f15 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3f16 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\002 \007\267\245\251\223%\033\311A\270\025bF\350D\022\245\260\361\217Y>\367\255\326Oi\360\215;\320\252" > alive: +[3f17 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3f18 10-14 19:02:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f19 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3f1a 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3f1b 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3f1c 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1d 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1e 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f1f 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f20 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f21 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f22 10-14 19:02:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3f23 10-14 19:02:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f24 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3f25 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[3f26 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[3f27 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f28 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f29 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f2a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f2b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f2c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f2d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f2e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[3f2f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 gate 1602702138263336000 evaluation starts +[3f30 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 signed by 0 principal evaluation starts (used [false]) +[3f31 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 processing identity 0 with bytes of 115a6c0 +[3f32 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[3f33 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[3f34 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[3f35 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 principal matched by identity 0 +[3f36 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[3f37 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[3f38 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 principal evaluation succeeds for identity 0 +[3f39 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a81e0 gate 1602702138263336000 evaluation succeeds +[3f3a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3f3b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f3c 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f3d 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f3e 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f3f 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f40 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f41 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[3f42 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f43 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f44 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3f45 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f46 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3f47 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f48 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3f49 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3f4a 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[3f4b 10-14 19:02:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[3f4c 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f4d 10-14 19:02:18.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f4e 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3f4f 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3f50 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f51 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3f52 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3f53 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f54 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f55 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f56 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f57 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f58 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f59 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f5a 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 gate 1602702138289085700 evaluation starts +[3f5b 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 signed by 0 principal evaluation starts (used [false]) +[3f5c 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 processing identity 0 with bytes of 115a6c0 +[3f5d 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3f5e 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 principal evaluation fails +[3f5f 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da420 gate 1602702138289085700 evaluation fails +[3f60 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3f61 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f62 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f63 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 gate 1602702138289798500 evaluation starts +[3f64 10-14 19:02:18.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 signed by 0 principal evaluation starts (used [false]) +[3f65 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 processing identity 0 with bytes of 115a6c0 +[3f66 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 principal matched by identity 0 +[3f67 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +[3f68 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +00000040 93 c7 3a a4 5c c6 |..:.\.| +[3f69 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 principal evaluation succeeds for identity 0 +[3f6a 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050da990 gate 1602702138289798500 evaluation succeeds +[3f6b 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f6c 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f6d 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f6e 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f6f 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f70 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3f71 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f72 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f73 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3f74 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f75 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f76 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f77 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3f78 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f79 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7a 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f7b 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3f7c 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3f7d 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3f7e 10-14 19:02:18.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f7f 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[3f80 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[3f81 10-14 19:02:18.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[3f82 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3f83 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3f84 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3f85 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3f86 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3f87 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3f88 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3f89 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8a 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3f8c 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8b 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3f8d 10-14 19:02:18.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f8e 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f8f 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f90 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f91 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f92 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f93 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3f94 10-14 19:02:18.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f95 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f96 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f97 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f98 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f99 10-14 19:02:18.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f9a 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3f9b 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f9c 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f9d 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f9e 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f9f 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fa0 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fa1 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3fa2 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 gate 1602702138579128100 evaluation starts +[3fa3 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 signed by 0 principal evaluation starts (used [false]) +[3fa4 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 processing identity 0 with bytes of 115a6c0 +[3fa5 10-14 19:02:18.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3fa6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 principal evaluation fails +[3fa7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fd8c0 gate 1602702138579128100 evaluation fails +[3fa8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3fa9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3faa 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3fab 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 gate 1602702138580846600 evaluation starts +[3fac 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 signed by 0 principal evaluation starts (used [false]) +[3fad 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 processing identity 0 with bytes of 115a6c0 +[3fae 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 principal matched by identity 0 +[3faf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[3fb0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[3fb1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 principal evaluation succeeds for identity 0 +[3fb2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050fde30 gate 1602702138580846600 evaluation succeeds +[3fb3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3fb4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3fb5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3fb6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3fb7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fb8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fb9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fba 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3fbb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fbc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fbd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3fbe 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 gate 1602702138581484800 evaluation starts +[3fbf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 signed by 0 principal evaluation starts (used [false]) +[3fc0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 processing identity 0 with bytes of 115a6c0 +[3fc1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3fc2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 principal evaluation fails +[3fc3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ea20 gate 1602702138581484800 evaluation fails +[3fc4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3fc5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3fc6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3fc7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 gate 1602702138584067400 evaluation starts +[3fc8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 signed by 0 principal evaluation starts (used [false]) +[3fc9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 processing identity 0 with bytes of 115a6c0 +[3fca 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 principal matched by identity 0 +[3fcb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[3fcc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[3fcd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 principal evaluation succeeds for identity 0 +[3fce 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00511ef90 gate 1602702138584067400 evaluation succeeds +[3fcf 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3fd0 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3fd1 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3fd2 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3fd3 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fd4 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd5 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd6 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +[3fd7 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd8 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fd9 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3fda 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdb 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3fdc 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdd 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3fde 10-14 19:02:18.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3fdf 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3fe0 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fe1 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3fe2 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[3fe3 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe4 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3fe5 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fe6 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3fe7 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fe8 10-14 19:02:18.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fe9 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3fea 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 gate 1602702138600484000 evaluation starts +[3feb 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 signed by 0 principal evaluation starts (used [false]) +[3fec 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 processing identity 0 with bytes of 115a6c0 +[3fed 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3fee 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 principal evaluation fails +[3fef 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131390 gate 1602702138600484000 evaluation fails +[3ff0 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ff1 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ff2 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ff3 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 gate 1602702138602790500 evaluation starts +[3ff4 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 signed by 0 principal evaluation starts (used [false]) +[3ff5 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 processing identity 0 with bytes of 115a6c0 +[3ff7 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 principal matched by identity 0 +[3ff6 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ff8 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161035 +[3ff9 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DB6128421050D540350C3A6B41F935DB070C52B5B53CBCA29845B3A2ACD3D8EA +[3ffa 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ffc 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3ffd 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3ffb 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[3ffe 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[3fff 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4000 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4001 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4002 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 principal evaluation succeeds for identity 0 +[4003 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4004 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005131900 gate 1602702138602790500 evaluation succeeds +[4005 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4006 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4007 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4008 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4009 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[400a 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[400b 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[400c 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[400d 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[400e 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[400f 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4010 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4011 10-14 19:02:18.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4012 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4013 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4014 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4015 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4016 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4017 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4018 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4019 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[401a 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[401b 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[401c 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[401d 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[401e 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 gate 1602702138616833200 evaluation starts +[401f 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 signed by 0 principal evaluation starts (used [false]) +[4020 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 processing identity 0 with bytes of 115a6c0 +[4021 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4022 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 principal evaluation fails +[4023 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d200 gate 1602702138616833200 evaluation fails +[4024 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4025 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4026 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4027 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 gate 1602702138617071500 evaluation starts +[4028 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 signed by 0 principal evaluation starts (used [false]) +[4029 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 processing identity 0 with bytes of 115a6c0 +[402a 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 principal matched by identity 0 +[402b 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 ee f4 50 85 78 85 5b 99 71 17 2b 1c 13 87 15 |...P.x.[.q.+....| +00000010 ae 09 61 ed 38 9d 5a e9 66 52 e4 32 ea ab af 4e |..a.8.Z.fR.2...N| +[402c 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 1f 86 dd 97 22 ba ed 28 f6 e2 |0E.!......"..(..| +00000010 15 4a 3f cc f6 74 5f ee 56 cb ad d9 11 6a 06 7c |.J?..t_.V....j.|| +00000020 3b d7 fb f5 12 02 20 52 d0 30 c7 6a 12 80 65 92 |;..... R.0.j..e.| +00000030 eb 72 40 fd f2 e2 5b 9f d5 59 83 e2 63 f2 48 39 |.r@...[..Y..c.H9| +00000040 3d b7 57 6b 87 e3 f0 |=.Wk...| +[402d 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 principal evaluation succeeds for identity 0 +[402e 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00515d770 gate 1602702138617071500 evaluation succeeds +[402f 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4030 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4031 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4032 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4033 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4034 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4035 10-14 19:02:18.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4036 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +[4037 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +00000040 95 6b b7 20 3f 79 |.k. ?y| +[4038 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4039 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[403a 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[403b 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[403c 10-14 19:02:18.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +[403d 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +[403e 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[403f 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4040 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4041 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4042 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4043 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4044 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4045 10-14 19:02:18.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4046 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4047 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4048 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4049 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[404a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[404b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +[404c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +00000040 95 6b b7 20 3f 79 |.k. ?y| +[404d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[404e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d3 e7 f3 ed 51 49 52 b6 94 7c 23 |0D. w....QIR..|#| +00000010 e2 b6 6e d7 e6 f3 f0 74 5d 1f c2 f9 18 ad 87 dc |..n....t].......| +00000020 07 7d cd 95 02 20 22 1e 0f 03 99 71 c5 5b da 82 |.}... "....q.[..| +00000030 36 32 6d f2 0b 0f 04 e4 1e 6d 4e 7f de 2d 25 70 |62m......mN..-%p| +00000040 3f 84 3f 9d 16 de |?.?...| +[404f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4050 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4051 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4052 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4053 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4054 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4055 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4056 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4057 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4058 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4059 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[405a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[405b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[405c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[405d 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[405e 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 gate 1602702138669390400 evaluation starts +[405f 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 signed by 0 principal evaluation starts (used [false]) +[4060 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 processing identity 0 with bytes of 115a6c0 +[4061 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4062 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 principal evaluation fails +[4063 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b4370 gate 1602702138669390400 evaluation fails +[4064 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4065 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4066 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4067 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 gate 1602702138669778300 evaluation starts +[4068 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 signed by 0 principal evaluation starts (used [false]) +[4069 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 processing identity 0 with bytes of 115a6c0 +[406a 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 principal matched by identity 0 +[406b 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b e4 af dc 6c 2d cc 6c 5b af 32 e8 e7 23 31 9e |k...l-.l[.2..#1.| +00000010 79 37 79 95 87 fe c2 b3 f7 87 3f 45 39 0c 8e 6f |y7y.......?E9..o| +[406c 10-14 19:02:18.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 1e c5 3a 0e 0b 00 24 39 7c e1 c4 |0D. ...:...$9|..| +00000010 e6 38 3d c0 cd 18 2a d2 1c 7a 58 b5 45 6d ed 94 |.8=...*..zX.Em..| +00000020 fd f2 e1 cd 02 20 36 4a dc cb 1b b1 67 27 fc 0f |..... 6J....g'..| +00000030 ed a7 e8 60 fa f1 8c a2 69 be d3 1b 15 78 2a 98 |...`....i....x*.| +00000040 93 c7 3a a4 5c c6 |..:.\.| +[406d 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 principal evaluation succeeds for identity 0 +[406e 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051b48e0 gate 1602702138669778300 evaluation succeeds +[406f 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4070 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4071 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4072 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4073 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4074 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4075 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4076 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 19 e4 8b 93 13 c4 3a 9a c8 b1 9a 9b ab 0a 20 73 |......:....... s| +00000010 d8 7b 3e eb 43 62 93 16 2b 74 de 0e f2 57 7c 70 |.{>.Cb..+t...W|p| +[4077 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 52 ad 90 53 78 47 bc e5 77 58 |0E.!..R..SxG..wX| +00000010 88 80 47 b9 71 c0 5f 6c a5 23 fc 3a e9 7c 92 9e |..G.q._l.#.:.|..| +00000020 86 d6 3e ad a7 02 20 35 6a 2b 46 e2 ba 42 4a 8e |..>... 5j+F..BJ.| +00000030 84 91 2e f4 17 75 7c d0 4c 4b b1 ae 5b 51 27 18 |.....u|.LK..[Q'.| +00000040 8f 61 6c 63 ae 39 e8 |.alc.9.| +[4078 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4079 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407a 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[407b 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db 61 28 42 10 50 d5 40 35 0c 3a 6b 41 f9 35 db |.a(B.P.@5.:kA.5.| +00000010 07 0c 52 b5 b5 3c bc a2 98 45 b3 a2 ac d3 d8 ea |..R..<...E......| +[407c 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 7a d7 87 9c 88 26 d6 ad d0 ef 57 |0D. Az....&....W| +00000010 45 a6 2a e0 dc 8e a4 dc 9a 9b 2b 9c 99 88 23 3d |E.*.......+...#=| +00000020 df 8f e8 3d 02 20 79 8e a4 39 ab ee 92 f2 16 f2 |...=. y..9......| +00000030 32 2d f4 f6 7d 8e af c0 38 ce 3f 6d 7a 93 20 ef |2-..}...8.?mz. .| +00000040 95 6b b7 20 3f 79 |.k. ?y| +[407d 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[407e 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[407f 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4080 10-14 19:02:18.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4081 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4082 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4083 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4084 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4085 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4086 10-14 19:02:18.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4087 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[4088 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[4089 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[408a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[408b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[408c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[408d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[408e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[408f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4090 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 gate 1602702138918919400 evaluation starts +[4091 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 signed by 0 principal evaluation starts (used [false]) +[4092 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 processing identity 0 with bytes of 115a6c0 +[4093 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4094 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 principal evaluation fails +[4095 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051da4e0 gate 1602702138918919400 evaluation fails +[4096 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4097 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4098 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4099 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 gate 1602702138919264000 evaluation starts +[409a 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 signed by 0 principal evaluation starts (used [false]) +[409b 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 processing identity 0 with bytes of 115a6c0 +[409c 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 principal matched by identity 0 +[409d 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[409e 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[409f 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 principal evaluation succeeds for identity 0 +[40a0 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051daa50 gate 1602702138919264000 evaluation succeeds +[40a1 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40a2 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40a3 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40a4 10-14 19:02:18.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40a5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40a7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40a8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40a9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40aa 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40ab 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[40ac 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 gate 1602702138920360000 evaluation starts +[40ad 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 signed by 0 principal evaluation starts (used [false]) +[40ae 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 processing identity 0 with bytes of 115a6c0 +[40af 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[40b0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 principal evaluation fails +[40b1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051db640 gate 1602702138920360000 evaluation fails +[40b2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[40b3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40b4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40b5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 gate 1602702138925977700 evaluation starts +[40b6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 signed by 0 principal evaluation starts (used [false]) +[40b7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 processing identity 0 with bytes of 115a6c0 +[40b8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 principal matched by identity 0 +[40b9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[40ba 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[40bb 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[40bc 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 principal evaluation succeeds for identity 0 +[40bd 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051dbbb0 gate 1602702138925977700 evaluation succeeds +[40be 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40bf 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40c0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40c1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40c2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40c3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[40c4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[40c6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40c7 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40c8 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40c9 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40ca 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[40cb 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 gate 1602702138927209700 evaluation starts +[40cc 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 signed by 0 principal evaluation starts (used [false]) +[40cd 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 processing identity 0 with bytes of 115a6c0 +[40ce 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[40cf 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 principal evaluation fails +[40d0 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f8e60 gate 1602702138927209700 evaluation fails +[40d1 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[40d2 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40d3 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40d4 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 gate 1602702138927533300 evaluation starts +[40d5 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 signed by 0 principal evaluation starts (used [false]) +[40d6 10-14 19:02:18.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 processing identity 0 with bytes of 115a6c0 +[40d8 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 principal matched by identity 0 +[40d9 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[40d7 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40da 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[40db 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 principal evaluation succeeds for identity 0 +[40dc 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051f93d0 gate 1602702138927533300 evaluation succeeds +[40dd 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40de 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40df 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +[40e0 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40e1 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e2 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40e5 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40e6 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[40e7 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e8 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e3 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e4 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[40e9 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ea 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[40eb 10-14 19:02:18.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ec 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[40ed 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40ee 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40ef 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40f0 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40f1 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[40f2 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 gate 1602702138941284700 evaluation starts +[40f3 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 signed by 0 principal evaluation starts (used [false]) +[40f4 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 processing identity 0 with bytes of 115a6c0 +[40f5 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[40f6 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 principal evaluation fails +[40f7 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052286a0 gate 1602702138941284700 evaluation fails +[40f8 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[40f9 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40fa 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40fb 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 gate 1602702138946376900 evaluation starts +[40fc 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 signed by 0 principal evaluation starts (used [false]) +[40fd 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 processing identity 0 with bytes of 115a6c0 +[40fe 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 principal matched by identity 0 +[40ff 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4100 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4101 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 principal evaluation succeeds for identity 0 +[4102 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005228c10 gate 1602702138946376900 evaluation succeeds +[4103 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4104 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4105 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4106 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4107 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4108 10-14 19:02:18.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4109 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[410a 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[410b 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[410c 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[410d 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[410e 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[410f 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4110 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4111 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4112 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4113 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4114 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 gate 1602702140107719100 evaluation starts +[4115 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 signed by 0 principal evaluation starts (used [false]) +[4116 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 processing identity 0 with bytes of 115a6c0 +[4117 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4118 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 principal evaluation fails +[4119 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005246160 gate 1602702140107719100 evaluation fails +[411a 10-14 19:02:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[411b 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[411c 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[411d 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 gate 1602702140110825600 evaluation starts +[411e 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 signed by 0 principal evaluation starts (used [false]) +[411f 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 processing identity 0 with bytes of 115a6c0 +[4120 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 principal matched by identity 0 +[4121 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 f6 93 99 69 05 e0 ec 05 31 9b 69 e4 6a b0 89 |P...i....1.i.j..| +00000010 58 43 4d b9 53 c6 69 38 bd 90 d2 13 78 1b 1f d9 |XCM.S.i8....x...| +[4122 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 01 6b 5d 3e 35 a2 c2 de 0d 32 ec |0D. p.k]>5....2.| +00000010 56 d9 eb 08 72 bb 29 d1 82 6c 50 3a b7 f6 57 e3 |V...r.)..lP:..W.| +00000020 ba e2 77 d5 02 20 63 68 15 0d 98 41 bf a4 ec 4c |..w.. ch...A...L| +00000030 f2 ff 4b 5e 19 32 3b 57 b8 a5 e8 87 77 67 75 72 |..K^.2;W....wgur| +00000040 9e cc a6 f4 df 3e |.....>| +[4123 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 principal evaluation succeeds for identity 0 +[4124 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052466d0 gate 1602702140110825600 evaluation succeeds +[4125 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4126 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4127 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4128 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4129 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[412a 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[412b 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[412c 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[412d 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[412e 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[412f 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4130 10-14 19:02:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4131 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4132 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4133 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4134 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4135 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4136 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4137 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4138 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4139 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[413a 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[413b 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413c 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413d 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413e 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413f 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4140 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4141 10-14 19:02:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4142 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4143 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4144 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4145 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4146 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4147 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4148 10-14 19:02:20.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4149 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[414a 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[414b 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[414c 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[414d 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[414e 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[414f 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4150 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4151 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4152 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4153 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4154 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4155 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 gate 1602702140216099100 evaluation starts +[4156 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 signed by 0 principal evaluation starts (used [false]) +[4157 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 processing identity 0 with bytes of 115a6c0 +[4158 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4159 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 principal evaluation fails +[415a 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527c5a0 gate 1602702140216099100 evaluation fails +[415b 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[415c 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[415d 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[415e 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 gate 1602702140217850800 evaluation starts +[415f 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 signed by 0 principal evaluation starts (used [false]) +[4160 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 processing identity 0 with bytes of 115a6c0 +[4161 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 principal matched by identity 0 +[4162 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 7c 5c e9 97 f2 cb c1 4f 81 a9 58 32 6d 12 82 |t|\.....O..X2m..| +00000010 09 f5 4b 2b e2 78 58 d5 cf c2 a9 c5 79 ae 9b a2 |..K+.xX.....y...| +[4163 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 59 8b 03 85 c3 cf c9 71 9c aa |0E.!..Y......q..| +00000010 e2 9c b6 70 68 f5 fb f8 18 fa 46 f9 ea 49 49 63 |...ph.....F..IIc| +00000020 07 99 0a 49 54 02 20 05 c9 85 a3 59 b7 af 1a 2c |...IT. ....Y...,| +00000030 a5 a8 e8 25 98 35 8f 33 bb ef a8 a9 eb 18 ac 89 |...%.5.3........| +00000040 58 fe 10 49 12 f3 01 |X..I...| +[4164 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 principal evaluation succeeds for identity 0 +[4165 10-14 19:02:20.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00527cb10 gate 1602702140217850800 evaluation succeeds +[4166 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4167 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4168 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4169 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[416a 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[416b 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[416c 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[416d 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[416e 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[416f 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4170 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4171 10-14 19:02:20.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4172 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4173 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4174 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4175 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4177 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4176 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4178 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[417a 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4179 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[417b 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417c 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417d 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417e 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417f 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4180 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4181 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4182 10-14 19:02:20.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4183 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4184 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4185 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4186 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4187 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4188 10-14 19:02:20.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4189 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[418a 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[418b 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[418c 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[418d 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[418e 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b 32 67 85 ff 47 af 20 ff 06 2c 2e 97 a3 f4 26 |.2g..G. ..,....&| +00000010 d2 36 9e bb 3d 43 7e 64 be 4d 75 0b 7b 29 28 ce |.6..=C~d.Mu.{)(.| +[418f 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f5 f7 1f 36 a6 82 14 b6 a3 06 2e |0E.!....6.......| +00000010 81 8e 2f b8 3d d2 43 41 5a cd 1b f4 f9 ba ad 8c |../.=.CAZ.......| +00000020 09 6a 45 ed 1d 02 20 2c e3 e7 51 be 84 a8 e1 5d |.jE... ,..Q....]| +00000030 fc 06 41 31 3b fc 07 82 c5 92 f4 77 1b 36 73 24 |..A1;......w.6s$| +00000040 be 1a e1 bb 6f 9e 2b |....o.+| +[4190 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4191 10-14 19:02:20.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4192 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4193 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4194 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4195 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4196 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4197 10-14 19:02:20.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4198 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4199 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419a 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419b 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[419c 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[419d 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[419e 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[419f 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a0 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41a1 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a2 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41a3 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41a4 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a5 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41a6 10-14 19:02:20.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a7 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41a8 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a9 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41aa 10-14 19:02:20.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ab 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[41ac 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161036 +[41ad 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4EF506DEE83FBDA0812F792FA30B2F1891EABA0CD90B46F76FEEDABE6510EC0C +[41ae 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[41af 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[41b0 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[41b1 10-14 19:02:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[41b2 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b3 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b4 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b5 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[41b6 10-14 19:02:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[41b7 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b8 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[41b9 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41bb 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ba 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41bc 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41bd 10-14 19:02:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41be 10-14 19:02:20.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41bf 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c0 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41c1 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[41c2 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41c4 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c5 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41c6 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c3 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[41c7 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41c8 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[41c9 10-14 19:02:21.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41ca 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[41cb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[41cc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[41cd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[41ce 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[41cf 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[41d0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41d1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41d2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41d3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41d4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41d5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41d6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41d7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[41d8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 gate 1602702141863695000 evaluation starts +[41d9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 signed by 0 principal evaluation starts (used [false]) +[41da 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 processing identity 0 with bytes of 115a6c0 +[41db 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[41dc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 principal evaluation fails +[41dd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2650 gate 1602702141863695000 evaluation fails +[41de 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[41df 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[41e0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41e1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 gate 1602702141864568200 evaluation starts +[41e2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 signed by 0 principal evaluation starts (used [false]) +[41e3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 processing identity 0 with bytes of 115a6c0 +[41e4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 principal matched by identity 0 +[41e5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[41e6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[41e7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 principal evaluation succeeds for identity 0 +[41e8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f2bc0 gate 1602702141864568200 evaluation succeeds +[41e9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[41ea 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[41eb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[41ec 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[41ed 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41ee 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41ef 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41f0 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41f1 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41f2 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41f3 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41f4 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[41f5 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 gate 1602702141867076500 evaluation starts +[41f6 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 signed by 0 principal evaluation starts (used [false]) +[41f7 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 processing identity 0 with bytes of 115a6c0 +[41f8 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[41f9 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 principal evaluation fails +[41fa 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052f3dc0 gate 1602702141867076500 evaluation fails +[41fb 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[41fc 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[41fd 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41fe 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 gate 1602702141868942500 evaluation starts +[41ff 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 signed by 0 principal evaluation starts (used [false]) +[4200 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 processing identity 0 with bytes of 115a6c0 +[4201 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 principal matched by identity 0 +[4202 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4203 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4204 10-14 19:02:21.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 principal evaluation succeeds for identity 0 +[4205 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00530e330 gate 1602702141868942500 evaluation succeeds +[4206 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4207 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4208 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4209 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[420a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[420b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[420c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[420d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[420e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[420f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[4210 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4211 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4212 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4213 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4214 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4215 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4216 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4217 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4218 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 gate 1602702141873907700 evaluation starts +[4219 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 signed by 0 principal evaluation starts (used [false]) +[421a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 processing identity 0 with bytes of 115a6c0 +[421b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[421c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 principal evaluation fails +[421d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053324b0 gate 1602702141873907700 evaluation fails +[421e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[421f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4220 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4221 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 gate 1602702141875538900 evaluation starts +[4222 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 signed by 0 principal evaluation starts (used [false]) +[4223 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 processing identity 0 with bytes of 115a6c0 +[4224 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 principal matched by identity 0 +[4225 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[4226 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4227 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 principal evaluation succeeds for identity 0 +[4228 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005332a20 gate 1602702141875538900 evaluation succeeds +[4229 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[422a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[422b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[422c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[422d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[422e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[422f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4230 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4231 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4232 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4233 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4234 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4235 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 gate 1602702141877130400 evaluation starts +[4236 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 signed by 0 principal evaluation starts (used [false]) +[4237 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 processing identity 0 with bytes of 115a6c0 +[4238 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4239 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 principal evaluation fails +[423a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005333c20 gate 1602702141877130400 evaluation fails +[423b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[423c 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[423d 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[423e 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 gate 1602702141877374500 evaluation starts +[423f 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 signed by 0 principal evaluation starts (used [false]) +[4240 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 processing identity 0 with bytes of 115a6c0 +[4241 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 principal matched by identity 0 +[4242 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4243 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4244 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 principal evaluation succeeds for identity 0 +[4245 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005348190 gate 1602702141877374500 evaluation succeeds +[4246 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4247 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4248 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4249 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[424a 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[424b 10-14 19:02:21.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[424c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[424d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[424e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[424f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[4250 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[4251 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4252 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4253 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4254 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4255 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4256 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4257 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4258 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4259 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 gate 1602702141883309600 evaluation starts +[425a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 signed by 0 principal evaluation starts (used [false]) +[425b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 processing identity 0 with bytes of 115a6c0 +[425c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[425d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 principal evaluation fails +[425e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053663c0 gate 1602702141883309600 evaluation fails +[425f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4260 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4261 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4262 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 gate 1602702141884315500 evaluation starts +[4263 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 signed by 0 principal evaluation starts (used [false]) +[4264 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 processing identity 0 with bytes of 115a6c0 +[4265 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 principal matched by identity 0 +[4266 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[4267 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4268 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 principal evaluation succeeds for identity 0 +[4269 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366930 gate 1602702141884315500 evaluation succeeds +[426a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[426b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[426c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[426d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[426e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[426f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4270 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4271 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4272 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4273 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4274 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4275 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4276 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 gate 1602702141886781400 evaluation starts +[4277 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 signed by 0 principal evaluation starts (used [false]) +[4278 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 processing identity 0 with bytes of 115a6c0 +[4279 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[427a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 principal evaluation fails +[427b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367b30 gate 1602702141886781400 evaluation fails +[427c 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[427d 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[427e 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[427f 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 gate 1602702141887380800 evaluation starts +[4280 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 signed by 0 principal evaluation starts (used [false]) +[4281 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 processing identity 0 with bytes of 115a6c0 +[4282 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 principal matched by identity 0 +[4283 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4284 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4285 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 principal evaluation succeeds for identity 0 +[4286 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053800a0 gate 1602702141887380800 evaluation succeeds +[4287 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4288 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4289 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[428a 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[428b 10-14 19:02:21.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[428c 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[428d 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[428e 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[428f 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4290 10-14 19:02:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4291 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4292 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4293 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4294 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4295 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4296 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4297 10-14 19:02:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4298 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4299 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[429a 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429b 10-14 19:02:22.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429c 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429d 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429e 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[429f 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42a0 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[42a1 10-14 19:02:22.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42a2 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +[42a3 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42a4 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > > , Envelope: 165 bytes, Signature: 0 bytes +[42a5 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[42a6 10-14 19:02:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42a7 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42a8 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42a9 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42aa 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42ab 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42ac 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42ad 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 gate 1602702142177957500 evaluation starts +[42ae 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 signed by 0 principal evaluation starts (used [false]) +[42af 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 processing identity 0 with bytes of 115a6c0 +[42b0 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42b1 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 principal evaluation fails +[42b2 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00529db90 gate 1602702142177957500 evaluation fails +[42b3 10-14 19:02:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42b4 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42b5 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42b6 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 gate 1602702142193429000 evaluation starts +[42b7 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 signed by 0 principal evaluation starts (used [false]) +[42b8 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 processing identity 0 with bytes of 115a6c0 +[42b9 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 principal matched by identity 0 +[42ba 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +[42bb 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +00000040 6a cb ea af 6c ec |j...l.| +[42bc 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 principal evaluation succeeds for identity 0 +[42bd 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053ac100 gate 1602702142193429000 evaluation succeeds +[42be 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42bf 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42c0 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42c1 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42c2 10-14 19:02:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[42c3 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[42c4 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[42c5 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[42c6 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[42c7 10-14 19:02:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42c8 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42c9 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42ca 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[42cb 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42cc 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42cd 10-14 19:02:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42ce 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[42d0 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: alive: +[42d1 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[42d2 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42cf 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[42d3 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[42d4 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[42d5 10-14 19:02:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42d6 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[42d7 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42d8 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42d9 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42da 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42db 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42dc 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[42dd 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42de 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[42df 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e0 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e1 10-14 19:02:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e2 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42e3 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42e4 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42e5 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[42e6 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[42e7 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42e8 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42e9 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42ea 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42eb 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42ec 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42ed 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42ee 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 gate 1602702142287927000 evaluation starts +[42ef 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 signed by 0 principal evaluation starts (used [false]) +[42f0 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 processing identity 0 with bytes of 115a6c0 +[42f1 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42f2 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 principal evaluation fails +[42f3 10-14 19:02:22.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d8b40 gate 1602702142287927000 evaluation fails +[42f4 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42f5 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42f6 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42f7 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 gate 1602702142290923600 evaluation starts +[42f8 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 signed by 0 principal evaluation starts (used [false]) +[42f9 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 processing identity 0 with bytes of 115a6c0 +[42fa 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 principal matched by identity 0 +[42fb 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +[42fc 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +00000040 6c a0 1b 6c 6b 34 |l..lk4| +[42fd 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 principal evaluation succeeds for identity 0 +[42fe 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053d90b0 gate 1602702142290923600 evaluation succeeds +[42ff 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4300 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4301 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4302 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4303 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4304 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4305 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4306 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4307 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4308 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4309 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[430a 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[430b 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[430c 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[430d 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[430e 10-14 19:02:22.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[430f 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[4310 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\t\221aL-e\206\254\177b\203\315\242\250\313A\313zi\026\001\246~j\313\352\257l\354" > alive: +[4311 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4312 10-14 19:02:22.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4313 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4314 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4315 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4316 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4317 10-14 19:02:22.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4318 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4319 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[431a 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[431b 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[431c 10-14 19:02:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[431d 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[431e 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[431f 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4320 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[4321 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4322 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +[4323 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +00000040 e2 a2 a4 e0 2f f0 |..../.| +[4324 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4325 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 66 6a 22 e4 2a 3f 43 f6 12 83 30 |0D. .fj".*?C...0| +00000010 02 1a 30 4c 0a db 85 48 5b 9c 6c 8b 58 97 3c 02 |..0L...H[.l.X.<.| +00000020 b1 7d 81 a3 02 20 3d a8 6a fb 9d 08 9b 29 a9 33 |.}... =.j....).3| +00000030 93 6b de 95 e0 55 9b 3a f4 a6 d8 d4 58 64 1a ea |.k...U.:....Xd..| +00000040 b8 49 3d a8 8d bd |.I=...| +[4326 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4327 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[4328 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4329 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[432a 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[432b 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[432c 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[432d 10-14 19:02:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[432e 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[432f 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4330 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4331 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[4332 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\364\235Y\326\333\2604\223p\007\213\202>\342\242\244\340/\360" secret_envelope: > alive: +[4333 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4334 10-14 19:02:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4335 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4336 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4337 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4338 10-14 19:02:22.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4339 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[433a 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[433b 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[433d 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[433e 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[433c 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[433f 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4340 10-14 19:02:22.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4341 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4342 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4343 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4344 10-14 19:02:22.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4345 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4346 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4347 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4348 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4349 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[434a 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[434b 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[434c 10-14 19:02:22.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[434d 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[434e 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161037 +[434f 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6561F37EB05658544072C19F30B0F1CE214505AFDECBE1C899AF279D638E8C15 +[4350 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4351 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4352 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4353 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4354 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[4355 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[4356 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4357 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4358 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4359 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[435a 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[435c 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[435b 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[435d 10-14 19:02:22.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[435e 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[435f 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4360 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4361 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4362 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4363 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +[4364 10-14 19:02:22.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +00000040 9e c2 38 3c 62 59 ed |..8 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4366 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4367 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4368 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4369 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +[436a 10-14 19:02:22.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +00000040 e2 a2 a4 e0 2f f0 |..../.| +[436b 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[436c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[436d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[436e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[436f 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4370 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4371 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4372 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4373 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4374 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4375 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 gate 1602702142644918800 evaluation starts +[4376 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 signed by 0 principal evaluation starts (used [false]) +[4377 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 processing identity 0 with bytes of 115a6c0 +[4378 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4379 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 principal evaluation fails +[437a 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545b8e0 gate 1602702142644918800 evaluation fails +[437b 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[437c 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[437d 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[437e 10-14 19:02:22.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 gate 1602702142649802800 evaluation starts +[437f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 signed by 0 principal evaluation starts (used [false]) +[4380 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 processing identity 0 with bytes of 115a6c0 +[4381 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 principal matched by identity 0 +[4382 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab e5 c8 bc d3 b8 ac b4 70 4f ee 1b f1 b0 d2 61 |........pO.....a| +00000010 83 0e d0 a0 48 32 9f 6e ab b2 3e d8 b6 1c 5e 13 |....H2.n..>...^.| +[4384 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 47 1b e6 2a dd 1c ef 5d a1 c8 6c |0D. .G..*...]..l| +00000010 06 64 75 05 18 9d 87 6e 04 60 35 15 62 67 18 99 |.du....n.`5.bg..| +00000020 be 12 98 25 02 20 60 7c 3e 09 91 61 4c 2d 65 86 |...%. `|>..aL-e.| +00000030 ac 7f 62 83 cd a2 a8 cb 41 cb 7a 69 16 01 a6 7e |..b.....A.zi...~| +00000040 6a cb ea af 6c ec |j...l.| +[4383 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4385 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4386 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4387 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4388 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 principal evaluation succeeds for identity 0 +[4389 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00545be50 gate 1602702142649802800 evaluation succeeds +[438a 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[438b 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[438c 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[438d 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[438e 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[438f 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4390 10-14 19:02:22.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4391 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4392 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4393 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4394 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4395 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4396 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +[4397 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +00000040 9e c2 38 3c 62 59 ed |..8 DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4399 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 56 51 c5 ec af 26 f7 c1 e3 1e c7 |0D. KVQ...&.....| +00000010 a7 ed d0 b5 dc ad 88 03 d7 56 6d 4b 29 7f 09 3a |.........VmK)..:| +00000020 bc e3 38 c0 02 20 7b ea 40 31 5f db 89 27 43 ec |..8.. {.@1_..'C.| +00000030 9d 9e 4c fe 40 e7 4c eb 31 41 f8 24 a0 98 7a f5 |..L.@.L.1A.$..z.| +00000040 9b 59 10 8a 1b f5 |.Y....| +[439a 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[439b 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[439c 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[439d 10-14 19:02:22.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[439e 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[439f 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a0 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[43a1 10-14 19:02:22.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[43a2 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 61 f3 7e b0 56 58 54 40 72 c1 9f 30 b0 f1 ce |ea.~.VXT@r..0...| +00000010 21 45 05 af de cb e1 c8 99 af 27 9d 63 8e 8c 15 |!E........'.c...| +[43a3 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 7e c5 6c aa 11 f7 19 44 d6 61 |0E.!..~.l....D.a| +00000010 b8 b1 95 f9 3a 67 30 25 e5 76 7f 60 fe 6b 7c c6 |....:g0%.v.`.k|.| +00000020 b1 a0 37 ff 31 02 20 3f be 02 b0 da 12 72 8a a5 |..7.1. ?.....r..| +00000030 52 e4 2e 2a 73 31 4b 0d 02 47 a4 f0 cf 0b 0d ad |R..*s1K..G......| +00000040 9e c2 38 3c 62 59 ed |..8 DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[43a5 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[43a6 10-14 19:02:22.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[43a8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43a9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[43aa 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[43ab 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[43ac 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[43ad 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[43ae 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[43af 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 gate 1602702142712409300 evaluation starts +[43b0 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 signed by 0 principal evaluation starts (used [false]) +[43b1 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 processing identity 0 with bytes of 115a6c0 +[43b2 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[43b3 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 principal evaluation fails +[43b4 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005431e20 gate 1602702142712409300 evaluation fails +[43b5 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[43b6 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[43b7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[43b8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 gate 1602702142713720000 evaluation starts +[43b9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 signed by 0 principal evaluation starts (used [false]) +[43ba 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 processing identity 0 with bytes of 115a6c0 +[43bb 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 principal matched by identity 0 +[43bc 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 15 ee 9d 17 91 20 b9 61 f7 0e d1 4c 52 32 8f |...... .a...LR2.| +00000010 5e bc d3 54 36 f4 dc b8 54 b7 8f 5d 01 2d aa ce |^..T6...T..].-..| +[43bd 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 10 f2 e2 3d c5 4f 6c ce 44 68 d8 |0D. T...=.Ol.Dh.| +00000010 1e 6d 7c f8 e6 3f 2c be 66 4b b9 87 34 7c fd 60 |.m|..?,.fK..4|.`| +00000020 69 c2 64 7b 02 20 78 46 e1 bd 99 bf 79 fd c4 87 |i.d{. xF....y...| +00000030 65 2f 97 fe 0b 9e 53 45 42 7f 73 9f 7a 5e 6b 2f |e/....SEB.s.z^k/| +00000040 6c a0 1b 6c 6b 34 |l..lk4| +[43be 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 principal evaluation succeeds for identity 0 +[43bf 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549a390 gate 1602702142713720000 evaluation succeeds +[43c0 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[43c1 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[43c2 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[43c3 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[43c4 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43c5 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43c6 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[43c7 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 42 2a a3 cd 70 93 7c 47 4e 2d 11 f6 fd e1 37 |.B*..p.|GN-....7| +00000010 30 00 e6 80 55 51 d6 54 3a 98 58 37 61 06 f0 19 |0...UQ.T:.X7a...| +[43c8 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 60 07 c3 49 24 7b 63 5c e7 54 3f |0D. A`..I${c\.T?| +00000010 23 ff e8 38 71 a6 bf ca b7 cb 7d f8 37 4a ce 95 |#..8q.....}.7J..| +00000020 48 c3 94 b3 02 20 2a c0 da 50 60 01 99 05 fd 25 |H.... *..P`....%| +00000030 95 07 3e f4 9d 59 d6 db b0 34 93 70 07 8b 82 3e |..>..Y...4.p...>| +00000040 e2 a2 a4 e0 2f f0 |..../.| +[43c9 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43ca 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43cb 10-14 19:02:22.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43cc 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43cd 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43ce 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43cf 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d0 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d1 10-14 19:02:22.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43d2 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[43d3 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[43d4 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e fd 97 f7 1b d1 51 b5 cf 69 86 43 83 59 59 94 |......Q..i.C.YY.| +00000010 77 e3 c4 d2 80 7b bd f0 3a 40 0a 9f a2 85 f9 79 |w....{..:@.....y| +[43d5 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 e7 eb 04 86 6e 02 05 53 cf 7c c4 |0D. F....n..S.|.| +00000010 49 53 00 5e a2 05 3d b3 eb 76 9e fe 3a 7c d4 3d |IS.^..=..v..:|.=| +00000020 6a 1c ac 2f 02 20 2d 81 ab ad e9 76 bb b4 6e 28 |j../. -....v..n(| +00000030 a9 24 72 23 3f 7a 1f 90 16 86 ee 53 57 c5 8e 76 |.$r#?z.....SW..v| +00000040 7f bf d8 b9 d8 ca |......| +[43d6 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43d7 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d8 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43d9 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[43da 10-14 19:02:23.32 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[43db 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43dc 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43dd 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43de 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[43df 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43e0 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[43e1 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[43e2 10-14 19:02:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[43e3 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[43e4 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[43e5 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[43e6 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 gate 1602702145110286500 evaluation starts +[43e7 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 signed by 0 principal evaluation starts (used [false]) +[43e8 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 processing identity 0 with bytes of 115a6c0 +[43e9 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[43ea 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 principal evaluation fails +[43eb 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bd590 gate 1602702145110286500 evaluation fails +[43ec 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[43ed 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[43ee 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[43ef 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 gate 1602702145110717300 evaluation starts +[43f0 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 signed by 0 principal evaluation starts (used [false]) +[43f1 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 processing identity 0 with bytes of 115a6c0 +[43f2 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 principal matched by identity 0 +[43f3 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 5a 98 07 dc 3c 51 32 38 4e db d4 e0 9e a7 30 |.Z... DEBU Verify: sig = 00000000 30 44 02 20 31 3e d3 01 ba 14 e4 29 70 1c 6f 51 |0D. 1>.....)p.oQ| +00000010 27 f0 ce 5a 9d 40 9f c4 4a a6 14 dc a9 c2 10 e2 |'..Z.@..J.......| +00000020 67 5f 14 73 02 20 4b 8a b0 ae c5 ac 89 7e 50 91 |g_.s. K......~P.| +00000030 ff 85 a0 5a 65 12 96 c6 10 99 48 59 f4 49 f7 c4 |...Ze.....HY.I..| +00000040 42 69 25 01 0a e8 |Bi%...| +[43f5 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 principal evaluation succeeds for identity 0 +[43f6 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054bdb00 gate 1602702145110717300 evaluation succeeds +[43f7 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[43f8 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[43f9 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[43fa 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[43fb 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[43fc 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[43fd 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[43fe 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[43ff 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4400 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4401 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4402 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4403 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4404 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4405 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4406 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4407 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4408 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4409 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[440a 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[440b 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[440c 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[440d 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[440e 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[440f 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4410 10-14 19:02:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4411 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4412 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4413 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4414 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4415 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4416 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4417 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4418 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4419 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[441a 10-14 19:02:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[441b 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[441c 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[441d 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[441e 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[441f 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4420 10-14 19:02:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4421 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4422 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4423 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4424 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4425 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4426 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4427 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 gate 1602702145225156100 evaluation starts +[4428 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 signed by 0 principal evaluation starts (used [false]) +[4429 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 processing identity 0 with bytes of 115a6c0 +[442a 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[442b 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 principal evaluation fails +[442c 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7520 gate 1602702145225156100 evaluation fails +[442d 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[442e 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4430 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[442f 10-14 19:02:25.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4431 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 gate 1602702145229848700 evaluation starts +[4432 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 signed by 0 principal evaluation starts (used [false]) +[4433 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 processing identity 0 with bytes of 115a6c0 +[4434 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 principal matched by identity 0 +[4435 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 48 82 5a 01 18 1d 54 84 c1 05 96 cf e2 1c 74 |.H.Z...T.......t| +00000010 10 51 01 59 ca ee 6b f5 6a 1e 98 f6 51 fd 6c 42 |.Q.Y..k.j...Q.lB| +[4436 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d2 b4 2d 9e b8 8b fd cf 63 62 c1 |0E.!...-.....cb.| +00000010 23 da 96 9a 1e 72 d3 95 fb 60 78 04 6a 04 fe f6 |#....r...`x.j...| +00000020 3b 49 5c 50 2e 02 20 10 38 7f 7b bc 9e cb fd 4e |;I\P.. .8.{....N| +00000030 f6 57 fc db a3 43 39 d3 77 49 a8 4f f5 49 d5 64 |.W...C9.wI.O.I.d| +00000040 d4 8b 5e a4 3f e2 ff |..^.?..| +[4437 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 principal evaluation succeeds for identity 0 +[4438 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054e7a90 gate 1602702145229848700 evaluation succeeds +[4439 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[443a 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[443b 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[443c 10-14 19:02:25.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[443d 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[443e 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[443f 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4440 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4441 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4442 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4443 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4444 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4445 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4446 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4447 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4448 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4449 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[444a 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[444b 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[444c 10-14 19:02:25.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[444d 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[444e 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[444f 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4450 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4451 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4452 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4453 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4454 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4455 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4456 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4457 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4458 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4459 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[445a 10-14 19:02:25.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[445b 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[445c 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[445d 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[445e 10-14 19:02:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[445f 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 15 a2 c3 03 13 3d 4d fb 4d 83 0d 01 e1 ce fc |b.....=M.M......| +00000010 48 25 1d 1c f9 29 f4 08 6e 05 91 df 4a 10 99 72 |H%...)..n...J..r| +[4460 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 af 8e 67 61 c6 0a 88 43 e4 f0 |0E.!....ga...C..| +00000010 2b 5a 46 76 77 73 50 8b 0e 20 92 15 15 b0 36 cb |+ZFvwsP.. ....6.| +00000020 48 24 95 27 34 02 20 7f 96 c3 29 6a d7 13 fd 48 |H$.'4. ...)j...H| +00000030 df 5d c5 11 9d 48 5f 9e fd cb ee b3 b5 60 0a 4c |.]...H_......`.L| +00000040 25 bd a8 01 2e e7 ea |%......| +[4461 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4462 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4463 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4464 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4465 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[4466 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4467 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4468 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4469 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[446a 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[446b 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[446c 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[446d 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[446e 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[446f 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4470 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4471 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4472 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4473 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4474 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4475 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4476 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4477 10-14 19:02:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4478 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4479 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[447a 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[447b 10-14 19:02:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[447c 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[447d 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161038 +[447e 10-14 19:02:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2047C84BD9306A5788AF25ABC72AF57839E60805BE6A36DAE7EA88E0C5625965 +[447f 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4480 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4481 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4482 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4483 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4484 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4485 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[4486 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4487 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4488 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4489 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[448a 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[448b 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[448c 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[448d 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[448e 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[448f 10-14 19:02:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4490 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4491 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4492 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4493 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4494 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4495 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4496 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4497 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4498 10-14 19:02:25.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4499 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[449a 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[449b 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[449c 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[449d 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[449e 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[449f 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[44a0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44a1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44a2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44a3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44a4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44a5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44a6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44a7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[44a8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 gate 1602702145863569400 evaluation starts +[44a9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 signed by 0 principal evaluation starts (used [false]) +[44aa 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 processing identity 0 with bytes of 115a6c0 +[44ab 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[44ac 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 principal evaluation fails +[44ad 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e3e0 gate 1602702145863569400 evaluation fails +[44ae 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[44af 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[44b0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44b1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 gate 1602702145864008400 evaluation starts +[44b2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 signed by 0 principal evaluation starts (used [false]) +[44b3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 processing identity 0 with bytes of 115a6c0 +[44b4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 principal matched by identity 0 +[44b5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[44b6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[44b7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 principal evaluation succeeds for identity 0 +[44b8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557e950 gate 1602702145864008400 evaluation succeeds +[44b9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[44ba 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[44bb 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44bc 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44bd 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44be 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44bf 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44c0 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44c1 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44c2 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44c3 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44c4 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[44c5 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 gate 1602702145868026600 evaluation starts +[44c6 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 signed by 0 principal evaluation starts (used [false]) +[44c7 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 processing identity 0 with bytes of 115a6c0 +[44c8 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[44c9 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 principal evaluation fails +[44ca 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00557fb50 gate 1602702145868026600 evaluation fails +[44cb 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[44cc 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[44cd 10-14 19:02:25.86 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44ce 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 gate 1602702145870046300 evaluation starts +[44cf 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 signed by 0 principal evaluation starts (used [false]) +[44d0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 processing identity 0 with bytes of 115a6c0 +[44d1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 principal matched by identity 0 +[44d2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[44d3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[44d4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 principal evaluation succeeds for identity 0 +[44d5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055940c0 gate 1602702145870046300 evaluation succeeds +[44d6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[44d7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[44d8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44d9 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44da 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44db 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[44dc 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44dd 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[44de 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[44df 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[44e0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[44e1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[44e2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44e3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44e4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44e5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44e6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44e7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44e8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44e9 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[44ea 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 gate 1602702145877189700 evaluation starts +[44eb 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 signed by 0 principal evaluation starts (used [false]) +[44ec 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 processing identity 0 with bytes of 115a6c0 +[44ed 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[44ee 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 principal evaluation fails +[44ef 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b22f0 gate 1602702145877189700 evaluation fails +[44f0 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[44f1 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[44f2 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44f3 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 gate 1602702145878206400 evaluation starts +[44f4 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 signed by 0 principal evaluation starts (used [false]) +[44f5 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 processing identity 0 with bytes of 115a6c0 +[44f6 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 principal matched by identity 0 +[44f7 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[44f8 10-14 19:02:25.87 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[44f9 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 principal evaluation succeeds for identity 0 +[44fa 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b2860 gate 1602702145878206400 evaluation succeeds +[44fb 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[44fc 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[44fd 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44fe 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44ff 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4500 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4501 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4502 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4503 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4504 10-14 19:02:25.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4505 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4506 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4507 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 gate 1602702145890688200 evaluation starts +[4508 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 signed by 0 principal evaluation starts (used [false]) +[4509 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 processing identity 0 with bytes of 115a6c0 +[450a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[450b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 principal evaluation fails +[450c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3a60 gate 1602702145890688200 evaluation fails +[450d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[450e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[450f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4510 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 gate 1602702145891014200 evaluation starts +[4511 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 signed by 0 principal evaluation starts (used [false]) +[4512 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 processing identity 0 with bytes of 115a6c0 +[4513 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 principal matched by identity 0 +[4514 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4515 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4516 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 principal evaluation succeeds for identity 0 +[4517 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055b3fd0 gate 1602702145891014200 evaluation succeeds +[4518 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4519 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[451a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[451b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[451c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[451d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[451e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[451f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[4520 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[4521 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[4522 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4523 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4524 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4525 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4526 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4527 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4528 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4529 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[452a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 gate 1602702145893404100 evaluation starts +[452b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 signed by 0 principal evaluation starts (used [false]) +[452c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 processing identity 0 with bytes of 115a6c0 +[452d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[452e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 principal evaluation fails +[452f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e4150 gate 1602702145893404100 evaluation fails +[4530 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4531 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4532 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4533 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 gate 1602702145893866600 evaluation starts +[4534 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 signed by 0 principal evaluation starts (used [false]) +[4535 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 processing identity 0 with bytes of 115a6c0 +[4536 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 principal matched by identity 0 +[4537 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[4538 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4539 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 principal evaluation succeeds for identity 0 +[453a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e46c0 gate 1602702145893866600 evaluation succeeds +[453b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[453c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[453d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[453e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[453f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4540 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4541 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4542 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4543 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4544 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4545 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4546 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4547 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 gate 1602702145895772200 evaluation starts +[4548 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 signed by 0 principal evaluation starts (used [false]) +[4549 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 processing identity 0 with bytes of 115a6c0 +[454a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[454b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 principal evaluation fails +[454c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e58c0 gate 1602702145895772200 evaluation fails +[454d 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[454e 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[454f 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4550 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 gate 1602702145896306400 evaluation starts +[4551 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 signed by 0 principal evaluation starts (used [false]) +[4552 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 processing identity 0 with bytes of 115a6c0 +[4553 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 principal matched by identity 0 +[4554 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[4555 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[4556 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 principal evaluation succeeds for identity 0 +[4557 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055e5e30 gate 1602702145896306400 evaluation succeeds +[4558 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4559 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[455a 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[455b 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[455c 10-14 19:02:25.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[455d 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[455e 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[455f 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4560 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4561 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4562 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[4563 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4564 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4565 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[4566 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[4567 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[4568 10-14 19:02:25.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4569 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[456a 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[456b 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[456c 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[456d 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[456e 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[456f 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4570 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4571 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4572 10-14 19:02:26.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4573 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4574 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4575 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4576 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4577 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4578 10-14 19:02:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4579 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[457a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[457b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[457c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[457d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[457e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 gate 1602702146172143200 evaluation starts +[457f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 signed by 0 principal evaluation starts (used [false]) +[4580 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 processing identity 0 with bytes of 115a6c0 +[4581 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4582 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 principal evaluation fails +[4583 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e470 gate 1602702146172143200 evaluation fails +[4584 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4585 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4586 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4587 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 gate 1602702146175855400 evaluation starts +[4588 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 signed by 0 principal evaluation starts (used [false]) +[4589 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 processing identity 0 with bytes of 115a6c0 +[458a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 principal matched by identity 0 +[458b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +[458c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +00000040 09 e5 d5 79 4d e8 |...yM.| +[458d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 principal evaluation succeeds for identity 0 +[458e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00562e9e0 gate 1602702146175855400 evaluation succeeds +[458f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4590 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4591 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4592 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4593 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4594 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4595 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4596 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4597 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4598 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4599 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[459a 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[459b 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[459c 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[459d 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[459e 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[459f 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[45a0 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > alive: alive: alive: +[45a1 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[45a2 10-14 19:02:26.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45a3 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[45a4 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[45a5 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45a6 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45a7 10-14 19:02:26.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45a8 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45a9 10-14 19:02:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45aa 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45ab 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45ac 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45ad 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45ae 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45af 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b0 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b1 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[45b2 10-14 19:02:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45b3 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +[45b4 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +[45b5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > > , Envelope: 165 bytes, Signature: 0 bytes +[45b6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[45b7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45b9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[45ba 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[45bb 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[45bc 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[45bd 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[45be 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 gate 1602702146304367300 evaluation starts +[45bf 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 signed by 0 principal evaluation starts (used [false]) +[45c0 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 processing identity 0 with bytes of 115a6c0 +[45c1 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[45c3 10-14 19:02:26.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45c2 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 principal evaluation fails +[45c4 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566ab50 gate 1602702146304367300 evaluation fails +[45c5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[45c6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[45c7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[45c8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 gate 1602702146308371200 evaluation starts +[45c9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 signed by 0 principal evaluation starts (used [false]) +[45ca 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 processing identity 0 with bytes of 115a6c0 +[45cb 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 principal matched by identity 0 +[45cc 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +[45cd 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +00000040 95 16 6f 3b 97 af |..o;..| +[45ce 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 principal evaluation succeeds for identity 0 +[45cf 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00566b0c0 gate 1602702146308371200 evaluation succeeds +[45d0 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45d1 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45d2 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45d3 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45d4 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[45d5 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[45d6 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[45d7 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[45d8 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[45d9 10-14 19:02:26.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45da 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45db 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45dc 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[45dd 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45de 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45df 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45e0 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[45e2 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[45e3 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45e1 10-14 19:02:26.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\203\257\216ga\306\n\210C\344\360+ZFvwsP\213\016 \222\025\025\2606\313H$\225'4\002 \177\226\303)j\327\023\375H\337]\305\021\235H_\236\375\313\356\263\265`\nL%\275\250\001.\347\352" > alive: alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: +[45e4 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[45e5 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[45e6 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[45e7 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[45e8 10-14 19:02:26.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45e9 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45ea 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45eb 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45ec 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[45ed 10-14 19:02:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ee 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[45ef 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[45f0 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45f1 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[45f2 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[45f3 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +[45f4 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +00000040 83 51 6b da c9 10 |.Qk...| +[45f5 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[45f6 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 be b5 38 5d ff ce d6 e9 6a 32 |0E.!....8]....j2| +00000010 2c 8e 4b 66 74 cc 02 cd b1 03 13 ef 03 ec 8d fd |,.Kft...........| +00000020 dd 42 65 e2 f6 02 20 12 c1 0d 32 1a 69 1f 26 f2 |.Be... ...2.i.&.| +00000030 12 c1 67 96 5e 2d d9 ea 96 d8 5d 4c 28 11 b4 d9 |..g.^-....]L(...| +00000040 57 93 27 ae eb d9 f3 |W.'....| +[45f7 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[45f8 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[45f9 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[45fa 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[45fb 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[45fc 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45fd 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45fe 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ff 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[4600 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4601 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4602 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[4603 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[4604 10-14 19:02:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[4605 10-14 19:02:26.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4606 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4607 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4608 10-14 19:02:26.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4609 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[460a 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[460b 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[460c 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[460d 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[460e 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[460f 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4610 10-14 19:02:26.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4611 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4612 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4613 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4614 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4615 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4616 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4617 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4618 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4619 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[461a 10-14 19:02:26.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[461b 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[461c 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[461d 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[461e 10-14 19:02:26.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[461f 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4620 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E161039 +[4621 10-14 19:02:26.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9B14E4E742B335A5608DFABF11505A115B4353D87D99F08C5B20305B3E5F89FB +[4622 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4623 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4624 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4625 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[4626 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4627 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4628 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4629 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[462a 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +[462b 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[462c 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[462d 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[462e 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\245\004[\374\016v\\\220\243\316c8a\022\235\352M\216\374\321\233\300\2262\203?\020F\336\322\022\002 'nx\223c*0_\n\270;\t\217\324\366\026\274\r1I\321\354R\037\177\3339\201\233\000\3666" > > , Envelope: 165 bytes, Signature: 0 bytes +[462f 10-14 19:02:26.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4630 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[4631 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[4632 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4633 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[4634 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4635 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +[4636 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +00000040 83 51 6b da c9 10 |.Qk...| +[4637 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4638 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4639 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[463a 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[463b 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[463c 10-14 19:02:26.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[463d 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[463e 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[463f 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4640 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4641 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 gate 1602702146640162700 evaluation starts +[4642 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 signed by 0 principal evaluation starts (used [false]) +[4643 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 processing identity 0 with bytes of 115a6c0 +[4644 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4645 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 principal evaluation fails +[4646 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c9f00 gate 1602702146640162700 evaluation fails +[4647 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4648 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4649 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[464a 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 gate 1602702146640487400 evaluation starts +[464b 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 signed by 0 principal evaluation starts (used [false]) +[464c 10-14 19:02:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[464d 10-14 19:02:26.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[464e 10-14 19:02:26.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 processing identity 0 with bytes of 115a6c0 +[464f 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 principal matched by identity 0 +[4650 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 ab de cd e0 2b 65 c9 8e 30 cd 83 52 6c 14 75 |"....+e..0..Rl.u| +00000010 34 66 fa 6f 23 36 60 3d 1c d9 ae e0 0b 18 0d b0 |4f.o#6`=........| +[4651 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 40 24 8e 4f 0d 90 0f 21 e9 8b c6 78 |0D. @$.O...!...x| +00000010 c5 d8 c5 24 8e 56 7c b1 c6 ea 01 ae c0 4a 40 68 |...$.V|......J@h| +00000020 11 2c 14 03 02 20 0d d5 e1 bf 27 22 2b 9e 93 6d |.,... ....'"+..m| +00000030 24 ea 15 c9 97 df f1 56 62 6a 1c b2 19 c8 99 a7 |$......Vbj......| +00000040 09 e5 d5 79 4d e8 |...yM.| +[4652 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 principal evaluation succeeds for identity 0 +[4653 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056fc470 gate 1602702146640487400 evaluation succeeds +[4654 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4655 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4656 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4657 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4658 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4659 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[465a 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[465b 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +[465c 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +00000040 39 81 9b 00 f6 36 |9....6| +[465d 10-14 19:02:26.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[465e 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[465f 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4660 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4661 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4662 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4663 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4664 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +[4665 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +00000040 39 81 9b 00 f6 36 |9....6| +[4666 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4667 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 16 ca 84 57 9a c6 34 e3 ad 46 c9 ed |0D. ...W..4..F..| +00000010 70 54 e6 fd f7 3d 59 f3 b0 27 1c ce 25 1d 16 d3 |pT...=Y..'..%...| +00000020 da cc 44 ce 02 20 3f e8 c0 a4 2d c2 d3 6c 17 ad |..D.. ?...-..l..| +00000030 d6 8d 3d 39 10 71 28 3d 45 ed d8 b6 d2 16 5c a1 |..=9.q(=E.....\.| +00000040 35 98 99 98 57 1a |5...W.| +[4668 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4669 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[466a 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[466b 10-14 19:02:26.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[466c 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[466d 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[466e 10-14 19:02:26.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[466f 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[4670 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4671 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[4672 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4673 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b 14 e4 e7 42 b3 35 a5 60 8d fa bf 11 50 5a 11 |....B.5.`....PZ.| +00000010 5b 43 53 d8 7d 99 f0 8c 5b 20 30 5b 3e 5f 89 fb |[CS.}...[ 0[>_..| +[4674 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e a5 04 5b fc 0e 76 5c 90 a3 ce 63 |0D. >..[..v\...c| +00000010 38 61 12 9d ea 4d 8e fc d1 9b c0 96 32 83 3f 10 |8a...M......2.?.| +00000020 46 de d2 12 02 20 27 6e 78 93 63 2a 30 5f 0a b8 |F.... 'nx.c*0_..| +00000030 3b 09 8f d4 f6 16 bc 0d 31 49 d1 ec 52 1f 7f db |;.......1I..R...| +00000040 39 81 9b 00 f6 36 |9....6| +[4675 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4676 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4677 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4678 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4679 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[467a 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[467b 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[467c 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[467d 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[467e 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[467f 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4680 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 gate 1602702146739073400 evaluation starts +[4681 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 signed by 0 principal evaluation starts (used [false]) +[4682 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 processing identity 0 with bytes of 115a6c0 +[4683 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4684 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 principal evaluation fails +[4685 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057271a0 gate 1602702146739073400 evaluation fails +[4686 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4687 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4688 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4689 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 gate 1602702146739597700 evaluation starts +[468a 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 signed by 0 principal evaluation starts (used [false]) +[468b 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 processing identity 0 with bytes of 115a6c0 +[468c 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 principal matched by identity 0 +[468d 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 57 ae f9 ff eb ca f9 79 64 47 77 30 d4 10 cf | W......ydGw0...| +00000010 af 62 38 a2 4e 01 fd f8 2f 1b 2c 38 88 75 0b 0d |.b8.N.../.,8.u..| +[468e 10-14 19:02:26.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 0c 39 97 81 20 ed bf 35 3c 83 06 |0D. %.9.. ..5<..| +00000010 50 fe 68 c9 ab 2a e7 77 71 ac 3e 82 6d 9a cc b2 |P.h..*.wq.>.m...| +00000020 6c 65 0c ca 02 20 14 2f c4 e9 46 ad 58 f5 ba 1a |le... ./..F.X...| +00000030 de bb 7e 31 c5 74 84 02 45 70 2e 9d 7a 3b b9 de |..~1.t..Ep..z;..| +00000040 95 16 6f 3b 97 af |..o;..| +[468f 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 principal evaluation succeeds for identity 0 +[4690 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005727710 gate 1602702146739597700 evaluation succeeds +[4691 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4692 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4693 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4694 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4695 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4696 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4697 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4698 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 7e 06 6d d5 e8 60 79 66 bc 85 42 08 13 77 59 |$~.m..`yf..B..wY| +00000010 e8 1c 5c 50 8b cd 59 26 26 97 f3 a5 35 62 79 e1 |..\P..Y&&...5by.| +[4699 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 94 af ee c2 23 09 7f 3a 38 38 aa |0D. .....#..:88.| +00000010 52 97 6b 4f e8 43 d5 47 6e d2 3d 5c 6e 40 3c f0 |R.kO.C.Gn.=\n@<.| +00000020 5f 21 b4 2f 02 20 42 8e 63 1a 48 f6 7d 84 c8 48 |_!./. B.c.H.}..H| +00000030 79 54 68 58 d3 68 8b 9a e5 43 56 06 d5 ab 84 fd |yThX.h...CV.....| +00000040 83 51 6b da c9 10 |.Qk...| +[469a 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[469b 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[469c 10-14 19:02:26.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[469d 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[469e 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[469f 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46a0 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46a1 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46a2 10-14 19:02:26.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46a3 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41920 +[46a4 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00571f130 +[46a5 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[46a6 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[46a7 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[46a8 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[46a9 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 8f c0 44 97 76 b1 76 a2 7e 44 f9 5a 6e 3d ce |r..D.v.v.~D.Zn=.| +00000010 44 0f 77 8d 8d 13 4c f1 ea 03 00 ff 1a 4f 94 e4 |D.w...L......O..| +[46aa 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f6 2a a2 d5 10 14 4c 60 66 2a b9 |0D. ..*....L`f*.| +00000010 ad 5c a7 c0 ea a0 8a 69 a1 97 73 4b f3 fc c4 ca |.\.....i..sK....| +00000020 7a a8 df 93 02 20 0b c7 5f 43 02 8d 75 48 bb 76 |z.... .._C..uH.v| +00000030 c7 cb 45 51 08 93 92 e8 51 a8 56 3d c4 d1 0a 8f |..EQ....Q.V=....| +00000040 4b 96 f2 21 99 f8 |K..!..| +[46ab 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[46ac 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0054b1420, header 0xc0056e8af0 +[46ad 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[46ae 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] processing txid: c59e06ab979bee906aa0d8487f64e368ded99c115c399267fe64360796095530 +[46af 10-14 19:02:28.17 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] Entry chaincode: name:"cscc" +[46b0 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO [][c59e06ab] Entry chaincode: name:"cscc" +[46b1 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[46b2 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[46b3 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 72 8f c0 44 97 76 b1 76 a2 7e 44 f9 5a 6e 3d ce |r..D.v.v.~D.Zn=.| +00000010 44 0f 77 8d 8d 13 4c f1 ea 03 00 ff 1a 4f 94 e4 |D.w...L......O..| +[46b4 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 17 f6 2a a2 d5 10 14 4c 60 66 2a b9 |0D. ..*....L`f*.| +00000010 ad 5c a7 c0 ea a0 8a 69 a1 97 73 4b f3 fc c4 ca |.\.....i..sK....| +00000020 7a a8 df 93 02 20 0b c7 5f 43 02 8d 75 48 bb 76 |z.... .._C..uH.v| +00000030 c7 cb 45 51 08 93 92 e8 51 a8 56 3d c4 d1 0a 8f |..EQ....Q.V=....| +00000040 4b 96 f2 21 99 f8 |K..!..| +[46b5 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [c59e06ab] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[46b6 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [c59e06ab] notifying Txid:c59e06ab979bee906aa0d8487f64e368ded99c115c399267fe64360796095530, channelID: +[46b7 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[46b8 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO [][c59e06ab] Exit chaincode: name:"cscc" (3ms) +[46b9 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU [][c59e06ab] Exit +[46ba 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41920 +[46bb 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41920 grpc.code=OK grpc.call_duration=14.0425ms +[46bc 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41920: read: connection reset by peer +[46bd 10-14 19:02:28.18 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[46be 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[46bf 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[46c0 10-14 19:02:28.31 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[46c1 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[46c2 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[46c3 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 3e 40 d2 2f c0 be 56 45 1b 6b 5a 07 b3 23 56 |>>@./..VE.kZ..#V| +00000010 f6 5b ee a4 cf 5d 41 1d 70 bf 5e 20 f2 83 6b 10 |.[...]A.p.^ ..k.| +[46c4 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 32 48 b0 d5 00 44 25 c1 19 57 4f |0D. J2H...D%..WO| +00000010 db 3d e6 54 f8 29 52 dc 9d 7c fa 40 ed f1 60 e7 |.=.T.)R..|.@..`.| +00000020 b3 a6 d4 74 02 20 33 50 fb f5 96 c8 51 b7 b2 5a |...t. 3P....Q..Z| +00000030 2c a2 19 62 8b 2c e4 e2 fb 1c ef 32 63 83 00 ca |,..b.,.....2c...| +00000040 a2 fb 43 c6 4e 39 |..C.N9| +[46c5 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46c6 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46c7 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46c8 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us declaration +[46c9 10-14 19:02:28.33 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning false +[46ca 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:41928 +[46cb 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc005788640 +[46cc 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[46cd 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[46ce 10-14 19:02:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[46cf 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[46d0 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 92 ba 45 a0 48 ef 6e 95 c2 ef c6 98 f7 7a cb |...E.H.n......z.| +00000010 eb 90 76 a1 a8 ba dc b4 e6 5c 74 20 69 2b a5 27 |..v......\t i+.'| +[46d1 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 11 2e ba 66 e0 da 57 3a 62 60 d6 |0D. N...f..W:b`.| +00000010 75 f5 3b f4 0b bd 05 de 6a f4 20 5a e0 51 da 83 |u.;.....j. Z.Q..| +00000020 41 3e 09 62 02 20 02 88 ac d4 ad d7 94 a2 2c 79 |A>.b. ........,y| +00000030 47 c8 e4 4a f1 df 04 fd 64 72 30 c7 39 19 44 92 |G..J....dr0.9.D.| +00000040 a8 bd 18 d6 84 9c |......| +[46d2 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[46d3 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc005716b60, header 0xc005788a50 +[46d4 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[46d5 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] processing txid: a2892daa620bb920e1807518327b818fca2e601b6ed4ccacfdaa3d96ccf935f2 +[46d6 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] Entry chaincode: name:"qscc" +[46d7 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> INFO [][a2892daa] Entry chaincode: name:"qscc" +[46d8 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[46d9 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[46da 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[46db 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[46dc 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[46dd 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[46de 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[46df 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46e0 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[46e1 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 gate 1602702149256769900 evaluation starts +[46e2 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 signed by 0 principal evaluation starts (used [false]) +[46e3 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 processing identity 0 with bytes of 115a6c0 +[46e4 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[46e5 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[46e6 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[46e7 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 principal matched by identity 0 +[46e8 10-14 19:02:29.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 92 ba 45 a0 48 ef 6e 95 c2 ef c6 98 f7 7a cb |...E.H.n......z.| +00000010 eb 90 76 a1 a8 ba dc b4 e6 5c 74 20 69 2b a5 27 |..v......\t i+.'| +[46e9 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4e 11 2e ba 66 e0 da 57 3a 62 60 d6 |0D. N...f..W:b`.| +00000010 75 f5 3b f4 0b bd 05 de 6a f4 20 5a e0 51 da 83 |u.;.....j. Z.Q..| +00000020 41 3e 09 62 02 20 02 88 ac d4 ad d7 94 a2 2c 79 |A>.b. ........,y| +00000030 47 c8 e4 4a f1 df 04 fd 64 72 30 c7 39 19 44 92 |G..J....dr0.9.D.| +00000040 a8 bd 18 d6 84 9c |......| +[46ea 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 principal evaluation succeeds for identity 0 +[46eb 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057cc330 gate 1602702149256769900 evaluation succeeds +[46ec 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[46ed 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[46ee 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[46ef 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[46f0 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [a2892daa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[46f1 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [a2892daa] notifying Txid:a2892daa620bb920e1807518327b818fca2e601b6ed4ccacfdaa3d96ccf935f2, channelID: +[46f2 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[46f3 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> INFO [][a2892daa] Exit chaincode: name:"qscc" (11ms) +[46f4 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][a2892daa] Exit +[46f5 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:41928 +[46f6 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:41928 grpc.code=OK grpc.call_duration=16.6469ms +[46f7 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41928: read: connection reset by peer +[46f8 10-14 19:02:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[46f9 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46fa 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46fb 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[46fc 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[46fd 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46fe 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[46ff 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4700 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4701 10-14 19:02:29.85 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4702 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4703 10-14 19:02:29.87 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4704 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[4705 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[4706 10-14 19:02:29.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4707 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[4708 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[4709 10-14 19:02:29.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[470a 10-14 19:02:29.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[470b 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[470c 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[470d 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[470e 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[470f 10-14 19:02:29.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4710 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4711 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 gate 1602702149926070200 evaluation starts +[4712 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 signed by 0 principal evaluation starts (used [false]) +[4713 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 processing identity 0 with bytes of 115a6c0 +[4714 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4715 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 principal evaluation fails +[4716 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057ed770 gate 1602702149926070200 evaluation fails +[4717 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4718 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4719 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[471a 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 gate 1602702149929449100 evaluation starts +[471b 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 signed by 0 principal evaluation starts (used [false]) +[471c 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 processing identity 0 with bytes of 115a6c0 +[471d 10-14 19:02:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 principal matched by identity 0 +[471e 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[471f 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4720 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 principal evaluation succeeds for identity 0 +[4721 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057edce0 gate 1602702149929449100 evaluation succeeds +[4722 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4723 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4724 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4725 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4726 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4727 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4728 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4729 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[472a 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[472b 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[472c 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[472d 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[472e 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 gate 1602702149939565200 evaluation starts +[472f 10-14 19:02:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 signed by 0 principal evaluation starts (used [false]) +[4730 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 processing identity 0 with bytes of 115a6c0 +[4731 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4732 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 principal evaluation fails +[4733 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580cee0 gate 1602702149939565200 evaluation fails +[4734 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4735 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4736 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4737 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 gate 1602702149941579500 evaluation starts +[4738 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 signed by 0 principal evaluation starts (used [false]) +[4739 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 processing identity 0 with bytes of 115a6c0 +[473a 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 principal matched by identity 0 +[473b 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[473c 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[473d 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 principal evaluation succeeds for identity 0 +[473e 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00580d450 gate 1602702149941579500 evaluation succeeds +[473f 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4740 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4741 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4742 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4743 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4744 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4745 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4746 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[4747 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[4748 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[4749 10-14 19:02:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[474a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[474b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[474c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[474d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[474e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[474f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4750 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4751 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4752 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 gate 1602702149957193600 evaluation starts +[4753 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 signed by 0 principal evaluation starts (used [false]) +[4754 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 processing identity 0 with bytes of 115a6c0 +[4755 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4756 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 principal evaluation fails +[4757 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829680 gate 1602702149957193600 evaluation fails +[4758 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4759 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[475a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[475b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 gate 1602702149957498900 evaluation starts +[475c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 signed by 0 principal evaluation starts (used [false]) +[475d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 processing identity 0 with bytes of 115a6c0 +[475e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 principal matched by identity 0 +[475f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[4760 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[4761 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 principal evaluation succeeds for identity 0 +[4762 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005829bf0 gate 1602702149957498900 evaluation succeeds +[4763 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4764 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4765 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4766 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4767 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4768 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4769 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[476a 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[476b 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[476c 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[476d 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[476e 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[476f 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 gate 1602702149958634700 evaluation starts +[4770 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 signed by 0 principal evaluation starts (used [false]) +[4771 10-14 19:02:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 processing identity 0 with bytes of 115a6c0 +[4772 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4773 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 principal evaluation fails +[4774 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583edf0 gate 1602702149958634700 evaluation fails +[4775 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4776 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4777 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4778 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 gate 1602702149961390200 evaluation starts +[4779 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 signed by 0 principal evaluation starts (used [false]) +[477a 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 processing identity 0 with bytes of 115a6c0 +[477b 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 principal matched by identity 0 +[477c 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[477e 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[477d 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[477f 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4780 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4781 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4782 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4783 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4785 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 principal evaluation succeeds for identity 0 +[4786 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00583f360 gate 1602702149961390200 evaluation succeeds +[4787 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4788 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4784 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4789 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[478a 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[478b 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[478c 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[478e 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[478d 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[478f 10-14 19:02:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4790 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3c 3e e8 cf ae a3 9a 57 9e b8 91 75 7d a2 53 20 |<>.....W...u}.S | +00000010 a3 12 39 21 8a fd 2d 9a c0 db fd e7 2d 69 1c ad |..9!..-.....-i..| +[4791 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 cf 33 b2 57 02 c0 49 a1 72 da |0E.!...3.W..I.r.| +00000010 18 79 48 d9 9d ec 84 52 6b f2 eb bc c8 0b 38 6c |.yH....Rk.....8l| +00000020 af 1f cb 11 0c 02 20 58 9d 55 9e aa cf e7 ce e2 |...... X.U......| +00000030 16 3a a2 40 0b f0 17 a8 42 0e 62 82 ee 23 33 32 |.:.@....B.b..#32| +00000040 7f 2e 03 77 45 c4 a6 |...wE..| +[4792 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 96 cb 4b 66 f4 c6 54 77 da 75 37 12 b3 82 77 |9..Kf..Tw.u7...w| +00000010 17 8e 8b 58 81 09 89 ee 75 3b ba 46 aa bf 6c e0 |...X....u;.F..l.| +[4793 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 55 af 54 6f 19 37 8e aa 6d 9e |0E.!..U.To.7..m.| +00000010 21 69 5e 83 4b 98 a8 9e 23 31 36 51 c6 1f 08 c4 |!i^.K...#16Q....| +00000020 ea d2 90 7d db 02 20 49 75 59 3f 40 d1 f2 51 71 |...}.. IuY?@..Qq| +00000030 64 e2 60 ac b3 2b 49 98 4a 27 f8 56 56 cc 5a d4 |d.`..+I.J'.VV.Z.| +00000040 e2 f1 76 b1 0d 72 88 |..v..r.| +[4794 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4795 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4796 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4797 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4798 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4799 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[479a 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[479b 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[479c 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 gate 1602702149973607300 evaluation starts +[479d 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 signed by 0 principal evaluation starts (used [false]) +[479e 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 processing identity 0 with bytes of 115a6c0 +[479f 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47a0 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 principal evaluation fails +[47a1 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869830 gate 1602702149973607300 evaluation fails +[47a2 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47a3 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47a4 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47a5 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 gate 1602702149976389000 evaluation starts +[47a6 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 signed by 0 principal evaluation starts (used [false]) +[47a7 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 processing identity 0 with bytes of 115a6c0 +[47a8 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 principal matched by identity 0 +[47a9 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 fd 67 79 4a c9 aa fc 9d 1a 2f 27 04 80 90 36 |..gyJ...../'...6| +00000010 32 7f 59 8d 24 d9 d6 16 7c 09 b5 8b 25 90 1b 2a |2.Y.$...|...%..*| +[47aa 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 88 9b 4a e4 c6 b3 e0 8f be df 0c |0D. u..J........| +00000010 93 78 47 38 1c 46 ff 82 22 b8 26 e1 03 43 91 8a |.xG8.F..".&..C..| +00000020 cf b8 75 e8 02 20 0c a1 03 89 37 a9 f4 c5 bd 98 |..u.. ....7.....| +00000030 3f dc c3 63 15 9a 44 c2 37 4d b3 4a 05 4a 1a bc |?..c..D.7M.J.J..| +00000040 6d 9d 1e 25 1e 3b |m..%.;| +[47ab 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 principal evaluation succeeds for identity 0 +[47ac 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869da0 gate 1602702149976389000 evaluation succeeds +[47ad 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47ae 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47af 10-14 19:02:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47b0 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47b1 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47b2 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47b3 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[47b4 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47b5 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47b6 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47b7 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47b8 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47b9 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 gate 1602702149984008000 evaluation starts +[47ba 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 signed by 0 principal evaluation starts (used [false]) +[47bb 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 processing identity 0 with bytes of 115a6c0 +[47bc 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47bd 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 principal evaluation fails +[47be 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005882fa0 gate 1602702149984008000 evaluation fails +[47bf 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47c0 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47c1 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47c2 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 gate 1602702149989100300 evaluation starts +[47c3 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 signed by 0 principal evaluation starts (used [false]) +[47c4 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 processing identity 0 with bytes of 115a6c0 +[47c5 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 principal matched by identity 0 +[47c6 10-14 19:02:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 5f 55 18 92 de 27 7a 12 9e 84 2d 67 a8 71 b7 |._U...'z...-g.q.| +00000010 03 5a 50 d0 8e 43 2d 29 21 da 89 b2 60 c6 34 9c |.ZP..C-)!...`.4.| +[47c7 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 90 27 b0 80 30 5c bf 80 1f 8c |0E.!...'..0\....| +00000010 f9 a5 4b 8a cb 42 7a 1f 59 e6 18 0b b5 08 8d eb |..K..Bz.Y.......| +00000020 2b b5 d2 2c b4 02 20 7a c8 3a 7c 26 31 ec 99 5e |+..,.. z.:|&1..^| +00000030 36 65 d8 ec 71 8e dc 8c 1f 07 1b cf 1a d7 7e fd |6e..q.........~.| +00000040 e2 43 81 4d f4 e3 0e |.C.M...| +[47c8 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 principal evaluation succeeds for identity 0 +[47c9 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005883510 gate 1602702149989100300 evaluation succeeds +[47ca 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47cb 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47cc 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47cd 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47ce 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47cf 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[47d0 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[47d1 10-14 19:02:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47d2 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[47d3 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[47d4 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d5 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d6 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d7 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d8 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d9 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47da 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[47db 10-14 19:02:30.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47dc 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[47dd 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47de 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[47df 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[47e0 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47e1 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[47e2 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47e3 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47e4 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47e5 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47e6 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47e7 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 gate 1602702150118124100 evaluation starts +[47e8 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 signed by 0 principal evaluation starts (used [false]) +[47e9 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 processing identity 0 with bytes of 115a6c0 +[47ea 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47eb 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 principal evaluation fails +[47ec 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a6c00 gate 1602702150118124100 evaluation fails +[47ed 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47ee 10-14 19:02:30.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47ef 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47f0 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 gate 1602702150120479300 evaluation starts +[47f1 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 signed by 0 principal evaluation starts (used [false]) +[47f2 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 processing identity 0 with bytes of 115a6c0 +[47f3 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 principal matched by identity 0 +[47f4 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c3 8a 1b e3 8c 28 2e 93 03 d9 f7 e6 03 c6 4e |......(........N| +00000010 61 84 42 83 e2 6b e9 3a a9 89 9b 25 b1 a4 0f 5f |a.B..k.:...%..._| +[47f5 10-14 19:02:30.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 54 1c 9b 02 19 d7 98 02 1a 03 |0E.!..T.........| +00000010 54 46 e4 79 3d 4e 71 51 29 d1 2b da 66 7f e2 93 |TF.y=NqQ).+.f...| +00000020 20 a6 2b e3 a4 02 20 45 80 43 07 9d 9d ea a7 c1 | .+... E.C......| +00000030 0c cb 21 b6 2f 5a 46 6f e2 f8 76 4a bb 9f ae 25 |..!./ZFo..vJ...%| +00000040 e7 6b 24 f8 2a b4 7b |.k$.*.{| +[47f6 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 principal evaluation succeeds for identity 0 +[47f7 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a7170 gate 1602702150120479300 evaluation succeeds +[47f8 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47f9 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47fa 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47fb 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47fc 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[47fd 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[47fe 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[47ff 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4800 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4801 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4802 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4803 10-14 19:02:30.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4804 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4805 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4806 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4807 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4808 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4809 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480a 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480b 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480c 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480d 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480e 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480f 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4810 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4811 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4812 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4813 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4814 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4815 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4816 10-14 19:02:30.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4817 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4818 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4819 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[481a 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[481b 10-14 19:02:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[481c 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[481d 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[481e 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[481f 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4820 10-14 19:02:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4821 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4822 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4823 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4824 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4825 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4826 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4827 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 gate 1602702150200355700 evaluation starts +[4828 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 signed by 0 principal evaluation starts (used [false]) +[4829 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 processing identity 0 with bytes of 115a6c0 +[482a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[482b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 principal evaluation fails +[482c 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c36d0 gate 1602702150200355700 evaluation fails +[482d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[482e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[482f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4830 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 gate 1602702150200789600 evaluation starts +[4831 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 signed by 0 principal evaluation starts (used [false]) +[4832 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 processing identity 0 with bytes of 115a6c0 +[4833 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 principal matched by identity 0 +[4834 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +[4835 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +00000040 55 5a bc 1a ba d6 |UZ....| +[4836 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 principal evaluation succeeds for identity 0 +[4837 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058c3c40 gate 1602702150200789600 evaluation succeeds +[4838 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4839 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[483a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[483b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[483c 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[483d 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[483e 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[483f 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4840 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4841 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4842 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4843 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4844 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4845 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4846 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4847 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4848 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[4849 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202m\232\314\262le\014\312\002 \024/\304\351F\255X\365\272\032\336\273~1\305t\204\002Ep.\235z;\271\336\225\026o;\227\257" > alive: alive: alive: +[484a 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[484b 10-14 19:02:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[484c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[484d 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[484e 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[484f 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4850 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4851 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4852 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4853 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4854 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4855 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4856 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4857 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4858 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 gate 1602702150219179500 evaluation starts +[4859 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 signed by 0 principal evaluation starts (used [false]) +[485a 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 processing identity 0 with bytes of 115a6c0 +[485b 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[485c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 principal evaluation fails +[485d 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a34c0 gate 1602702150219179500 evaluation fails +[485e 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[485f 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4860 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4861 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 gate 1602702150219427500 evaluation starts +[4862 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 signed by 0 principal evaluation starts (used [false]) +[4863 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 processing identity 0 with bytes of 115a6c0 +[4864 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 principal matched by identity 0 +[4865 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 f6 04 cd 9b 51 7c ab 98 b4 8f 30 cf de 0c 59 |f....Q|....0...Y| +00000010 12 b8 0b 70 40 6d f4 a8 91 74 03 01 9b 9e 64 3d |...p@m...t....d=| +[4866 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 2e a9 99 f1 3d 4b 1e e0 1d 00 bf |0D. .....=K.....| +00000010 0d 05 9b 41 66 b0 39 ff ca 77 b5 68 03 35 b4 d6 |...Af.9..w.h.5..| +00000020 61 a3 c8 89 02 20 29 85 1a b2 ac 78 ca 20 da c5 |a.... )....x. ..| +00000030 e1 b1 a4 03 a8 be ed 44 96 ca f6 70 5c 9b 29 b8 |.......D...p\.).| +00000040 19 0f c9 e0 2f e8 |..../.| +[4867 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 principal evaluation succeeds for identity 0 +[4868 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a3a30 gate 1602702150219427500 evaluation succeeds +[4869 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[486a 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[486b 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[486c 10-14 19:02:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[486d 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[486e 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[486f 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4870 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4871 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4872 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4873 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4874 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4875 10-14 19:02:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4876 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4877 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4878 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4879 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[487a 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[487b 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[487c 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[487d 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[487e 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[487f 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4880 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4881 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4882 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4883 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[4884 10-14 19:02:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4885 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4886 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4887 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4888 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4889 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488a 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488b 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488c 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[488d 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[488e 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[488f 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4890 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4891 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4892 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4893 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4894 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4895 10-14 19:02:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4896 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4897 10-14 19:02:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4898 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4899 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[489a 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[489b 10-14 19:02:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[489c 10-14 19:02:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[489d 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[489e 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[489f 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[48a0 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[48a1 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48a2 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[48a3 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[48a4 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[48a5 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[48a6 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[48a7 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[48a8 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 gate 1602702150305745200 evaluation starts +[48a9 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 signed by 0 principal evaluation starts (used [false]) +[48aa 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 processing identity 0 with bytes of 115a6c0 +[48ab 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[48ac 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 principal evaluation fails +[48ad 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005919bf0 gate 1602702150305745200 evaluation fails +[48ae 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[48af 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[48b0 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[48b1 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 gate 1602702150306156200 evaluation starts +[48b2 10-14 19:02:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 signed by 0 principal evaluation starts (used [false]) +[48b3 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 processing identity 0 with bytes of 115a6c0 +[48b4 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 principal matched by identity 0 +[48b5 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +[48b6 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +00000040 b3 18 05 37 5f 6e 99 |...7_n.| +[48b7 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 principal evaluation succeeds for identity 0 +[48b8 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005954160 gate 1602702150306156200 evaluation succeeds +[48b9 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[48ba 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[48bb 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[48bc 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[48bd 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[48be 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[48bf 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[48c0 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[48c1 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[48c2 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48c3 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48c4 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48c5 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[48c6 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48c7 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48c8 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48c9 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[48ca 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[48cb 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[48cc 10-14 19:02:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48cd 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[48ce 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[48cf 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[48d0 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[48d1 10-14 19:02:30.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48d2 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48d3 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48d4 10-14 19:02:30.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48d5 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48d6 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[48d7 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 5b 8b 8f 4b 7d c7 23 1b 45 b9 d5 fa 10 e5 d4 |I[..K}.#.E......| +00000010 a0 18 43 73 8e 23 c3 fe 33 77 ae bf ac a7 e0 09 |..Cs.#..3w......| +[48d8 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b 0b d5 56 da 56 04 61 ad 3f c3 1b |0D. [..V.V.a.?..| +00000010 b4 93 09 a5 41 7a d0 22 9b 28 1f 50 77 b8 32 b3 |....Az.".(.Pw.2.| +00000020 49 7f 2b 40 02 20 6f bb 95 b1 8e c1 12 8a dc da |I.+@. o.........| +00000030 4c 1d 8a 2f 29 65 b5 8c bc 33 b4 99 04 f3 37 c7 |L../)e...3....7.| +00000040 b8 84 bd 2f 32 42 |.../2B| +[48d9 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48da 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[48db 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[48dc 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[48dd 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[48de 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48df 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e0 10-14 19:02:30.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e1 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e2 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e3 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e4 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[48e5 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e6 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[48e7 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48e8 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e9 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48ea 10-14 19:02:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48eb 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48ec 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ed 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48ee 10-14 19:02:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ef 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48f0 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48f1 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48f2 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48f3 10-14 19:02:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48f4 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[48f5 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48f6 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48f7 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[48f8 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[48f9 10-14 19:02:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48fa 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[48fb 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[48fc 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48fd 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[48fe 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[48ff 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +[4900 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +00000040 66 4b dd 9d e6 c9 |fK....| +[4901 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4902 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 77 72 57 e4 83 e1 49 ae d9 aa 64 |0D. iwrW...I...d| +00000010 1b 62 ac a0 78 92 7b 41 89 63 87 df b8 be d0 8b |.b..x.{A.c......| +00000020 f0 ca d0 a0 02 20 09 c4 46 18 a4 92 8e 59 41 15 |..... ..F....YA.| +00000030 db f3 4d 41 73 18 c2 c5 e5 81 b1 22 3d ae 0e ee |..MAs......"=...| +00000040 e8 88 8c c4 22 9c |....".| +[4903 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4904 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[4905 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4906 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4907 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4908 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4909 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[490a 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[490b 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[490c 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[490d 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[490e 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[490f 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[4910 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4911 10-14 19:02:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4912 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4913 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16103A +[4914 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3CF2A010E0FD615B79E3A623BD883DDBEC7B9D0139CF41C02DAF4EC7D5A4187 +[4915 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4916 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4917 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4918 10-14 19:02:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4919 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491a 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491b 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491c 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[491d 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491e 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[491f 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4920 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4921 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4922 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4923 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4924 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4925 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4926 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4927 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4928 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4929 10-14 19:02:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[492a 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[492b 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[492c 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[492d 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[492e 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[492f 10-14 19:02:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4930 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4931 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4932 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4933 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4934 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4935 10-14 19:02:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4936 10-14 19:02:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4937 10-14 19:02:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4938 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4939 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[493a 10-14 19:02:30.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[493b 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[493c 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C0888A0F9A9E0A0FC9E16103B +[493d 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 44387D65EAFB7CB9799C3D8DD846857D891DC6E7C2DF75C1A1A472DED0355769 +[493e 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[493f 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4940 10-14 19:02:30.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4941 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[4942 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[4943 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4944 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4945 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4946 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4947 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4948 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4949 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[494a 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[494b 10-14 19:02:30.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[494c 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[494d 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[494e 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[494f 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4950 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[4951 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[4952 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4953 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[4954 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4955 10-14 19:02:30.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4956 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4957 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4958 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4959 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[495a 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[495b 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[495c 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 gate 1602702150692405400 evaluation starts +[495d 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 signed by 0 principal evaluation starts (used [false]) +[495e 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 processing identity 0 with bytes of 115a6c0 +[495f 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4960 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 principal evaluation fails +[4961 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f07d0 gate 1602702150692405400 evaluation fails +[4962 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4963 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4964 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4965 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 gate 1602702150697563300 evaluation starts +[4966 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 signed by 0 principal evaluation starts (used [false]) +[4967 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 processing identity 0 with bytes of 115a6c0 +[4968 10-14 19:02:30.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 principal matched by identity 0 +[4969 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5a f3 da e0 2d c6 3a 78 3f 50 79 75 d5 4b 0a 84 |Z...-.:x?Pyu.K..| +00000010 fb 84 76 75 a9 91 37 c6 57 87 a8 6f 3a 4c f8 d4 |..vu..7.W..o:L..| +[496a 10-14 19:02:30.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 21 25 b1 95 93 10 a3 62 c7 b0 ee |0D. E!%.....b...| +00000010 24 ae d3 d3 01 22 8c 84 b5 5c f5 41 56 54 45 2f |$...."...\.AVTE/| +00000020 b9 c3 6a 9d 02 20 75 28 e1 6d 15 72 8f 39 cd 54 |..j.. u(.m.r.9.T| +00000030 5e 88 ce c1 77 4d f7 30 75 49 7b 08 8c 10 ad 4d |^...wM.0uI{....M| +00000040 55 5a bc 1a ba d6 |UZ....| +[496b 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 principal evaluation succeeds for identity 0 +[496c 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059f0d40 gate 1602702150697563300 evaluation succeeds +[496d 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[496e 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[496f 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4970 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4971 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4972 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4973 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4974 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +[4975 10-14 19:02:30.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +00000040 f0 a9 0d 0b 07 a8 |......| +[4976 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4977 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4978 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4979 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[497a 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +[497b 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +00000040 66 4b dd 9d e6 c9 |fK....| +[497c 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[497d 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[497e 10-14 19:02:30.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[497f 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[4980 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[4981 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4982 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[4983 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4984 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +[4985 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +00000040 f0 a9 0d 0b 07 a8 |......| +[4986 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[4987 10-14 19:02:30.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b c9 ce 09 7b bb 5a fc 89 fc 0b ea |0D. ....{.Z.....| +00000010 cb c9 71 ce 29 5c de 32 9e cb c5 70 de df 52 33 |..q.)\.2...p..R3| +00000020 41 5a 13 fa 02 20 30 78 8e dd ef 4e 75 e4 04 e1 |AZ... 0x...Nu...| +00000030 e5 6c 1e 42 fe ac da 13 03 e6 c5 87 95 62 81 81 |.l.B.........b..| +00000040 fb 8e 8d 13 9d f8 |......| +[4988 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[498a 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[498b 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4989 10-14 19:02:30.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[498c 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[498d 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[498e 10-14 19:02:30.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[498f 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:45944 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4990 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4991 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[4992 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4993 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 cf eb f1 8b 7d 04 25 8c 11 5f 21 86 05 1b ed |F....}.%.._!....| +00000010 f6 73 6f 98 55 49 26 f9 d0 22 3c 39 5a 1e 4a 8d |.so.UI&.."<9Z.J.| +[4994 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d da ff a6 c8 80 76 65 de bc 16 da |0D. =.....ve....| +00000010 62 3f 8b c7 df fc bd 60 75 4e 98 00 94 d8 83 46 |b?.....`uN.....F| +00000020 68 d6 a3 38 02 20 74 d9 20 08 24 fa 9c 9e f4 b2 |h..8. t. .$.....| +00000030 87 3f 55 5e e6 c6 4f d5 25 32 40 cb a7 06 14 6f |.?U^..O.%2@....o| +00000040 66 4b dd 9d e6 c9 |fK....| +[4995 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4996 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4997 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4998 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 38 7d 65 ea fb 7c b9 79 9c 3d 8d d8 46 85 7d |D8}e..|.y.=..F.}| +00000010 89 1d c6 e7 c2 df 75 c1 a1 a4 72 de d0 35 57 69 |......u...r..5Wi| +[4999 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 3b 28 4c ee 36 ad fd 0c 37 15 b2 |0D. {;(L.6...7..| +00000010 17 95 45 5f c5 81 67 42 6b 59 2f 06 1c 09 25 a0 |..E_..gBkY/...%.| +00000020 0f f8 25 7f 02 20 5a f5 38 64 a3 c3 7e cf e9 76 |..%.. Z.8d..~..v| +00000030 db a0 11 fd ca e7 df 23 b6 8f 32 1c b7 58 2e af |.......#..2..X..| +00000040 f0 a9 0d 0b 07 a8 |......| +[499a 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[499b 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[499c 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[499d 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[499e 10-14 19:02:30.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[499f 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[49a0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[49a1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[49a2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[49a3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[49a4 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[49a5 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 gate 1602702150796981600 evaluation starts +[49a6 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 signed by 0 principal evaluation starts (used [false]) +[49a7 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 processing identity 0 with bytes of 115a6c0 +[49a8 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49a9 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 principal evaluation fails +[49aa 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a469d0 gate 1602702150796981600 evaluation fails +[49ab 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[49ac 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[49ad 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[49ae 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 gate 1602702150798414800 evaluation starts +[49af 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 signed by 0 principal evaluation starts (used [false]) +[49b0 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 processing identity 0 with bytes of 115a6c0 +[49b1 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 principal matched by identity 0 +[49b2 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 c6 fb 44 11 0d 4f a4 1e d3 46 6a 84 12 bc 67 |...D..O...Fj...g| +00000010 cd 82 be a5 40 71 91 93 17 cf 9b 47 4c 05 b0 10 |....@q.....GL...| +[49b3 10-14 19:02:30.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 30 6a d4 bd c3 9f 90 0b c2 d9 |0E.!..0j........| +00000010 b5 d3 1c 37 ba a8 32 07 84 58 50 1b aa 20 b5 d1 |...7..2..XP.. ..| +00000020 74 d3 16 69 b9 02 20 30 fa c3 fe 11 bc b4 19 21 |t..i.. 0.......!| +00000030 d8 29 16 a2 21 b7 f6 60 08 dc d2 96 20 c5 3f 57 |.)..!..`.... .?W| +00000040 b3 18 05 37 5f 6e 99 |...7_n.| +[49b4 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 principal evaluation succeeds for identity 0 +[49b5 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a46f40 gate 1602702150798414800 evaluation succeeds +[49b6 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[49b7 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[49b8 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[49b9 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[49ba 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[49bb 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49bc 10-14 19:02:30.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49bd 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[49be 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[49bf 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c0 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c1 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c2 10-14 19:02:30.88 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49c3 10-14 19:02:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Processing request from 172.18.0.9:41936: authentication:tg\262n\302\216X\340\024\027\255\274\260\274\301\363\252\010" > queries: > > > +[49c4 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[49c5 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[49c6 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[49c7 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 gate 1602702151081042300 evaluation starts +[49c8 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 signed by 0 principal evaluation starts (used [false]) +[49c9 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 processing identity 0 with bytes of 115a6c0 +[49ca 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 principal matched by identity 0 +[49cb 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 50 fd 85 13 59 7c c0 23 4d 67 c6 92 bd 53 52 |tP...Y|.#Mg...SR| +00000010 e4 01 c3 48 8e a8 08 14 b6 fc cf be 17 ce 67 9f |...H..........g.| +[49cc 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a c6 db fd 17 50 dd a3 e9 c6 bd |0E.!......P.....| +00000010 c2 e1 6f c5 ff df 3c 29 1a e8 44 78 93 32 d4 76 |..o...<)..Dx.2.v| +00000020 5a 1b 86 c9 cd 02 20 70 91 45 05 f2 8a 7a de 57 |Z..... p.E...z.W| +00000030 86 84 cc 5c e5 65 c3 4f 66 28 93 e4 9d 78 6c ea |...\.e.Of(...xl.| +00000040 eb 2b e8 c4 1a a3 86 |.+.....| +[49cd 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 principal evaluation succeeds for identity 0 +[49ce 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a8a190 gate 1602702151081042300 evaluation succeeds +[49cf 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[49d0 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[49d1 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[49d2 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[49d3 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +[49d4 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +[49d5 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: satisfies principal principal:"\n\007Org1MSP" +[49d6 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49d7 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49d8 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49d9 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[49da 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[49db 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[49dc 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[49dd 10-14 19:02:31.08 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: satisfies principal principal:"\n\007Org1MSP" +[49de 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[49df 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: satisfies principal principal:"\n\007Org2MSP" +[49e0 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: satisfies principal principal:"\n\007Org2MSP" +[49e1 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[49e2 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning to 172.18.0.9:41936 a response containing: [cc_query_res: membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > peers: membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > > > endorsers_by_groups: membership_info: identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" > peers: membership_info: identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" > > > layouts: > layouts: > > > ] +[49e3 10-14 19:02:31.09 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=discovery.Discovery grpc.method=Discover grpc.request_deadline=2020-10-14T19:02:41.042Z grpc.peer_address=172.18.0.9:41936 grpc.peer_subject="CN=Admin@org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=19.0411ms +[49e4 10-14 19:02:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:41936: read: connection reset by peer +[49e5 10-14 19:02:31.11 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" diff --git a/hyperledger_fabric/v1.4.9/scripts/download_images.sh b/hyperledger_fabric/v1.4.9/scripts/download_images.sh new file mode 100644 index 00000000..13e2df34 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/download_images.sh @@ -0,0 +1,73 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# pull_image image_name +pull_image() { + IMG=$1 + FORCED="false" + if [ "$#" -eq 2 ]; then + FORCED=$2 + fi + if [ ! -z "$(docker images -q ${IMG} 2> /dev/null)" ] && [ "$FORCED" != "true" ]; then # existed and not forced to update + echo "${IMG} already exists and not forced to update " + else + docker pull ${IMG} + fi +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image "yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG" "true" & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & # e.g., v1.4.4 +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage baseos couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & # e.g., 0.4.18 +done + +if [ ${PROJECT_VERSION} == "2.0.0" ]; then + pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag + # core.yaml requires a latest tag, but nodeenv is not available in docker hub yet + # pull_image hyperledger/fabric-nodeenv:latest + pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag + docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} +fi + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.9/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/env_setup.sh b/hyperledger_fabric/v1.4.9/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.9/scripts/func.sh b/hyperledger_fabric/v1.4.9/scripts/func.sh new file mode 100644 index 00000000..49c43a71 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/func.sh @@ -0,0 +1,978 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path [lang] +chaincodeInstall () { + if [ "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + local lang="golang" + if [ "$#" -eq 8 ]; then + local lang=$8 + fi + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + -l ${lang} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommitted org peer peer_url peer_tls_root_cert channel cc_name +chaincodeQueryCommitted () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.9/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.9/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.9/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.9/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.9/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.9/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.9/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.9/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.9/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.9/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.9/scripts/json_flatter.py b/hyperledger_fabric/v1.4.9/scripts/json_flatter.py new file mode 100644 index 00000000..c931d7a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + #if success: # result_bytes = b'xxxx\xx' + #print('===================Start==================================') + #print(raw) + #print(result) + #print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + #print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + # print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.9/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.9/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..5c0c79b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.9/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.9/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.9/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.9/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.9/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.9/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.9/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.9/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.9/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.9/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_discover.sh b/hyperledger_fabric/v1.4.9/scripts/test_discover.sh new file mode 100644 index 00000000..dbebde11 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_discover.sh @@ -0,0 +1,41 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +#chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +CC_NAME=${CC_NAME:-$CC_02_NAME} + +cd /etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com + +USER_KEY=`ls msp/keystore` + +discover \ + --peerTLSCA tls/ca.crt \ + --userKey msp/keystore/${USER_KEY} \ + --userCert msp/signcerts/Admin\@org1.example.com-cert.pem \ + --MSP Org1MSP \ + --tlsCert tls/client.crt \ + --tlsKey tls/client.key \ + endorsers \ + --server peer0.org1.example.com:7051 \ + --channel ${APP_CHANNEL} \ + --chaincode ${CC_NAME} + +exit diff --git a/hyperledger_fabric/v1.4.9/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.9/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.9/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.9/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.9/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.9/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.9/scripts/test_temp.sh b/hyperledger_fabric/v1.4.9/scripts/test_temp.sh new file mode 100644 index 00000000..aaaaa937 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +#chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.9/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.9/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.9/scripts/variables.sh b/hyperledger_fabric/v1.4.9/scripts/variables.sh new file mode 100644 index 00000000..af61dce9 --- /dev/null +++ b/hyperledger_fabric/v1.4.9/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.21 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=1.4.9 + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=1.4.9 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.9/solo/README.md b/hyperledger_fabric/v1.4.9/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.9/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.9/solo/configtx.yaml b/hyperledger_fabric/v1.4.9/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.9/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities